Code: |
Lower Case – a,b,c,d
Upper Case – A,B,C,D Symbols - @,#,$,%,^, Numerals – 1,2,3,4 Alt Characters – Â, € |
JustinT wrote: |
The biggest mistake of this system, oftentimes, is relying on the user to be secure. Why do you think dictionary attacks are so effective? There is no substitute for a good, random password or passphrase, but because things that we can comfortably store in memory are more convenient, it's easy to abuse the security margin. However, for cryptography to be appealing, it must be convenient. C. Ellison, C. Hall, R. Milbert, and B. Schneier designed a systematic approach to protecting the password or passphrase itself, using "personal entropy", which involves the answering of certain questions that are unique, or personal. In other words, you encrypt your password or passphrase with the answers of a set of questions, where you can still obtain your password or passphrase by only knowing a subset of those questions. This is probably one of the most promising designs, in terms of usefulness. It's a genius way to both add security to our system of password and passphrase protection and make things easier on the user's memory, but in turn, frustrate an attacker by requiring that he or she knows a much larger subset of data, in order to derive any useful information. |
NeonWizard wrote: |
Eventually, any password can be cracked. But the amount of time it takes to crack a password depends only on how good the password is. If it’s a hard one, it could take weeks, and eventually, whoever is trying to crack it, will probably give up after a couple of hours. |
NeonWizard wrote: |
The best password is one that you can come up on your own with, not one that’s spit out by a password generator. |
NeonWizard wrote: |
It's not hard to make a good password. one example that i've put up was the email one. It's hard to crack, and uses all the necessary stuff. |
NeonWizard wrote: |
Use that security strength meter. Your password would have to be pretty strong in order to withstand an attack for a full week. |
securityforumsusername wrote: |
Assuming we use a random password generator for one important password (accepting any of them, ie: no bias at all), then how long should it be? |
securityforumsusername wrote: |
256 bit key = ~200 characters. aiaiai. |
output generated using printer-friendly topic mod, All times are GMT + 2 Hours