Jeff7
Lifer
- Jan 4, 2001
- 41,596
- 20
- 81
What's a good alternative?People still use static passwords? :biggrin:
Also:
This is a strong password.
About 172 nonillion years
What's a good alternative?People still use static passwords? :biggrin:
When I typed in a password with just number and letters, it said it would only take 3 days, adding a symbol make sit take longer. But how would the program know no to try symbols? Does it try combinations without symbols first?
What's a good alternative?
Wondering too. I use KeePass and it generates some password (I think Lower, upper, numbers, low level symbols (-=.!)) and it's unique per site. I feel pretty safe with it but maybe I'm crazy![]()
I'm thinking that the unfortunate problem we've run into is that, in the past, the threat was from a person guessing your password, because a computer didn't have the necessary processing power to brute-force an encrypted piece of data, so you didn't want to use a short and simple password. (Though "correct horse battery staple" probably wouldn't be the first thing I'd think to guess.) Now you've got OpenCL password crackers that can brute-force at impressive speeds while running on a consumer-level graphics card.The discussion in this thread reminds me of this http://xkcd.com/936/
Yup. You can dramatically reduce the time it takes to guess a password if you reduce the available character set.I think it probably assumes that the guesser is going to exclude symbols first short of some outside knowledge giving reason to behave otherwise.When I typed in a password with just number and letters, it said it would only take 3 days, adding a symbol make sit take longer. But how would the program know no to try symbols? Does it try combinations without symbols first?
It makes sense to me at least, do you think there's more people with or without a symbol in their password? It's just playing the odds.
I'm thinking that the unfortunate problem we've run into is that, in the past, the threat was from a person guessing your password, because a computer didn't have the necessary processing power to brute-force an encrypted piece of data, so you didn't want to use a short and simple password. (Though "correct horse battery staple" probably wouldn't be the first thing I'd think to guess.) Now you've got OpenCL password crackers that can brute-force at impressive speeds while running on a consumer-level graphics card.
How do they actually use brute force on say a forum log-in?
I never understood how say if I was trying to log-in on this site I'd be able to run one of those before it locked you out for too many tries.
It isn't typically against a login form, but a hacked database offline.How do they actually use brute force on say a forum log-in?
I never understood how say if I was trying to log-in on this site I'd be able to run one of those before it locked you out for too many tries.
I put in a variation of my Keepass master password (same rules, but obviously different characters), and I got two tredecillon years. I never knew that existed.
I switched to a password manager a couple of years ago and I absolutely love it. I probably have around 100 passwords saved in that thing (all extremely strong, where allowed) and I only need to remember one password.
The discussion in this thread reminds me of this http://xkcd.com/936/
It isn't typically against a login form, but a hacked database offline.
I'd suspect a lot of forum "hacks" are due to more important databases that were cracked, and people reusing login credentials. IOW, a lot of people will use their yahoo login for everything. Search a username, then use the same password from yahoo. Good chances of it working, especially in years past. Hopefully people are getting smarter about it, but I wouldn't put money on it.Ah so total hack. I take it then most forum hacks are someone guessing the password.