Originally posted by: spidey07
Originally posted by: KillerCharlie
Originally posted by: Alkesh
My friend works at a hedge fun and the PW he has for his e-mail is only half of the password, the other half is on a keychain assigned to him that randomizes the numbers ever five minutes. In order to check his mail he has to put in the correct code at the correct time in additon to the part only he knows.
Now that would suck.
It's called two factor authentitcation and actually is growig in popularity.
Lot better than just a username/password
Originally posted by: djheater
Ten pounds IS NOT bulk!!!
oops, I meant
That's not a very restrictive policy!!!
Originally posted by: TallBill
Not even close.
Must contain between 8-12 characters.
Must contain at least 2 upper case letters.
Must contain at least 2 lower case letters.
Must contain 2 numeric characters.
Must contain two non alphanumeric characters (!,@,#,$, etc)
![]()
That's why you break out the 1337 and start replacing a couple letters with numbers or symbols. That way you can use an easy-to-remember password, and still be secure.Originally posted by: Armitage
That's similar to the rules at some places I've worked. In addition, they regularly run dictionary attacks against the password files using several languages including Klingon and various slang dictionaries.
Oooh, one of ours is close (I have 26 different passwords in use at my company currently, so this is just one of them):Originally posted by: TallBill
Not even close.
Must contain between 8-12 characters.
Must contain at least 2 upper case letters.
Must contain at least 2 lower case letters.
Must contain 2 numeric characters.
Must contain two non alphanumeric characters (!,@,#,$, etc)
![]()
Originally posted by: shortylickens
Am I the only person here who realizes these policies dont actually secure sh1t?
If they were really worried about security they would get thumb scanners or something.
But, like so many issues related to saftey and security, its cheaper and easier to keep pushing the BS, inneffective methods that dont do jack, just so people can FEEL safer.
Because FEELING safer is much more desirable to a fool than actually BEING safe.
Originally posted by: jagec
Originally posted by: shortylickens
Am I the only person here who realizes these policies dont actually secure sh1t?
If they were really worried about security they would get thumb scanners or something.
But, like so many issues related to saftey and security, its cheaper and easier to keep pushing the BS, inneffective methods that dont do jack, just so people can FEEL safer.
Because FEELING safer is much more desirable to a fool than actually BEING safe.
Hate to break it to you, but a solid password, that you DON'T write on a sticky note to remember, is much more secure than a thumb scanner. Biometrics tends to be easy to fool.
Originally posted by: jagec
Originally posted by: TallBill
Not even close.
Must contain between 8-12 characters.
Must contain at least 2 upper case letters.
Must contain at least 2 lower case letters.
Must contain 2 numeric characters.
Must contain two non alphanumeric characters (!,@,#,$, etc)
![]()
The only problem my two "secure" passwords have with that policy is that they're too long
No problem with the OP's requirements, though...
That's why you break out the 1337 and start replacing a couple letters with numbers or symbols. That way you can use an easy-to-remember password, and still be secure.Originally posted by: Armitage
That's similar to the rules at some places I've worked. In addition, they regularly run dictionary attacks against the password files using several languages including Klingon and various slang dictionaries.
Originally posted by: shortylickens
You didnt hate breaking anything to me. You liked it.
In the words of George Constanza "Or something. I said Or Something."
I was actually thinking of a smart card along with the password.
Jeebus Christ, WTF? LOLOriginally posted by: Armitage
Originally posted by: TallBill
Not even close.
Must contain between 8-12 characters.
Must contain at least 2 upper case letters.
Must contain at least 2 lower case letters.
Must contain 2 numeric characters.
Must contain two non alphanumeric characters (!,@,#,$, etc)
![]()
That's similar to the rules at some places I've worked. In addition, they regularly run dictionary attacks against the password files using several languages including Klingon and various slang dictionaries.
Originally posted by: spidey07
Originally posted by: KillerCharlie
Originally posted by: Alkesh
My friend works at a hedge fun and the PW he has for his e-mail is only half of the password, the other half is on a keychain assigned to him that randomizes the numbers ever five minutes. In order to check his mail he has to put in the correct code at the correct time in additon to the part only he knows.
Now that would suck.
It's called two factor authentitcation and actually is growig in popularity.
Lot better than just a username/password
Originally posted by: Pepsei
I think Charlotte1 fits right? that's our local admin password for every servers. Ok, I'm lying, but it's close.