Because it would guess that combo with a exclamation and first letter cap? How long would it take? If it's less than 60 days, then yes it's a worry. But if it's more than 60 days, no worries.
Even if it was a concern, you could still write a human relate-able password with the same basic idea.
"Ippon wins 1 match!"
How is that less secure than 5rdxXSW@ ?
If thats true, very good to know. I was always under the impression that mixing in numbers/symbols in the middle of the password was always the best way for security - I guess under the principle that bruteforcer's usually go by wordlists... hence... words... not symbols/numbber/letter mix.
http://arstechnica.com/security/201...eling-the-next-frontier-of-password-cracking/
passwords are quickly becoming damn near useless
the main problem is that some sites (apple id) do not allow spaces.
Fixed. We're limited by the systems the vendors supply and the rules management wants to apply.IT doesn't decide that... Management and vendors do.
Everyone should read this article. Correct battery horse staple will go down quite quickly under these methods. Sure, it will take a long time to brute force, but these attacks don't use brute force. Dictionaries with substitution rules, password lists, etc all cut down the time it takes dramatically.
To the poster who uses the 4-letter algorithm, I do something similar but it won't really help either. Basically, the article states that if the algorithm is simple enough for you to remember, then it exists as a rule in some password cracking algorithm somewhere, and a computer can run it faster than you can.
With security/recovery questions being the stupidly easy way to get passwords nowadays, I am basically resigned to the notion that my passwords exist just to keep out accidental logins and people trying 5 times to guess my password via birthday and name combinations.
is completely out of hand.
I mean, it's always been ridiculous: change it every few months, 8+ characters, letter and numbers, etc...but now it's just STUPID. Was just made to update my account for commenting on a blog (not transferring millions of dollars, and not passing nuclear launch codes) and it required 20 characters exactly, or upper, lower, number, and special characters 8 or more long.
I promptly deleted my entire account, as I did with NCSoft, previous jobs, and every other place that makes such ludicrous requirements.
NEWSFLASH: YOUR PASSWORDS DO NOT FUCKING MATTER IN THE LEAST!!!
Anyone with half a brain can hack your accounts no matter what you do. Having a password at all is about as useful as putting the loaded gun on the top shelf instead of leaving it on the coffee table. So KNOCK IT OFF people!
/rant
Word dictionary attack should make that one easy.
It wouldn't matter. Three months from now the requirement will be 50 characters, in 7 different languages, plus a DNA strand. There is no force in the universe greater than collective stupidity.
Word dictionary attack should make that one easy.
You mean ''correct battery staple horse''? That wouldn't be easy to crack using a dictionary attack.
Everyone should read this article. Correct battery horse staple will go down quite quickly under these methods. Sure, it will take a long time to brute force, but these attacks don't use brute force. Dictionaries with substitution rules, password lists, etc all cut down the time it takes dramatically.
To the poster who uses the 4-letter algorithm, I do something similar but it won't really help either. Basically, the article states that if the algorithm is simple enough for you to remember, then it exists as a rule in some password cracking algorithm somewhere, and a computer can run it faster than you can.
With security/recovery questions being the stupidly easy way to get passwords nowadays, I am basically resigned to the notion that my passwords exist just to keep out accidental logins and people trying 5 times to guess my password via birthday and name combinations.
It wouldn't matter. Three months from now the requirement will be 50 characters, in 7 different languages, plus a DNA strand. There is no force in the universe greater than collective stupidity.
Another trend I hate is secret questions. those actually reduce security because someone can just find out the answer through social engineering. I would not considered my mother's maiden name or the school I went to to be a closely guarded secret. I usually put BS in there because they've always been used only if you forget your password (which is where the security issue is) but I see a lot of places that will randomly ask these questions after you put in your password. That forces you to put something you can remember, but that someone wont be able to find out in case someone tries to use the lost password feature. Oddly enough it seems to be banks that do this more than anything.
You mean ''correct battery staple horse''? That wouldn't be easy to crack using a dictionary attack.
What's different about the passcodes cracked in this article is that their raw materials were assembled from phrases rather than single words. While a computer eventually might have combined the words "crotalus" and "atrox" to guess one of the passwords Dustin decoded, it probably would have taken years of time-consuming combinator attacks before that winning pair came up in the roulette wheel.
http://www.safe-in-cloud.com/en/
Problem solved.