![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Test your password
Home » Forums » Cyber Security Information and Advisories » Code Red – Security/Privacy advisories » Test your password
- This topic has 22 replies, 12 voices, and was last updated 13 years, 9 months ago.
AuthorTopicWSRoderunner
AskWoody LoungerJune 11, 2011 at 7:02 am #477161Viewing 10 reply threadsAuthorReplies-
Paul T
AskWoody MVPJune 11, 2011 at 10:52 am #1283176Even “password” takes nearly 7 years to crack, but because it’s a dictionary word it will happen much faster – seconds probably. A very simple change will make it much less likely to be broken but still easy to remember. Add an upper case character somewhere and add the position of the upper case character to the end, e.g. “passWord5”. Now you can add a character to the end, based on the number and the Shift key, e.g. “passWord5%”, and you end up with an easy to remember password that would take centuries to crack.
Importantly, do not use the same password on more than one site. Once someone steals your password they can access any site you use, and at the rate web sites are being hacked that is a real possibility. Create an easy to remember but difficult to crack password and use it as the password for your password manager. The password manager does the rest.
cheers, Paul
-
WSDoc Brown
AskWoody LoungerJune 15, 2011 at 9:27 am #1283541Now you can add a character to the end, based on the number and the Shift key, e.g. “passWord5%”, and you end up with an easy to remember password that would take centuries to crack.
cheers, Paul
Unfortunatly that may no longer be true. There are both legitamate and black hat software out there that takes advantage of the power of Amazon’s “cloud”. This method is in its infancy. I’m sure in the next few years what we all thought was so clever and secure will be no better what we thought was very secure 10 years ago. The price of progress I guess.
http://www.w7forums.com/researcher-uses-amazon-cloud-crack-wi-fi-passwords-t9595.html
http://www.securityweek.com/commercial-software-harnesses-amazon-cloud-crack-passwords-faster
-
joep517
AskWoody MVPJune 15, 2011 at 11:34 am #1283550Unfortunatly that may no longer be true. There are both legitamate and black hat software out there that takes advantage of the power of Amazon’s “cloud”. This method is in its infancy. I’m sure in the next few years what we all thought was so clever and secure will be no better what we thought was very secure 10 years ago. The price of progress I guess.
http://www.w7forums.com/researcher-uses-amazon-cloud-crack-wi-fi-passwords-t9595.html
http://www.securityweek.com/commercial-software-harnesses-amazon-cloud-crack-passwords-faster
Probably why biometrics is being introduced more & more.
Joe
--Joe
-
-
WSRoderunner
AskWoody LoungerPaul T
AskWoody MVPJune 16, 2011 at 1:24 pm #1283769“Assuming one hundred billion guesses per second, 19.24 years”
That’s still a long time for a short password. Your master password should always be as long as you can get away with.You also need to factor in the system you are trying to crack. Assuming it is an encrypted file and the cracker has a copy, if the designer has done it properly it will still take at least 1 second per attempt. That increases the time to crack by at least an order of magnitude, even in the cloud. Much easier to steal your bank password directly from the browser via a trojan.
cheers, Paul
WSRoderunner
AskWoody Lounger-
WSjscher2000
AskWoody LoungerJune 16, 2011 at 2:00 pm #1283782If I used the same password in ‘WSL’ & another forum for logging in only, with the same email address in both, which has a good, long, different password, how vurnerable would I be.????
If someone were to find a forum where he could log in as you, he could (1) exercise your powers on the forum (most important for administrators and moderators), (2) impersonate you in social engineering attacks in that community (e.g., requesting information or action via posts or private messages that would only be undertaken based on trust), and (3) take actions in your name that could affect your reputation in the community or potentially create legal liability.
Writing that makes me want to upgrade some of my passwords. :o:
-
WSRoderunner
AskWoody LoungerJune 16, 2011 at 2:07 pm #1283784If someone were to find a forum where he could log in as you, he could (1) exercise your powers on the forum (most important for administrators and moderators), (2) impersonate you in social engineering attacks in that community (e.g., requesting information or action via posts or private messages that would only be undertaken based on trust), and (3) take actions in your name that could affect your reputation in the community or potentially create legal liability.
Writing that makes me want to upgrade some of my passwords. :o:
My thought entirely. I have just upgraded mine which are so complicated I’ve to copy/paste to re log in.
-
Paul T
AskWoody MVP-
rc primak
AskWoody_MVPJune 23, 2011 at 7:19 am #1284818Too many web sites restrict you to 12 character passwords with only alphanumerics – very poor.
cheers, Paul
As Roger Grimes of Infoworld advises us, security researchers have found that it is the length of a password, not its complexity, which makes it more secure. The 12-character limit bothers me more than any restrictions on using higher-order characters. Alphanumerics are fine. But the length should be 16 to 32 characters, as in a passphrase. One you can remember, but which is gibberish to most folks. All in simple letters and numbers.
-- rc primak
RetiredGeek
AskWoody_MVPJune 20, 2011 at 5:10 pm #1284435And how good will you security be when This Happens?:rolleyes:
-
Paul T
AskWoody MVP
RussB
AskWoody PlusJune 21, 2011 at 10:40 am #1284520Not saying this is, but what a great way to phish for passwords. 🙂
Paul T
AskWoody MVPTheGrandRascal
AskWoody LoungerJune 24, 2011 at 5:10 am #1285077How timely — there was an article about Passwords in Ask Leo! just the other day!:
http://ask-leo.com/how_long_should_a_password_be.htmlI’ll say the same thing here that I said there:
The book “Perfect Passwords: Selection, Protection, Authentication” by Mark Burnett ($18.96) recommends a 16-character minimum length password for this reason, but then, it was written in 2005 — so I would expect by now that the standard rainbow tables have been rather expanded by now!!! I would very seriously recommend a twenty-character password by now.
Really, folks: There is NO such thing as “a password too long” — unless it’s so long that it’s rejected by the system you’re feeding it to.
-
rc primak
AskWoody_MVPJune 28, 2011 at 3:10 am #1285768How timely — there was an article about Passwords in Ask Leo! just the other day!:
http://ask-leo.com/how_long_should_a_password_be.htmlI’ll say the same thing here that I said there:
The book “Perfect Passwords: Selection, Protection, Authentication” by Mark Burnett ($18.96) recommends a 16-character minimum length password for this reason, but then, it was written in 2005 — so I would expect by now that the standard rainbow tables have been rather expanded by now!!! I would very seriously recommend a twenty-character password by now.
Really, folks: There is NO such thing as “a password too long” — unless it’s so long that it’s rejected by the system you’re feeding it to.
Pretty much right-on, but sixteen characters is still considered sufficient. Thirty-two if the system allows it. And as I stated before, letters and numbers only is sufficient — no need for special characters.
-- rc primak
WScyberdiva
AskWoody LoungerJune 28, 2011 at 11:27 am #1285811Have there been any fairly recent studies about the passwords of individuals (not organizations) whose passwords were successfully hacked? I wonder how many of the hacked passwords were even moderately strong–i.e., not containing words found in the dictionary, names of spouses, children, and pets, dates of birth, etc. It may be that a password like db6&=jQ+?tX could be hacked by the folks who bother with individuals’ passwords, but my assumption is that such hackers are looking for lower-hanging fruit.
-
rc primak
AskWoody_MVPJune 30, 2011 at 2:30 am #1285977Have there been any fairly recent studies about the passwords of individuals (not organizations) whose passwords were successfully hacked? I wonder how many of the hacked passwords were even moderately strong–i.e., not containing words found in the dictionary, names of spouses, children, and pets, dates of birth, etc. It may be that a password like db6&=jQ+?tX could be hacked by the folks who bother with individuals’ passwords, but my assumption is that such hackers are looking for lower-hanging fruit.
I would think Roger Grimes at Infoworld would be keeping up with the latest research, both for corporate users (who have a big problem with “spear phishing”) and private individuals. Most of the breaches of individuals seem to have been through social engineering or phishing, or though hacking into accounts which were protected by very weak passwords. The weakest individual security is to actually keep emails containing password changes.
Of course, when the breach is on the ISP side of things (Sony Playstation Network, for example) there’s not much we as end users can do about it.
-- rc primak
-
WScyberdiva
AskWoody LoungerJuly 2, 2011 at 3:45 pm #1286377I would think Roger Grimes at Infoworld would be keeping up with the latest research, both for corporate users (who have a big problem with “spear phishing”) and private individuals. Most of the breaches of individuals seem to have been through social engineering or phishing, or though hacking into accounts which were protected by very weak passwords. The weakest individual security is to actually keep emails containing password changes.
What you say is in keeping with what I’ve been assuming. I thus wonder about the attention in this thread and others to the need for immensely long passwords. I doubt that I need a password of 16 characters, which the book mentioned above recommends as the minimum length. What I do need are passwords that are impossible to guess, that aren’t vulnerable to dictionary search techniques, and that are different for almost each site I use, along with enough savvy not to fall for social engineering or phishing schemes.
-
WSOwen Glendower
AskWoody LoungerJuly 14, 2011 at 10:28 pm #1288335Somewhere or another recently, I read an article on this subject. Someone quoted in the article said that he wrote down all of his passwords–but in a disguised form. He offered no specifics. Anybody else do this?
I’m still thinking about this, but I find it a bit intriguing. Let’s say that you use a top-notch password generator to produce a strong letters-and-numbers password. You can safely write it down and leave it next to your keyboard because only you know that (for example) each letter is offset by -1 (that is, the “d” on paper = “c” in the “real” password) and each number is offset by +1 (5 on paper really means 6).
You could of course make the “disguise” much more complicated than my example above. Perhaps you let the offset be determined by whether the first number in the written-down password is odd or even, for instance.
Like I say, I find this a bit intriguing. Your thoughts?
-
WSMedico
AskWoody LoungerJuly 15, 2011 at 4:17 am #1288366Somewhere or another recently, I read an article on this subject. Someone quoted in the article said that he wrote down all of his passwords–but in a disguised form. He offered no specifics. Anybody else do this?
I’m still thinking about this, but I find it a bit intriguing. Let’s say that you use a top-notch password generator to produce a strong letters-and-numbers password. You can safely write it down and leave it next to your keyboard because only you know that (for example) each letter is offset by -1 (that is, the “d” on paper = “c” in the “real” password) and each number is offset by +1 (5 on paper really means 6).
You could of course make the “disguise” much more complicated than my example above. Perhaps you let the offset be determined by whether the first number in the written-down password is odd or even, for instance.
Like I say, I find this a bit intriguing. Your thoughts?
Owen, Welcome to the Lounge.
What happens if you are visiting a friend or relative in another city and you forgot your PW list (still sitting next to the keyboard at home) but need to access something? Many of us have switched to secure Password Managers on our PC’s. I use Last Passas mine. These have been discussed many times. From Last Pass to Kee Pass to Roboform. I settled on Last Pass and have never looked back. It will generate very secure PW’s, store them on encrypted site that only you have access to with a master password. In fact it is secure enough that if you loose or forget your master PW, Last Pass does not have it to supply to you. This way all you have to do is remember one master PW. Last Pass remembers all the rest.
-
-
-
WSOwen Glendower
AskWoody LoungerJuly 15, 2011 at 8:14 am #1288390Thanks for the recommendation. I remember just enough from a prob & stat course decades ago to make it entertaining to play around with methods for disguising passwords, but things would of course get pretty clunky if you had more than a few passwords to manage. I’ll check out Last Pass.
Viewing 10 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
CISA warns of increased breach risks following Oracle Cloud leak
by
Nibbled To Death By Ducks
49 minutes ago -
Outlook 2024 two sent from email addresses
by
Kathy Stevens
4 hours, 53 minutes ago -
Speeding up 11’s search
by
Susan Bradley
12 hours, 5 minutes ago -
HP Pavilion Will Not Wake Up After Being Idle for Longer Period
by
WSwalterwood44
11 hours, 24 minutes ago -
Make a Windows 11 Local Account Passwordless
by
Drcard:))
14 hours, 51 minutes ago -
Ubuntu 25.04 (Plucky Puffin)
by
Alex5723
22 hours, 24 minutes ago -
24H2 fixed??
by
CWBillow
11 hours, 53 minutes ago -
Uninstalr Updates
by
jv16
1 day, 3 hours ago -
Apple zero days for April
by
Susan Bradley
8 hours, 14 minutes ago -
CVE program gets last-minute funding from CISA – and maybe a new home
by
Nibbled To Death By Ducks
1 hour, 7 minutes ago -
Whistleblower describes DOGE IT dept rumpus at America’s labor watchdog
by
Nibbled To Death By Ducks
2 days, 2 hours ago -
Seeing BSOD’s on 24H2?
by
Susan Bradley
1 day, 9 hours ago -
TUT For Private Llama LLM, Local Installation and Isolated from the Internet.
by
bbearren
1 day, 16 hours ago -
Upgrade from Windows 10 to 11
by
Holdsworth8
2 days, 10 hours ago -
Microsoft : AI-powered deception: Emerging fraud threats and countermeasures
by
Alex5723
2 days, 13 hours ago -
0patch
by
WSjcgc50
1 day, 14 hours ago -
Devices might encounter blue screen exception with the recent Windows updates
by
Susan Bradley
2 days, 7 hours ago -
Windows 11 Insider Preview Build 22631.5261 (23H2) released to Release Preview
by
joep517
2 days, 16 hours ago -
Problem opening image attachments
by
RobertG
2 days, 18 hours ago -
advice for setting up a new windows computer
by
routtco1001
3 days, 9 hours ago -
It’s Identity Theft Day!
by
Susan Bradley
10 hours, 44 minutes ago -
Android 15 require minimum 32GB of storage
by
Alex5723
3 days, 13 hours ago -
Mac Mini 2018, iPhone 6s 2015 Are Now Vintage
by
Alex5723
3 days, 14 hours ago -
Hertz says hackers stole customer credit card and driver’s license data
by
Alex5723
3 days, 14 hours ago -
Firefox became sluggish
by
Rick Corbett
1 day, 6 hours ago -
Windows 10 Build 19045.5794 (22H2) to Release Preview Channel
by
joep517
3 days, 18 hours ago -
Windows 11 Insider Preview Build 22635.5235 (23H2) released to BETA
by
joep517
3 days, 19 hours ago -
A Funny Thing Happened on the Way to the Forum
by
bbearren
2 days, 16 hours ago -
Download speeds only 0.3Mbps after 24H2 upgrade on WiFi and Ethernet
by
John
2 hours, 58 minutes ago -
T-Mobile 5G Wireless Internet
by
WSmmi16
2 days, 16 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.