![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Test your password
Home » Forums » Cyber Security Information and Advisories » Code Red – Security/Privacy advisories » Test your password
- This topic has 22 replies, 12 voices, and was last updated 13 years, 10 months ago.
AuthorTopicWSRoderunner
AskWoody LoungerJune 11, 2011 at 7:02 am #477161Viewing 10 reply threadsAuthorReplies-
Paul T
AskWoody MVPJune 11, 2011 at 10:52 am #1283176Even “password” takes nearly 7 years to crack, but because it’s a dictionary word it will happen much faster – seconds probably. A very simple change will make it much less likely to be broken but still easy to remember. Add an upper case character somewhere and add the position of the upper case character to the end, e.g. “passWord5”. Now you can add a character to the end, based on the number and the Shift key, e.g. “passWord5%”, and you end up with an easy to remember password that would take centuries to crack.
Importantly, do not use the same password on more than one site. Once someone steals your password they can access any site you use, and at the rate web sites are being hacked that is a real possibility. Create an easy to remember but difficult to crack password and use it as the password for your password manager. The password manager does the rest.
cheers, Paul
-
WSDoc Brown
AskWoody LoungerJune 15, 2011 at 9:27 am #1283541Now you can add a character to the end, based on the number and the Shift key, e.g. “passWord5%”, and you end up with an easy to remember password that would take centuries to crack.
cheers, Paul
Unfortunatly that may no longer be true. There are both legitamate and black hat software out there that takes advantage of the power of Amazon’s “cloud”. This method is in its infancy. I’m sure in the next few years what we all thought was so clever and secure will be no better what we thought was very secure 10 years ago. The price of progress I guess.
http://www.w7forums.com/researcher-uses-amazon-cloud-crack-wi-fi-passwords-t9595.html
http://www.securityweek.com/commercial-software-harnesses-amazon-cloud-crack-passwords-faster
-
joep517
AskWoody MVPJune 15, 2011 at 11:34 am #1283550Unfortunatly that may no longer be true. There are both legitamate and black hat software out there that takes advantage of the power of Amazon’s “cloud”. This method is in its infancy. I’m sure in the next few years what we all thought was so clever and secure will be no better what we thought was very secure 10 years ago. The price of progress I guess.
http://www.w7forums.com/researcher-uses-amazon-cloud-crack-wi-fi-passwords-t9595.html
http://www.securityweek.com/commercial-software-harnesses-amazon-cloud-crack-passwords-faster
Probably why biometrics is being introduced more & more.
Joe
--Joe
-
-
-
WSRoderunner
AskWoody Lounger -
Paul T
AskWoody MVPJune 16, 2011 at 1:24 pm #1283769“Assuming one hundred billion guesses per second, 19.24 years”
That’s still a long time for a short password. Your master password should always be as long as you can get away with.You also need to factor in the system you are trying to crack. Assuming it is an encrypted file and the cracker has a copy, if the designer has done it properly it will still take at least 1 second per attempt. That increases the time to crack by at least an order of magnitude, even in the cloud. Much easier to steal your bank password directly from the browser via a trojan.
cheers, Paul
-
WSRoderunner
AskWoody Lounger -
WSjscher2000
AskWoody LoungerJune 16, 2011 at 2:00 pm #1283782If I used the same password in ‘WSL’ & another forum for logging in only, with the same email address in both, which has a good, long, different password, how vurnerable would I be.????
If someone were to find a forum where he could log in as you, he could (1) exercise your powers on the forum (most important for administrators and moderators), (2) impersonate you in social engineering attacks in that community (e.g., requesting information or action via posts or private messages that would only be undertaken based on trust), and (3) take actions in your name that could affect your reputation in the community or potentially create legal liability.
Writing that makes me want to upgrade some of my passwords. :o:
-
WSRoderunner
AskWoody LoungerJune 16, 2011 at 2:07 pm #1283784If someone were to find a forum where he could log in as you, he could (1) exercise your powers on the forum (most important for administrators and moderators), (2) impersonate you in social engineering attacks in that community (e.g., requesting information or action via posts or private messages that would only be undertaken based on trust), and (3) take actions in your name that could affect your reputation in the community or potentially create legal liability.
Writing that makes me want to upgrade some of my passwords. :o:
My thought entirely. I have just upgraded mine which are so complicated I’ve to copy/paste to re log in.
-
-
-
Paul T
AskWoody MVP -
rc primak
AskWoody_MVPJune 23, 2011 at 7:19 am #1284818Too many web sites restrict you to 12 character passwords with only alphanumerics – very poor.
cheers, Paul
As Roger Grimes of Infoworld advises us, security researchers have found that it is the length of a password, not its complexity, which makes it more secure. The 12-character limit bothers me more than any restrictions on using higher-order characters. Alphanumerics are fine. But the length should be 16 to 32 characters, as in a passphrase. One you can remember, but which is gibberish to most folks. All in simple letters and numbers.
-- rc primak
-
-
RetiredGeek
AskWoody_MVPJune 20, 2011 at 5:10 pm #1284435And how good will you security be when This Happens?:rolleyes:
-
Paul T
AskWoody MVP
-
-
RussB
AskWoody PlusJune 21, 2011 at 10:40 am #1284520Not saying this is, but what a great way to phish for passwords.
-
Paul T
AskWoody MVP -
TheGrandRascal
AskWoody LoungerJune 24, 2011 at 5:10 am #1285077How timely — there was an article about Passwords in Ask Leo! just the other day!:
http://ask-leo.com/how_long_should_a_password_be.htmlI’ll say the same thing here that I said there:
The book “Perfect Passwords: Selection, Protection, Authentication” by Mark Burnett ($18.96) recommends a 16-character minimum length password for this reason, but then, it was written in 2005 — so I would expect by now that the standard rainbow tables have been rather expanded by now!!! I would very seriously recommend a twenty-character password by now.
Really, folks: There is NO such thing as “a password too long” — unless it’s so long that it’s rejected by the system you’re feeding it to.
-
rc primak
AskWoody_MVPJune 28, 2011 at 3:10 am #1285768How timely — there was an article about Passwords in Ask Leo! just the other day!:
http://ask-leo.com/how_long_should_a_password_be.htmlI’ll say the same thing here that I said there:
The book “Perfect Passwords: Selection, Protection, Authentication” by Mark Burnett ($18.96) recommends a 16-character minimum length password for this reason, but then, it was written in 2005 — so I would expect by now that the standard rainbow tables have been rather expanded by now!!! I would very seriously recommend a twenty-character password by now.
Really, folks: There is NO such thing as “a password too long” — unless it’s so long that it’s rejected by the system you’re feeding it to.
Pretty much right-on, but sixteen characters is still considered sufficient. Thirty-two if the system allows it. And as I stated before, letters and numbers only is sufficient — no need for special characters.
-- rc primak
-
-
WScyberdiva
AskWoody LoungerJune 28, 2011 at 11:27 am #1285811Have there been any fairly recent studies about the passwords of individuals (not organizations) whose passwords were successfully hacked? I wonder how many of the hacked passwords were even moderately strong–i.e., not containing words found in the dictionary, names of spouses, children, and pets, dates of birth, etc. It may be that a password like db6&=jQ+?tX could be hacked by the folks who bother with individuals’ passwords, but my assumption is that such hackers are looking for lower-hanging fruit.
-
rc primak
AskWoody_MVPJune 30, 2011 at 2:30 am #1285977Have there been any fairly recent studies about the passwords of individuals (not organizations) whose passwords were successfully hacked? I wonder how many of the hacked passwords were even moderately strong–i.e., not containing words found in the dictionary, names of spouses, children, and pets, dates of birth, etc. It may be that a password like db6&=jQ+?tX could be hacked by the folks who bother with individuals’ passwords, but my assumption is that such hackers are looking for lower-hanging fruit.
I would think Roger Grimes at Infoworld would be keeping up with the latest research, both for corporate users (who have a big problem with “spear phishing”) and private individuals. Most of the breaches of individuals seem to have been through social engineering or phishing, or though hacking into accounts which were protected by very weak passwords. The weakest individual security is to actually keep emails containing password changes.
Of course, when the breach is on the ISP side of things (Sony Playstation Network, for example) there’s not much we as end users can do about it.
-- rc primak
-
WScyberdiva
AskWoody LoungerJuly 2, 2011 at 3:45 pm #1286377I would think Roger Grimes at Infoworld would be keeping up with the latest research, both for corporate users (who have a big problem with “spear phishing”) and private individuals. Most of the breaches of individuals seem to have been through social engineering or phishing, or though hacking into accounts which were protected by very weak passwords. The weakest individual security is to actually keep emails containing password changes.
What you say is in keeping with what I’ve been assuming. I thus wonder about the attention in this thread and others to the need for immensely long passwords. I doubt that I need a password of 16 characters, which the book mentioned above recommends as the minimum length. What I do need are passwords that are impossible to guess, that aren’t vulnerable to dictionary search techniques, and that are different for almost each site I use, along with enough savvy not to fall for social engineering or phishing schemes.
-
WSOwen Glendower
AskWoody LoungerJuly 14, 2011 at 10:28 pm #1288335Somewhere or another recently, I read an article on this subject. Someone quoted in the article said that he wrote down all of his passwords–but in a disguised form. He offered no specifics. Anybody else do this?
I’m still thinking about this, but I find it a bit intriguing. Let’s say that you use a top-notch password generator to produce a strong letters-and-numbers password. You can safely write it down and leave it next to your keyboard because only you know that (for example) each letter is offset by -1 (that is, the “d” on paper = “c” in the “real” password) and each number is offset by +1 (5 on paper really means 6).
You could of course make the “disguise” much more complicated than my example above. Perhaps you let the offset be determined by whether the first number in the written-down password is odd or even, for instance.
Like I say, I find this a bit intriguing. Your thoughts?
-
WSMedico
AskWoody LoungerJuly 15, 2011 at 4:17 am #1288366Somewhere or another recently, I read an article on this subject. Someone quoted in the article said that he wrote down all of his passwords–but in a disguised form. He offered no specifics. Anybody else do this?
I’m still thinking about this, but I find it a bit intriguing. Let’s say that you use a top-notch password generator to produce a strong letters-and-numbers password. You can safely write it down and leave it next to your keyboard because only you know that (for example) each letter is offset by -1 (that is, the “d” on paper = “c” in the “real” password) and each number is offset by +1 (5 on paper really means 6).
You could of course make the “disguise” much more complicated than my example above. Perhaps you let the offset be determined by whether the first number in the written-down password is odd or even, for instance.
Like I say, I find this a bit intriguing. Your thoughts?
Owen, Welcome to the Lounge.
What happens if you are visiting a friend or relative in another city and you forgot your PW list (still sitting next to the keyboard at home) but need to access something? Many of us have switched to secure Password Managers on our PC’s. I use Last Passas mine. These have been discussed many times. From Last Pass to Kee Pass to Roboform. I settled on Last Pass and have never looked back. It will generate very secure PW’s, store them on encrypted site that only you have access to with a master password. In fact it is secure enough that if you loose or forget your master PW, Last Pass does not have it to supply to you. This way all you have to do is remember one master PW. Last Pass remembers all the rest.
-
-
-
-
-
WSOwen Glendower
AskWoody LoungerJuly 15, 2011 at 8:14 am #1288390Thanks for the recommendation. I remember just enough from a prob & stat course decades ago to make it entertaining to play around with methods for disguising passwords, but things would of course get pretty clunky if you had more than a few passwords to manage. I’ll check out Last Pass.
Viewing 10 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Help with WD usb driver on Windows 11
by
Tex265
1 hour, 5 minutes ago -
hibernate activation
by
e_belmont
1 hour, 55 minutes ago -
Red Hat Enterprise Linux 10 with AI assistant
by
Alex5723
5 hours, 43 minutes ago -
Windows 11 Insider Preview build 26200.5603 released to DEV
by
joep517
8 hours, 47 minutes ago -
Windows 11 Insider Preview build 26120.4151 (24H2) released to BETA
by
joep517
8 hours, 49 minutes ago -
Fixing Windows 24H2 failed KB5058411 install
by
Alex5723
11 hours, 59 minutes ago -
Out of band for Windows 10
by
Susan Bradley
13 hours, 32 minutes ago -
Giving UniGetUi a test run.
by
RetiredGeek
20 hours, 29 minutes ago -
Windows 11 Insider Preview Build 26100.4188 (24H2) released to Release Preview
by
joep517
1 day, 4 hours ago -
Microsoft is now putting quantum encryption in Windows builds
by
Alex5723
1 day, 2 hours ago -
Auto Time Zone Adjustment
by
wadeer
1 day, 8 hours ago -
To download Win 11 Pro 23H2 ISO.
by
Eddieloh
1 day, 6 hours ago -
Manage your browsing experience with Edge
by
Mary Branscombe
10 hours, 51 minutes ago -
Fewer vulnerabilities, larger updates
by
Susan Bradley
21 hours, 47 minutes ago -
Hobbies — There’s free software for that!
by
Deanna McElveen
5 hours, 41 minutes ago -
Apps included with macOS
by
Will Fastie
3 hours, 33 minutes ago -
Xfinity home internet
by
MrJimPhelps
20 minutes ago -
Convert PowerPoint presentation to Impress
by
RetiredGeek
1 day, 1 hour ago -
Debian 12.11 released
by
Alex5723
2 days, 5 hours ago -
Microsoft: Troubleshoot problems updating Windows
by
Alex5723
2 days, 9 hours ago -
Woman Files for Divorce After ChatGPT “Reads” Husband’s Coffee Cup
by
Alex5723
1 day, 12 hours ago -
Moving fwd, Win 11 Pro,, which is best? Lenovo refurb
by
Deo
6 minutes ago -
DBOS Advanced Network Analysis
by
Kathy Stevens
3 days, 2 hours ago -
Microsoft Edge Launching Automatically?
by
healeyinpa
2 days, 16 hours ago -
Google Chrome to block admin-level browser launches for better security
by
Alex5723
14 hours, 28 minutes ago -
iPhone SE2 Stolen Device Protection
by
Rick Corbett
2 days, 21 hours ago -
Some advice for managing my wireless internet gateway
by
LHiggins
2 days, 4 hours ago -
NO POWER IN KEYBOARD OR MOUSE
by
HE48AEEXX77WEN4Edbtm
1 day, 6 hours ago -
A CVE-MITRE-CISA-CNA Extravaganza
by
Nibbled To Death By Ducks
3 days, 14 hours ago -
Sometimes I wonder about these bots
by
Susan Bradley
1 day, 2 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.