Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Passwords or Pass Phrase? Protecting your Intellectual Property > NetSparsh - Viral Content you Love & Share

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. A new theory on passwords is emerging that may help us remember our access codes, be more secure, and generally keep hackers and thieves out of our networks.

A password is a combination of words, letters, and special characters that only the user knows, allowing access to a computer or other information resources. As humans we have a large number of codes and numbers we need to remember every day ? such as the key lock on our apartment entries, national identification numbers, automobile license or tag numbers, telephone numbers ? it is a large and confusing suite of items we need to memorize.

When selecting a new password or pass code for access to a computer system, most of us understand how difficult it is to remember complex codes, and thus we select something already know n to us, such as names, birthdays, national identifiers, or other known items, and then place a number or character in front of the name or number thinking it is secure. This is easy to understand, as most of us simply do not have an ability to instantly recall large numbers of complex codes.

In a worst case we simply write down the complex code on a piece of paper, and leave it in a desk, our pocketbook, or in many cases taped to the front of our computer monitor.

However, to a hacker this makes access to your network or computer much easier, at they generally only have to learn a couple things about you, and add a few numbers to the front or ending of your personal data ? you would be surprised how often this grants access to computers and networks. Ad some good "cracking utilities" to the hacker's suite of tools, and you can understand the threat.

PassPhrases are a concept that will help us create more secure, easy to remember safeguards for our computer and network resource protection. A passphrase is a selection of words and/or numbers that are 15 characters or more in length, and are easy for us to remember. A couple examples of a good pass phrases are:

? igotodalaieejdaily

? shehasbeautifulhair

? surfinginhawaiiisgreat

According to Mark Minasi, a noted security consultant, a 15 character pass phrase will require a cracking program the following number of computations to try and break a 15 character pass phrase:

? 15 lowercase letters = 1,677,259,342,285,725,925,376 possibilities

? Try a million a second, it'll take 531,855 centuries/years to break the code

As you can see, this is a pretty good level of security for your resource.

Another concern with passwords is if you forget or lose the password, and are using a utility like Microsoft's Encrypting File System (EFS), you run the risk of losing all access to your important files if you require a hardware reset of your password. All EFS encrypted files are linked to your login profile, meaning if you encrypt a directory or file with EFS, and you do a hardware reset on your computer, those files and directories are lost FOREVER.

For Microsoft Windows users you can now also use spaces within your pass phrase, however we would not recommend embedding spaces in your pass phrase, as that actually does allow a cracker better access to getting your code ? it may help them crack it in 100,000 years rather than 250,000!

(About the Author ? John Savageau is a managing director at CRG-West, responsible for managing operations and architecture for several of the largest telecommunications interconnect facilities in the US, including One Wilshire in Los Angeles)

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

ZDNet

​Seven cloud vendors lining up for government security clearance
ZDNet
The Australian Signals Directorate (ASD) and the Australian Cyber Security Centre (ACSC) have revealed there are currently seven cloud providers undertaking certification that would allow them to provide cloud services to federal government entities.


CNBC

Europeans are giving Trump a defiant runaround on trade and security
CNBC
As a presidential candidate, Donald Trump began telling the Europeans in 2015 that they had to: (a) cut their systematic and excessive trade surpluses with the U.S., (b) eliminate discriminatory trade rules and practices to open up markets for American ...
Globalised business is a US security issueFinancial Times

all 1,295 news articles »

Cointelegraph

Crypto Wallets Security: Explained
Cointelegraph
Notify the company - it's possible you are not the only one - and review your wallet and PC/smartphone security, if it has significant flaws. Although if you kept your coins at a crypto exchange wallet and that exchange was hacked, there is a ...


Daily Beast

Russia Hawk Axed From National Security Council Right Before Trump-Putin Summit
Daily Beast
The circumstances of retired Army Colonel Richard Hooker's departure from the National Security Council on June 29 are in dispute. It's not clear whether Hooker was forced out or if his detail on the NSC came to its natural end. But what's not in doubt ...


Department of Defense

Mattis Commends Norway's Commitment to Global Peace, Security
Department of Defense
Defense Secretary James N. Mattis hailed the strong bond between the United States and Norway and commended the Nordic nation for its commitment to global peace and security in Oslo, Norway, yesterday. Defense Secretary James N. Mattis shakes ...

and more »

CSO Australia

To achieve strong IT security, embrace a framework strategy
CSO Australia
As well as the constantly evolving threat landscape, IT security teams must also work through an increasingly complex mix of security products and services. With established players extending their offerings and new vendors constantly appearing ...


Northwest Georgia News

FCSO and partners offer church safety and security summit
Northwest Georgia News
Sheriff Tim Burkhalter and the Floyd County Sheriff's Office have partnered with a number of non-profit organizations and local businesses to provide a free Church Safety and Security Summit on Aug. 25, from 8 a.m. to 3 p.m. For the last several years ...


Forbes

Google Roundup: Eight New Features Plus A Major Security ...
Forbes
Google was busy this week with upgrades and new features for its apps and devices, and a major security update for the Chrome browser. Here are some of the ...
Use caller ID & spam protection - Phone app Help - Google SupportGoogle Support

all 69 news articles »

KLAS-TV

Mob Museum hosts home security forum
KLAS-TV
LAS VEGAS - Today the Mob Museum teamed up with Metro Police to teach the valley more about home security. Officers explained keeping criminals out of your home can be as simple as leaving a light on and locking your doors. They also brought up some ...

and more »
Google News

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More