Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Passwords or Pass Phrase? Protecting your Intellectual Property > NetSparsh - Viral Content you Love & Share

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. A new theory on passwords is emerging that may help us remember our access codes, be more secure, and generally keep hackers and thieves out of our networks.

A password is a combination of words, letters, and special characters that only the user knows, allowing access to a computer or other information resources. As humans we have a large number of codes and numbers we need to remember every day ? such as the key lock on our apartment entries, national identification numbers, automobile license or tag numbers, telephone numbers ? it is a large and confusing suite of items we need to memorize.

When selecting a new password or pass code for access to a computer system, most of us understand how difficult it is to remember complex codes, and thus we select something already know n to us, such as names, birthdays, national identifiers, or other known items, and then place a number or character in front of the name or number thinking it is secure. This is easy to understand, as most of us simply do not have an ability to instantly recall large numbers of complex codes.

In a worst case we simply write down the complex code on a piece of paper, and leave it in a desk, our pocketbook, or in many cases taped to the front of our computer monitor.

However, to a hacker this makes access to your network or computer much easier, at they generally only have to learn a couple things about you, and add a few numbers to the front or ending of your personal data ? you would be surprised how often this grants access to computers and networks. Ad some good "cracking utilities" to the hacker's suite of tools, and you can understand the threat.

PassPhrases are a concept that will help us create more secure, easy to remember safeguards for our computer and network resource protection. A passphrase is a selection of words and/or numbers that are 15 characters or more in length, and are easy for us to remember. A couple examples of a good pass phrases are:

? igotodalaieejdaily

? shehasbeautifulhair

? surfinginhawaiiisgreat

According to Mark Minasi, a noted security consultant, a 15 character pass phrase will require a cracking program the following number of computations to try and break a 15 character pass phrase:

? 15 lowercase letters = 1,677,259,342,285,725,925,376 possibilities

? Try a million a second, it'll take 531,855 centuries/years to break the code

As you can see, this is a pretty good level of security for your resource.

Another concern with passwords is if you forget or lose the password, and are using a utility like Microsoft's Encrypting File System (EFS), you run the risk of losing all access to your important files if you require a hardware reset of your password. All EFS encrypted files are linked to your login profile, meaning if you encrypt a directory or file with EFS, and you do a hardware reset on your computer, those files and directories are lost FOREVER.

For Microsoft Windows users you can now also use spaces within your pass phrase, however we would not recommend embedding spaces in your pass phrase, as that actually does allow a cracker better access to getting your code ? it may help them crack it in 100,000 years rather than 250,000!

(About the Author ? John Savageau is a managing director at CRG-West, responsible for managing operations and architecture for several of the largest telecommunications interconnect facilities in the US, including One Wilshire in Los Angeles)

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Reuters

From reality TV to UN, Trump to wield Security Council gavel
Reuters
UNITED NATIONS (Reuters) - He has chaired board meetings, cabinet meetings and starred in a reality television show, but on Wednesday U.S. President Donald Trump will wield the gavel in the United Nations Security Council to denounce Iran for what it ...
Cue fireworks as 'lord of misrule' Donald Trump chairs UN security councilThe Guardian

all 252 news articles »

Bolstering Security Ahead Of Midterm Elections
NPR
With the clock ticking down to November 6, election officials around the country are urgently working to make sure this year's midterms are secure. One way they're doing that is by making sure their computer systems aren't vulnerable to hackers. In ...

and more »

Santa Fe New Mexican

Santa Fe schools looking for holes in security
Santa Fe New Mexican
As public schools nationwide beef up security in response to school shootings, including a deadly incident in Aztec in December, the security chief at the Santa Fe district says he's been wrangling with an array of safety issues that could make schools ...


WIRED

Security News This Week: Twitter Sent User DMs to Developers by Mistake
WIRED
But otherwise, this week had surprisingly good news in the world of security! Cloudflare is embracing Google's "Roughtime" protocol to help keep the internet's clocks ticking in sync, and the Mirai botnet architects have been helping the FBI take down ...
Twitter squashes security bug leaking direct messages since 2017Digital Trends
Fixing a bug in our Account Activity API - TwitterTwitter

all 43 news articles »

Fox News

Police beef up security for UN gathering, Trump visit
Fox News
FILE- In this Sept. 17, 2017 file photo, a security team near Trump Tower looks towards high floors of nearby buildings shortly before the arrival of President Donald Trump in New York. Authorities in New York City are facing an epic security and ...
Police beef up security in NYC for UN gathering, Trump visitAuburn Citizen

all 270 news articles »

CNET

5 new Alexa security tricks to watch over your smart home
CNET
Alexa-enabled security cameras from Ring, Arlo and August, along with Amazon's own Cloud Cam indoor security camera, are getting the capability to work with the Amazon Cameras Recap API. This API allows you to view recorded video clips by saying, ...

and more »

WGN-TV

Increased security at Glenbrook South after school shooting threat
WGN-TV
GLENVIEW, Ill. — Glenbrook South students can expect increased security at their Homecoming dance Saturday after a shooting threat was reported at the high school. Principal Lauren Fagel sent a letter to parents stating that two students on Thursday ...

and more »

South China Morning Post

All eyes on Donald Trump as UN Security Council prepares to discuss North Korea and Iran
South China Morning Post
“The members of the Security Council are not going to take kindly to being lectured by President Trump on the subject of Iran,” said DiMaggio. “These very countries, which include our closest allies, are now facing US sanctions as they scramble to save ...

and more »

New York Times

Billionaire Backer of Maria Butina Had Russian Security Ties
New York Times
An oligarch who helped finance a Russian gun rights activist accused of infiltrating American conservative circles has been a discreet source of funds for business ventures useful to the Russian military and security services, according to documents ...

and more »

Spectrum News

Find out how security is changing for Rochester football games
Spectrum News
New security measures took effect this weekend for the first time after a series of fights at last week's Wilson-East high school football game in Rochester. “What happened last week was a tragedy," Daren Floyd said, who's nephew plays for Wilson. "It ...
Stricter security measures rolled out at high school games in wake of brawls13WHAM-TV

all 5 news articles »
Google News

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More