The past is present in the present password
The cardinal rule of password creation is skirting the obvious: No names of children or pets, no street addresses or car names. The ideal password is a random combination of letters and numbers, unfathomable to a potential intruder.
My computer system at work requires a password, changeable at three-month intervals, and I dutifully formulate a new one when the request is triggered by the network. I have chosen to pooh-pooh conventional wisdom, though, and enter a word that represents my current preoccupation in life. After all, my files contain absolutely nothing juicy to tempt a potential hacker, unless he is dying to know if he made the cut for my son's bar mitzvah guest list. I keep a running list of my passwords, handwritten, and I scan it each time I submit a change, and the result is my life story crystallized in one-word bites. I could use it as an outline for my autobiography, in the unlikely event that I would ever presume to write one.
By Phyllis Rudin at Globetechnology.
[ Read more ]
- Article: How to Use Passwords Securely (22 April 2003)
- Article: Implementing Basic Security Measures (14 April 2003)
- Article: Cracking OpenVMS Passwords with John the Ripper (28 November 2002)
- Article: What makes a good Password? (13 November 2002)
- Article: A Note on Proactive Password Checking (24 September 2002)
- Article: Basic security with passwords (24 May 2002)
- Article: Passwords - The Weak Link (1 April 2002)
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.