This is a Great Article!:) I have followed Computer and Internet Security for the last 13 Years and this info is worth reading every word... And then putting these principles into Practice, for Sure! I have put in the crux of the Article here, to get you interested...
Don
The Usability of Passwords: /by @baekdal .
Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones.
So let's dive into the world of passwords, and look at what makes a password secure in practical terms.
Update: Read the FAQ (updated January 2011)
Update - April 21, 2011: This article was "featured" on Security Now, here is my reply!
How to hack a password
The work involved in hacking passwords is very simple. There are 5 proven ways to do so:
- Asking: Amazingly the most common way to gain access to someone's password is simply to ask for it (often in relation with something else). People often tell their passwords to colleagues, friends and family. Having a complex password policy isn't going to change this.
- Guessing: This is the second most common method to access a person's account. It turns out that most people choose a password that is easy to remember, and the easiest ones are those that are related to you as a person. Passwords like: your last name, your wife's name, the name of your cat, the date of birth, your favorite flower etc. are all pretty common. This problem can only be solved by choosing a password with no relation to you as a person.
- Brute force attack: Very simple to do. A hacker simply attempts to sign-in using different passwords one at the time. If you password is "sun", he will attempt to sign-in using "aaa, aab, aac, aad ... sul, sum, sun (MATCH)". The only thing that stops a brute force attack is higher complexity and longer passwords (which is why IT people want you to use just that).
- Common word attacks: A simple form of brute-force attacks, where the hacker attempt to sign-in using a list of common words. Instead of trying different combination of letters, the hacker tries different words e.g. "sum, summer, summit, sump, sun (MATCH)".
- Dictionary attacks: Same concept as common word attacks - the only difference is that the hacker now uses the full dictionary of words (there are about 500,000 words in the English language).
When is a password secure?
Skipping on down...Does that mean that the IT-departments and security companies is right? Nope, it just means that a 6 character password isn't going to work. None can remember a password like "J4fS<2", which evidently mean that it will be written on a post-it note.
To make usable passwords we need to look at them differently. First of all what you need is to use words you can remember, something simple and something you can type fast.
Like these:
Using more than one simple word as your password increases you security substantially (from 3 minutes to 2 months). But, by simply using 3 words instead of two, you suddenly got an extremely secure password.
It takes:
- 1,163,859 years using a brute-force method
- 2,537 years using a common word attack
- 39,637,240 years using a dictionary attack
It is 10 times more secure to use "this is fun" as your password, than "J4fS<2".
If you want to be insanely secure; simply choose uncommon words as your password - like:
A usable and secure password is then not a complex one. It is one that you can remember - a simple password using 3+ words.
It is not just about passwords
One thing is to choose a secure and usable password. Another thing is to prevent the hacker from hacking password in the first place. This is a very simple thing to do.
All you need to do is to prevent automatic hacking scripts from working effectively. What you need to do is this:
- Add a time-delay between sign-in attempts. Instead of allowing people to sign-in again and again and again. Add a 5 second delay between each attempt.
It is short enough to not be noticeable (it takes longer than 5 seconds to realize that you have tried a wrong password, and to type in a new one). And, it forces the hacker to only be able make sign-in requests 1 every 5 seconds (instead of 100 times per second).
- Add a penalty period if a person has typed a wrong password more than - say - 10 times - of something like 1 hour. Again, this seriously disrupts the hacking script from working effectively.
A hacker can hack the password "alpine fun" in only 2 months if he is able to attack your server 100 times per second. But, with the penalty period and the 5 second delay, the same password can suddenly sustain an attack for 1,889 years.
Remember this the next time you are making web applications or discussing password policies. Passwords can be made both highly secure and user-friendly.
Read More...
http://www.baekdal.com/tips/password-security-usability
GPU password cracking made easy
- GPU password cracking made easy - Hack a Day
- GPU Password Cracking – Bruteforceing a Windows Password Using a Graphic Card « Vijay's Tech Encounters
- oxid.it - Cain & Abel
- SHA1/MD5/MD4 bruteforcer for ATI and nVidia GPUs
- GPU Processing and Password Cracking - Hack a Day
- The Usability of Passwords (by @baekdal) #tips
- Why "this is fun" is 10x more secure a password than "J4S!2" - and "fluffy is puffy" is even better : geek
- MD4/MD5/SHA1 bruteforcer for ATI and nVidia GPUs
- Cain & Abel User Manual
- Index of /dot/progs/firefly
- DonsDeals Blog - recover password - Google Search
- Why "this is fun" is 10x more secure a password than "J4S!2" - and "fluffy is puffy" is even better : geek
- Brother Solutions Center: Contact Us - Linux
- Brother Solutions Center: Contact Us - Linux
- vsftpd - Secure, fast FTP server for UNIX-like systems
- Linux Today - Secure Online Banking with Linux USB Live
- Linux Today - Secure Online Banking with Linux USB Live
- Newegg.com - Transcend 8GB Secure Digital High-Capacity (SDHC) Flash Card Model TS8GSDHC10
- artaculous.com | McAfee SiteAdvisor Software – Website Safety Ratings and Secure Search
- Download Click&Clean for Desktop 3.7.2.0 - An application that automates CCleaner's internet history removing process - Softpedia
- Herring Bank
- Obama's new BlackBerry: The NSA's secure PDA? | Tech News on ZDNet
- SafeCopy Backup - online backup, file sharing and secure access service for Mac, Windows and Linux
- Secure Online Banking with Linux USB Live
- Smilebox Playback
- TurboTax Online - Free Edition 2009
- Secure Call - GNU Telephony
- Rescue CD
- Newegg.com - DANE-ELEC 4GB Secure Digital High-Capacity (SDHC) Flash Card Model DA-SD-4096-R - Flash Memory
- Secure Web Shopping
- Linux Today - Spideroak: Secure Offsite Backups For Linux
- Linux Today - Spideroak: Secure Offsite Backups For Linux
- Nmap -- Port Scanner
- srm - secure file deletion
- Hosting Control Panel
- Firefox web browser | Faster, more secure, & customizable
- Firefox web browser | Features: Faster, more secure, & customizable
- Hosting Control Panel
- Disability Appeal Online - Welcome!
- Disability Appeal Online - Welcome!
- Adult Disability and Work History Report
- Internet Benefits Application
- Firefox web browser | Faster, more secure, & customizable
- Firefox web browser | Features: Faster, more secure, & customizable
- Accommodation in Evpatoria and Cheap Travel to Evpatoria, Autonomous Republic of Crimea, Ukraine :-) Hospitality Club
- Ukraine:Autonomous_Republic_of_Crimea:Evpatoria :-) Hospitality Club
- F-Secure Linux weblog » Blog Archive » F-Secure Rescue CD 3.00 released
- SecureHorizons Quality health care coverage
- SecureHorizons: Quality health care coverage
- SecureHorizons ProviderLookup Online
- SecureHorizons: Quality health care coverage
- SecureHorizons: Quality health care coverage
- SecureHorizons ProviderLookup Online
- Linux Today - Spideroak: Secure Offsite Backups For Linux
- Linux Today - Spideroak: Secure Offsite Backups For Linux
- del.icio.us/login
- Newegg.com - Transcend 4GB Secure Digital high-Capacity(SDHC) Class 6 Flash card Model TS4GSDHC6 - Flash Memory
- Become a Certified Paid Search Management Professional
- OpenFire and Spark offer secure private chat and collaboration tools
- F-Secure Linux weblog » Blog Archive » F-Secure Rescue CD 3.00 release (...)
- F-Secure Support pages: F-Secure Online Virus Scanner
- Linux Today - Spideroak Secure Offsite Backups For Linux
- Linux Today - Spideroak: Secure Offsite Backups For Linux
- Newegg.com - Transcend 4GB Secure Digital high-Capacity(SDHC) Class 6 Flash card Model TS4GSDHC6 - Flash Memory
- Claimed-Secure Horizons United Health Care (866) 491-5940
- (866) 491-5940-Secure Horizons United Health Care
- (866) 491-5940-Secure Horizons United Health Care
- (866) 491-5940-Secure Horizons United Health Care
- Mini SD, Mini SD Cards, Mini Secure Digital Card, Mini Secure Digital Memory Cards at TigerDirect.com
- Transcend 2GB Secure Digital Card TS2GSDC at TigerDirect.com
- Centon 2GB Secure Digital Card 2GBSD at TigerDirect.com
- Nmap -- Port Scanner
- srm - secure file deletion
- (866) 491-5940-Secure Horizons United Health Care
- (866) 491-5940-Secure Horizons United Health Care
- Claimed-Secure Horizons United Health Care (866) 491-5940
- (866) 491-5940-Secure Horizons United Health Care
- Accommodation in Evpatoria and Cheap Travel to Evpatoria, Autonomous Republic of Crimea, Ukraine :-) Hospitality Club
- Ukraine:Autonomous_Republic_of_Crimea:Evpatoria :-) Hospitality Club
- F-Secure Support pages: F-Secure Online Virus Scanner
- del.icio.us/login
- Become a Certified Paid Search Management Professional
- Centon 2GB Secure Digital Card 2GBSD at TigerDirect.com
- Mini SD, Mini SD Cards, Mini Secure Digital Card, Mini Secure Digital (...)
- Transcend 2GB Secure Digital Card TS2GSDC at TigerDirect.com
- Secure source code hosting and collaborative development - GitHub
- Linux Today - You must be at least this Secure to ride on the Internet
- Linux Today - Fedora 14 Spotlight Feature: Keeping Secure with OpenSCAP
- Evernote strikes it rich, secures $20 million in funding
- CCleaner version 3 goes 64-bit, adds secure disk wipe, Windows 7 integration
- Remote PC through VPN Access - Secure Remote Access | Comodo
- Hotmail adds full-session SSL for more secure webmail
- Linux Today - Run Applications in Secure Sandboxes with SELinux
- Security Blanket Technical Blog: Tips for Securely Using Temporary Files in Linux Scripts
- Gawker Victim? 4 Ways to Make Your New Password Secure | News & Opinion | PCMag.com
- Newegg.com Shopping Cart
- rsync.net - Secure Offsite Backups, Offsite Data Storage and Remote Encrypted Filesystems, Offsite Backup
- F-Secure Labs
- Easy Clean, Free Virus Removal - Free Download | F-Secure
- Free Online Tools
- Linux Today - Weekend Project: Scrub Files and Old Hard Drives Securely on Linux
- Cable Stripper Tools Comparison Chart - Secure(tm)
- SSH tunneling for secure web surfing | parabing!
- Secure, passwordless SSH logins | parabing!
- Secure, passwordless SSH logins | parabing!
- Proxify® anonymous proxy - surf the Web privately and securely
- Proxify® anonymous proxy - surf the Web privately and securely
- Linux Today - 9 Best practices to secure your Linux Desktop & Server
- Linux Today - Knockd, to secure your ports on Linux
- » Linuxaria Knockd, to secure your ports on Linux
- How To Secure Your Ubuntu 10.10 Desktop With LinOTP 2 | HowtoForge - Linux Howtos and Tutorials
- F-Secure Support pages: F-Secure Online Virus Scanner
- F-Secure Support pages: F-Secure Online Virus Scanner
- Easy Clean, Free Virus Removal - Free Download | F-Secure
- Brother Solutions Center: Contact Us - Linux
- Brother Solutions Center: Contact Us - Linux
- Brother Solutions Center: Contact Us - Linux
- Linux Today - Secure Online Banking with Linux USB Live
- Linux Today - Secure Online Banking with Linux USB Live
- SafeCopy Backup - online backup, file sharing and secure access service for Mac, Windows and Linux
- Secure Online Banking with Linux USB Live
- Linux Today - Spideroak: Secure Offsite Backups For Linux
- Linux Today - Spideroak: Secure Offsite Backups For Linux
- F-Secure Linux weblog » Blog Archive » F-Secure Rescue CD 3.00 released
- Linux Today - Spideroak: Secure Offsite Backups For Linux
- Linux Today - Spideroak: Secure Offsite Backups For Linux
- F-Secure Linux weblog » Blog Archive » F-Secure Rescue CD 3.00 release (...)
- Linux Today - Spideroak Secure Offsite Backups For Linux
- Linux Today - Spideroak: Secure Offsite Backups For Linux
- Linux Today - You must be at least this Secure to ride on the Internet
- Linux Today - Fedora 14 Spotlight Feature: Keeping Secure with OpenSCAP
- Linux Today - Run Applications in Secure Sandboxes with SELinux
- Security Blanket Technical Blog: Tips for Securely Using Temporary Files in Linux Scripts
- Linux Today - Weekend Project: Scrub Files and Old Hard Drives Securely on Linux
- Linux Today - 9 Best practices to secure your Linux Desktop & Server
- Linux Today - Knockd, to secure your ports on Linux
- » Linuxaria Knockd, to secure your ports on Linux
- How To Secure Your Ubuntu 10.10 Desktop With LinOTP 2 | HowtoForge - Linux Howtos and Tutorials
- SafeCopy Backup - online backup, file sharing and secure access service for Mac, Windows and Linux
- CCleaner version 3 goes 64-bit, adds secure disk wipe, Windows 7 integration
- SafeCopy Backup - online backup, file sharing and secure access service for Mac, Windows and Linux
- Linux Today - Fedora 14 Spotlight Feature: Keeping Secure with OpenSCAP
- Linux Today - Fedora 14 Spotlight Feature: Keeping Secure with OpenSCAP
- Linux Today - Is Google's Android Insecure?
- Packet injection - Wikipedia, the free encyclopedia
- Linux Today - Is Google's Android Insecure?
- Publisher Application » Google Affiliate Network
- Extracting secured firmware from Freescale Zigbee radios - Hack a Day
- Brother Solutions Center: Contact Us - Linux
No comments:
Post a Comment