Dynaverse.net
Off Topic => Engineering => Topic started by: toasty0 on November 16, 2008, 09:11:58 am
-
For those of you who're interested in computer security this link is for you. For those you who are n ot, this link is especially for you.
http://blogs.msdn.com/lcris/archive/2008/02/11/can-encryption-make-you-more-vulnerable.aspx
-
Secure encryption has 2 components. In order of importance:
1. Secure key management
2. Robust algorithm.
-
3rd component
3/ Must actually be used.
-
4th) Make sure that Carlos the jackel doesn't capture you and pull out your toenails with pliers so you spill the password.
-
Or that you consider the first name of all your children a complex password.
-
4th) Make sure that Carlos the jackel doesn't capture you and pull out your toenails with pliers so you spill the password.
The technical term is "Rubber hose cryptoanalysis"
-
Or that you consider the first name of all your children a complex password.
Easiest way is to use phraseology..
Think of a phrase you can easily remember, then use the first letter of each word, with special characters for punctuation or where you would breathe if you spoke the phrase.
For example, "I like my girlfriend, she's one hot mama" would be Ilmg,s1hm
-
Or that you consider the first name of all your children a complex password.
Easiest way is to use phraseology..
Think of a phrase you can easily remember, then use the first letter of each word, with special characters for punctuation or where you would breathe if you spoke the phrase.
For example, "I like my girlfriend, she's one hot mama" would be Ilmg,s1hm
In one environment we used MyFavoritemovietitles, then after 45 days swtiched to MyFavorite(fill in desserts name). Complexity and length.