User Panel
Use song lyrics..the longer the better.
Use book titles or movie titles or characters, longer is better. Use whatever is at hand that you can recall with some ease. Add numbers or characters as needed. If you back it up with an encrypted file, make sure you have the password for that or you are up shit creek. |
|
Quoted: Quoted: I work in IT, too. And I think this whole discussion is a waste of LOTS of peoples time caused by laziness and incompetence in IT departments. Logging and Multi Factor Authentication are the answer to this. You should be able to use whatever stupid/short/simple password you want to use because the thing you authenticating to requires multiple types of authentication that are convenient for the user. And failed login attempts are logged and responded to quickly and effectively. The people that spend their days implementing technology are the ones that should be required to implement effective security measures because they have and use the skills to do so -- presumably. 2nd vote for MFA to solve the issue I love my systems that have a 6-8 digit number to log into. It physically pains me to log into something that still uses passwords. |
|
I was in IT for 25 years. Forced password changes are a horrible idea.
What inevitably happens is that many will just write the new password down on a piece of paper and stick it somewhere in a drawer close by. This makes it LESS secure than staying with the same password for years. Can not tell you how many times I have been to a service call and passwords were taped to the monitors or on a yellow sticky note. Some were in medical buildings. HIPPA much? |
|
Quoted: So it's time for password changes... I do not want to use a password manager.... I prefer to keep an updated list on an encrypted drive. That said, in doing some research it seems like instead of a combination of letters and characters—which are usually much harder to remember—if one were to use a long string of words that actually makes sense (and would be easier to remember) the password is much harder to crack based simply on the total number of characters involved. For example, on Kaspersky's password strength checker HERE I get the following results... %#Arfcom35 shows as broken by brute force attacks using the average home computer in two months. Whereas... iwillnotletthepenguinbanme would require 10,000 centuries from the average home computer. For those of you that have much more knowledge on password strength than I do (everybody)... Is my line of thinking correct? View Quote In terms of password strength, yes, your line of thinking is correct. Not wanting to use a password manager is questionable, though. |
|
Quoted: I was in IT for 25 years. Forced password changes are a horrible idea. What inevitably happens is that many will just write the new password down on a piece of paper and stick it somewhere in a drawer close by. This makes it LESS secure than staying with the same password for years. Can not tell you how many times I have been to a service call and passwords were taped to the monitors or on a yellow sticky note. Some were in medical buildings. HIPPA much? View Quote Or they just iterate it. K1nd@$trongPa$$w0rd. K1nd@$trongPa$$w0rd1. K1nd@$trongPa$$w0rd2. If somebody has gotten their hands on your password, mandatory changes aren't any good if they can just change the last digit. |
|
Quoted: If every damn thing locks your account after 3 tries what exactly does it matter? View Quote That's not really what you're protecting against. You're protecting against the whole hashed password database getting stolen ala Linkedin 2016. Then they take that password database and start running brute force attacks on in en masse. When passwords fall out, they take the email address associated with them and start running it through Paypal, etc. That's why you don't share passwords between sites, and that's why you need complicated passwords. |
|
The problem is we have basically trained everyone to use Password1! as their password or a variation of it. Usually being a common word followed by a number which will incrementally go up as the user is forced to change their password every X amount of day finished off with !.
I can used 20+ character passwords that are super simple to remember incorporating caps, lower case, special characters, numbers, and spaces. Yes a really good password should have 2 spaces or more. Take for instance "July F0urth, $eventeen76!" or "FNH SC@r 17s .IIIZero@te!" |
|
yes, the person that proposed the stupid rules that Corp America is embracing, said it was a mistake. Entropy is a real thing. Pass phrases are far more secure and less likely to require you to write them down.
besides, if I wanted to break into your stuff, I'd kidnap you and beat you with a hammer until you gave up all your passwords. It's far easier and faster. |
|
|
Quoted: The problem is we have basically trained everyone to use Password1! as their password or a variation of it. Usually being a common word followed by a number which will incrementally go up as the user is forced to change their password every X amount of day View Quote Oh and btw worth mentioning - brute force apps *20 years ago* were capable of running the entire dictionary and an entire list of names with a suffix of a single numeral through it in minutes. dictionary1 calculator7 Doesn't matter that those are 11 character passwords with both letters and numbers. They'd be unscrambled in minutes. https://nakedsecurity.sophos.com/2012/06/06/linkedin-confirms-hack-over-60-of-stolen-passwords-already-cracked/ |
|
Why not use a password manager that stores itself and the password file on the USB flash drive? Best of both worlds.
Also, USB flash drives aren't especially reliable - keep a backup. |
|
Quoted: Oh and btw worth mentioning - brute force apps *20 years ago* were capable of running the entire dictionary and an entire list of names with a suffix of a single numeral through it in minutes. dictionary1 calculator7 Doesn't matter that those are 11 character passwords with both letters and numbers. They'd be unscrambled in minutes. View Quote Trust me I know. We run brute force attacks on all admin accounts where I work. We have successfully cracked peoples passwords multiple times. It is funny because I helped our security officer set up the system and have looked at what some people use as passwords. We have also from time to time done password dumps where we can see people's password but not associated with user ID's. Some people use profanity and just in general really really poor passwords. |
|
Quoted: Use song lyrics..the longer the better. Use book titles or movie titles or characters, longer is better. Use whatever is at hand that you can recall with some ease. Add numbers or characters as needed. If you back it up with an encrypted file, make sure you have the password for that or you are up shit creek. View Quote Or movie quotes? Mycatcaneatawholewatermellon |
|
My problem is I let my phone do it with Face ID and I can’t login anywhere else because of the 27 character alphanumeric bullshit my phone came up with
|
|
Quoted: Trust me I know. We run brute force attacks on all admin accounts where I work. We have successfully cracked peoples passwords multiple times. It is funny because I helped our security officer set up the system and have looked at what some people use as passwords. We have also from time to time done password dumps where we can see people's password but not associated with user ID's. Some people use profanity and just in general really really poor passwords. View Quote View All Quotes View All Quotes Quoted: Quoted: Oh and btw worth mentioning - brute force apps *20 years ago* were capable of running the entire dictionary and an entire list of names with a suffix of a single numeral through it in minutes. dictionary1 calculator7 Doesn't matter that those are 11 character passwords with both letters and numbers. They'd be unscrambled in minutes. Trust me I know. We run brute force attacks on all admin accounts where I work. We have successfully cracked peoples passwords multiple times. It is funny because I helped our security officer set up the system and have looked at what some people use as passwords. We have also from time to time done password dumps where we can see people's password but not associated with user ID's. Some people use profanity and just in general really really poor passwords. You mean "(companyname)admin" isn't an appropriate AD Domain Admin password? |
|
|
|
Quoted: You mean "(companyname)admin" isn't an appropriate AD Domain Admin password? View Quote The two domain admins we have are really good at what they do. They also have to check out domain admin rights before the domain admin accounts have priv so it will require DUO authentication and the rights are only for the time they check the rights out for. So if someone did get the password the rights are safeguarded as the person who cracked the account would also need to be able to activate rights on the account. One of our workstation admins had a ridiculously easy password and was one that got cracked within an overnight scan. It was a common person's name Jennifer followed by a number and ! they lost rights for a few weeks till they took a security training course. |
|
Most secure password ever.
Data uses most secure code ever Star Trek TNG (Blu Ray HD) |
|
Not IT, but I have been the "guy" by default many times in the past.
Whenever I had to reset someone's password because they forgot or locked themselves out I would reset it to: Fuck(persons name)!x2 A lot of them left it if I didn't force a change and they rarely forgot it. |
|
This checker allows you to see the strength against a supercomputer.
https://www.grc.com/haystack.htm |
|
I gave up trying to remember them aside from a handful of frequent use.
Everything else gets reset every time. |
|
Quoted: lol, I knew at least 3 people would post "correct horse battery staple". OP, the only thing that really matters is length. 14 characters or longer and you'll be fine. Thieves tend to be an impatient lot, they'll take the stuff they can get quickly and leave the stuff it would take weeks or months to get. Idiots requiring special characters or a mix of characters, letters and numbers are what makes this annoying. Well, at least until quantum computing is a thing, then no one's password will be safe. View Quote Using different account names and definitely different passwords on different sites is key. After that, you have a gambit of dumb password restrictions to deal with. I use phrases with numbers and letters added. Also, I type them into an encrypted file on my phone Notes feature. Doing stuff online plus work systems means having 50 or 90 logins to use, so remembering them is out. |
|
Username is Password - Silicon Valley |
|
Quoted: Quoted: I work in IT, too. And I think this whole discussion is a waste of LOTS of peoples time caused by laziness and incompetence in IT departments. Logging and Multi Factor Authentication are the answer to this. You should be able to use whatever stupid/short/simple password you want to use because the thing you authenticating to requires multiple types of authentication that are convenient for the user. And failed login attempts are logged and responded to quickly and effectively. The people that spend their days implementing technology are the ones that should be required to implement effective security measures because they have and use the skills to do so -- presumably. 2nd vote for MFA to solve the issue So something like a yubi key? Or the standard text or phone authenticator app? |
|
Quoted: I work in IT, too. And I think this whole discussion is a waste of LOTS of peoples time caused by laziness and incompetence in IT departments. Logging and Multi Factor Authentication are the answer to this. You should be able to use whatever stupid/short/simple password you want to use because the thing you authenticating to requires multiple types of authentication that are convenient for the user. And failed login attempts are logged and responded to quickly and effectively. The people that spend their days implementing technology are the ones that should be required to implement effective security measures because they have and use the skills to do so -- presumably. View Quote Not giving out a unique code to some app on my phone either, fuck that also. When they start fucking paying me to use my personal data, I might participate... nah, fuck that too. |
|
Quoted: Trust me I know. We run brute force attacks on all admin accounts where I work. We have successfully cracked peoples passwords multiple times. It is funny because I helped our security officer set up the system and have looked at what some people use as passwords. We have also from time to time done password dumps where we can see people's password but not associated with user ID's. Some people use profanity and just in general really really poor passwords. View Quote IT Guy: "What's your password?" Me: "Take a step back, and fuck your own FACE!" IT Guy: "Nevermind..." |
|
Quoted: This checker allows you to see the strength against a supercomputer. https://www.grc.com/haystack.htm View Quote Just checked one of my passwords on that site. Have no IT knowledge at all. Seems like a pretty strong one by the results. Attached File |
|
Quoted: So something like a yubi key? Or the standard text or phone authenticator app? View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: I work in IT, too. And I think this whole discussion is a waste of LOTS of peoples time caused by laziness and incompetence in IT departments. Logging and Multi Factor Authentication are the answer to this. You should be able to use whatever stupid/short/simple password you want to use because the thing you authenticating to requires multiple types of authentication that are convenient for the user. And failed login attempts are logged and responded to quickly and effectively. The people that spend their days implementing technology are the ones that should be required to implement effective security measures because they have and use the skills to do so -- presumably. 2nd vote for MFA to solve the issue So something like a yubi key? Or the standard text or phone authenticator app? Yes. All of the above. For enterprises RSA tokens are a rather common implementation as well. |
|
Quoted: This checker allows you to see the strength against a supercomputer. https://www.grc.com/haystack.htm View Quote Not today glowie! |
|
Quoted: Yeah, not giving out my phone number to a bunch more sites. Fuck that. Not giving out a unique code to some app on my phone either, fuck that also. When they start fucking paying me to use my personal data, I might participate... nah, fuck that too. View Quote You may want to look into how things like Google Authenticator work before you rail about giving them personal data. |
|
We've been programmed to make passwords that are easy to crack but hard to remember. Made up words are best. Random are second. Milk. Hasbro. Goonies would take a billion years or the like at a 1 attempt per second or was it 3 seconds? program.
|
|
Quoted: ... and collects new passwords for dictionary attacks. Not today glowie! View Quote View All Quotes View All Quotes Quoted: Quoted: This checker allows you to see the strength against a supercomputer. https://www.grc.com/haystack.htm Not today glowie! Meh. I checked it out. If they collect passwords, congratulations to them. They now have my password to Netflix. |
|
You're much better off realizing that your passwords will almost never be cracked. But, your password will be breached at multiple companies that you do business with each year.
|
|
Also, MFA is good, but it's not the end all of security. MFA can and has been hacked numerous different ways.
SolarWinds breach used SAML tokens to bypass MFA. Get a free password manager. Create a very long, strong MASTER PASSWORD, such as "Pissing on an electric fence is stupid." Save every password you have in the manager over time. Then change them all to be random characters at least 24 characters long. You don't need to remember the passwords....just the master password. Don't bother changing them after that. Doesn't do any good anyway. |
|
You could combine a bunch of weak passwords. Like maybe I have used Cfd54mmd arrtrevu Iigstrdss. Maybe I have used them for years so I know them by heart. I want a strong password I combine them and I just write down the first letter of each of those. So maybe one site is “cal” and another “alc”, and I have entered those three passwords so many times I just need to remember the order.
|
|
1password literally changed my life. Do not resist a password manager - it's by far the best solution to passwords.
|
|
Yes.a but, NSA can crack it in 22 seconds, hackers using distributed bots would take 45 seconds. You need 2 or 3 factors for security.
AKA MFA for the MFW. |
|
Quoted: Don’t be a tit. Use a password manager. This is a far more extensible and useable solution than a list on an encrypted drive. Use Keepass and make it portable. View Quote This is the correct answer. If it makes you feel better put your keepass database on an encrypted drive. Also, yes passphrases are better than short "Complex" passwords. However, you are not as random as you think you are. https://www.wired.com/2014/08/passwords-microsoft/ |
|
There are two factors at work
First: The "search space" for each character. Did you use upper and lowercase, special characters and numbers. Second: The length of the password. The total possible combinations is basically the "search space" raised to the "length" power. Shorter passwords with large "search space" are usually harder to remember, sometimes already included in pre-calculated lists of password hashes, and just generally WORSE. "HorseBatteryBuggyStaple" is a much stronger password than "YT$%432123" Passwords that are re-used between sites/systems, or written down, are much bigger issue than someone "cracking" your password. |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.