<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>password testing &#8211; Scott Mcintyre</title>
	<atom:link href="https://scott.cm/tag/password-testing/feed/" rel="self" type="application/rss+xml" />
	<link>https://scott.cm</link>
	<description>Web Operations Engineer,  Linux Systems Administrator,  mySQL DBA,  MongoDB DBA,  Python+PHP Developer,  Performance Engineer</description>
	<lastBuildDate>Sun, 21 Mar 2010 04:38:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.2.3</generator>
	<item>
		<title>Password Security</title>
		<link>https://scott.cm/password-security/</link>
				<pubDate>Wed, 14 Jun 2006 09:54:43 +0000</pubDate>
		<dc:creator><![CDATA[Scott Mcintyre]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[/etc/shadow]]></category>
		<category><![CDATA[cracker password]]></category>
		<category><![CDATA[john the ripper]]></category>
		<category><![CDATA[linux password testing]]></category>
		<category><![CDATA[password crack]]></category>
		<category><![CDATA[password decrypt]]></category>
		<category><![CDATA[password multiple sites]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[password testing]]></category>
		<category><![CDATA[secure password]]></category>
		<category><![CDATA[secure passwords]]></category>
		<category><![CDATA[weak passwords]]></category>

		<guid isPermaLink="false">https://scott.cm/2006/06/14/password-security/</guid>
				<description><![CDATA[Basic Use of Passwords After all these years you would think basic password security would be drilled into everyone who uses the Internet, yet time and time again I always come across people who still have not learned the basics.  Really what is so hard about remembering a password that]]></description>
								<content:encoded><![CDATA[<p><strong>Basic Use of Passwords</strong></p>
<p>After all these years you would think basic password security would be drilled into everyone who uses the Internet, yet time and time again I always come across people who still have not learned the basics.  Really what is so hard about remembering a password that is not text only?  One simple `odd` character in the word would make it a reasonable secure password.  Yet people still do not get the message that adding just one character really makes a difference.</p>
<p>When I see people who get compromised due to passwords it just makes me cringe.  I have yet to understand why they do not learn until someone takes advantage of their weak password.  It happens so often now I even have an example ready now for weak passwords.</p>
<p>You can still have a secure password which is easy to remember, it does not have to be full of random characters, just one or two really does make a difference.</p>
<p>Take my name for example, Scott Mcintyre, that&#8217;s 13 characters long and easy to remember all you have to do now is throw a few odd characters in there such as,</p>
<p>Sc0tt`Mcintyr?e</p>
<p>Which is easy to remember, it includes capitals and has a number, and is more than 10 characters.</p>
<p><strong>Do you test you&#8217;re passwords?</strong></p>
<p>Now it brought me on to the fact that does anyone actually test their password against dictionaries?  Both users and system administrators should test them regularly and the reaction I get when I guess the passwords is quite strange as if it has never happened before.</p>
<p><em>System Administrators</em></p>
<p>I personally only work with *NIX and test passwords atleast once a week on every single server with user accounts I manage.  On one time work the successrate for more than 100 passwords is generally 1-10%, however today I did get a 58% success-rate which sparked this entry.</p>
<p>As a *NIX administrator I feel it&#8217;s my job to ensure peoples passwords are updated also, I often use tools like John The Ripper against the /etc/shadow file to acheive this.  You may view my guide <a href="http://www.hostgeekz.com/guides/Security/67/Password_Security.htm">/etc/shadow password testing</a> if you are unsure how to this.</p>
<p><em>End Users</em></p>
<p>End users should not have to test their passwords and should be using a password that gives them 100% reassurance.  Ultimately if you feel the need to check you&#8217;re password against dictionaries then you&#8217;re password is not good enough.</p>
<p><strong>Multiple Locations</strong></p>
<p>Do you use you&#8217;re password in multiple locations?  If so why? While it might be easy to remember it always leads to problems if by the off chance you&#8217;re password was ever compromised.  I feel this form of basic password security is the one that is the one that is not taken seriously the most.  I used to do it myself however have since realized it was bad just because of the number of people I have been bad things happen to.  There are methods of keeping you&#8217;re same password principal yet not using the same password. Take our above example,</p>
<p>Sc0tt`Mcintyr?e</p>
<p>You could change the position of the question mark for each different location, such as you&#8217;re instant messenger password could be S?c0tt`Mcintyre and you&#8217;re email could be Sc?0tt`Mcintyre, this is just different variations yet it keeps you&#8217;re password simple to remember.</p>
<p><strong>Changing passwords</strong></p>
<p>Do you change you&#8217;re password after a certain period?  This is generally a good idea if you use the same password in multiple locations.  Personally I do change my passwords around once every 3-4 months.  I do it so I can remember them easier, newer passwords will stay fresh in the mind whilst older passwords can be forgotten and confused with others.</p>
<p><strong>Conclusion</strong></p>
<p>As it seems I have joined the list of thousands, possible millions, of other articles/rants about password security but I think it has to be said that it&#8217;s quite shocking the number of people that totally ignore the basic concept.</p>
]]></content:encoded>
										</item>
	</channel>
</rss>
