|
|
|
Advantages of Buying Used Servers
Are you or your company in need of another server, but the cost is too high? Do you feel like you are paying a large sum of money for a new system and you aren’t getting the configuration that you were hoping for because it is too costly? Are you...
Find the Host With the Most
Find the Host With the Most No one can deny that the quality and reliability of your Web presence can make or break your business. The average attention span of a Web surfer is a mere 20 seconds, and your competition is always just a click away if...
Ultimate Checklist On How To Revive A Dead Computer
Its not something we like to think about but your computer will fail, if you keep it long enough.It may be a simple problem,such as the floppy drive not reading the disk to a major system crash. Because computers are run by operators,User Error is...
What Is Computer Programming Anyway?
Computer programming in plain language, is giving instructions to a computer to do something. Technically it is actually giving instructions to the microprocessor - the brain of a computer. If the instructions are only for the microprocessor,...
What to look for in an assembled PC
Not too well versed with the hardware jargon but need a computer? For starters, read Ask these 3 questions before you buy a computer. Once you are sure what you need one for, get cracking. Here is a basic guide to get you started. Do note: while...
|
|
| |
|
|
|
|
|
|
Passwords or Pass Phrase? Protecting your Intellectual Property
Passwords or Pass Phrase? Protecting your Intellectual Property
Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. A new theory on passwords is emerging that may help us remember our access codes, be more secure, and generally keep hackers and thieves out of our networks.
A password is a combination of words, letters, and special characters that only the user knows, allowing access to a computer or other information resources. As humans we have a large number of codes and numbers we need to remember every day – such as the key lock on our apartment entries, national identification numbers, automobile license or tag numbers, telephone numbers – it is a large and confusing suite of items we need to memorize.
When selecting a new password or pass code for access to a computer system, most of us understand how difficult it is to remember complex codes, and thus we select something already know n to us, such as names, birthdays, national identifiers, or other known items, and then place a number or character in front of the name or number thinking it is secure. This is easy to understand, as most of us simply do not have an ability to instantly recall large numbers of complex codes.
In a worst case we simply write down the complex code on a piece of paper, and leave it in a desk, our pocketbook, or in many cases taped to the front of our computer monitor.
However, to a hacker this makes access to your network or computer much easier, at they generally only have to learn a couple things about you, and add a few numbers to the front or ending of your personal data – you would be surprised how often this grants access to computers and networks. Ad some good “cracking utilities” to the
hacker’s suite of tools, and you can understand the threat.
PassPhrases are a concept that will help us create more secure, easy to remember safeguards for our computer and network resource protection. A passphrase is a selection of words and/or numbers that are 15 characters or more in length, and are easy for us to remember. A couple examples of a good pass phrases are:
•igotodalaieejdaily •shehasbeautifulhair •surfinginhawaiiisgreat
According to Mark Minasi, a noted security consultant, a 15 character pass phrase will require a cracking program the following number of computations to try and break a 15 character pass phrase:
•15 lowercase letters = 1,677,259,342,285,725,925,376 possibilities •Try a million a second, it’ll take 531,855 centuries/years to break the code
As you can see, this is a pretty good level of security for your resource.
Another concern with passwords is if you forget or lose the password, and are using a utility like Microsoft’s Encrypting File System (EFS), you run the risk of losing all access to your important files if you require a hardware reset of your password. All EFS encrypted files are linked to your login profile, meaning if you encrypt a directory or file with EFS, and you do a hardware reset on your computer, those files and directories are lost FOREVER.
For Microsoft Windows users you can now also use spaces within your pass phrase, however we would not recommend embedding spaces in your pass phrase, as that actually does allow a cracker better access to getting your code – it may help them crack it in 100,000 years rather than 250,000!
About the Author
(About the Author – John Savageau is a managing director at CRG-West, responsible for managing operations and architecture for several of the largest telecommunications interconnect facilities in the US, including One Wilshire in Los Angeles savageau@pacific-tier.com/www.pacific-tier.com)
|
|
|
|
|
| Tom's Hardware |
| : Tom's Hardware Guide is the Internet's premiere resource for hardware news and reviews. |
| www.tomshardware.com |
  |
| HardwareCentral - Your source for in-depth computer hardware info. |
| HardwareCentral is the #1 Hardware Information Resource on the 'Net. Featuring over 600 pages of Hardware information, including advice on System ... |
| www.hardwarecentral.com |
  |
| Apple - Hardware |
| Find your favorite Mac, iPod and other Apple accessories. |
| www.apple.com |
  |
| Ace Hardware |
| Nationwide (United States) hardware and home improvement retailer. Includes products, dealer locator and corporate information. |
| www.acehardware.com |
  |
| Computer hardware - Wikipedia, the free encyclopedia |
| The hardware of a computer is infrequently changed, in comparison with software and ... Personal computers, the computer hardware familiar to most people, ... |
| en.wikipedia.org |
  |
| Hardware - Wikipedia, the free encyclopedia |
| Hardware is the general term that is used to describe physical artifacts of a technology. ... In a looser sense, hardware can be major military equipment, ... |
| en.wikipedia.org |
  |
| Open Directory - Computers: Hardware |
| Hardware Central - Computing-centric community providing vital information, support, tools and interaction facilities for power computer users and ... |
| dmoz.org |
  |
| Microsoft Hardware – Home Page |
| Learn about Microsoft mice, keyboards, desktop sets, webcams, media center peripherals, gaming products, fingerprint readers and presentation tools. |
| www.microsoft.com |
  |
| AnandTech: your source for hardware analysis and news |
| Independent hands-on reviews of computer hardware such as motherboards, graphic cards, and CPUs. |
| www.anandtech.com |
  |
| hardware.com - Routers, switches, firewalls, servers, memory ... |
| Supplier of new and refurbished networking hardware and approved and compatible network accessories. Located in the United Kingdom. |
| www.hardware.com |
  |
| Slashdot: News for nerds, stuff that matters |
| From the article: "Although the news caused barely a ripple of reaction in the audience of software and hardware engineers, there are industry analysts who ... |
| hardware.slashdot.org |
  |
| InformationWeek HardwareTech Center |
| Our hardware coverage ranges from mobile computers and PDAs to servers and supercomputers, and the infrastructure issues enterprises deal with every day. ... |
| www.informationweek.com |
  |
| What is hardware? - A Word Definition From the Webopedia Computer ... |
| This page describes the term hardware and lists other pages on the Web where you can find additional information. |
| www.webopedia.com |
  |
| Google Directory - Computers > Hardware |
| Hardware Central - http://www.hardwarecentral.com/ Computing-centric community providing vital information, support, tools and interaction facilities for ... |
| www.google.com |
  |
| Gifts: Unique Gifts & Gift Ideas at Restoration Hardware |
| At Restoration Hardware, you'll explore an exceptional world of high quality unique gifts. Browse our products to find gift ideas & more at Restoration ... |
| www.restorationhardware.com |
  |
| HwB: The Hardware Book |
| HwB provides you with circuits, pinouts, cable/adapter descriptions and other technical information. |
| www.hardwarebook.net |
  |
| Reg Hardware: Product News and Gadget Reviews from The Register |
| More Gadgets Stuff. 5th December 2006 12:09 GMT. Author: Reg Hardware ... 27th November 2006 15:31 GMT. Author: The Hardware Widow ... |
| www.reghardware.co.uk |
  |
| red hat hardware compatibility lists |
| hardware.redhat.com/ - Similar pages |
|
  |
| TrueValue.com |
| Here's our tip to hang strands of lights with ease. Jeanenne & Jim Tucker Plantation True Value Hardware Richmond, TX ... |
| www.truevalue.com |
  |
| A complete illustrated Guide to the PC Hardware |
| A complete illustrated Guide to the PC Hardware, Logic and Architecture. 500 easy-read articles about the modern PC. Understand the basic architecture of ... |
| www.karbosguide.com |
  |
|