All items...           Popular tags: Linux (7), Hack (6), DIY (3), Debian (3), Other (3), Retrocomputing (3), Electronics (2), Database (1)


Listing contents with tag Security:

Weak passwords and weak resources

2017-03-14 20:04:31,  In: Security, Other

In the last few years, questions about password complexity emerged from time to time. There are list of common passwords, they are counted in leaked daabases, in hashed and unhashed forms. Blog entries are usually alarming about the poor complexity and length of passwords. Recently, a Password rules are bullshit post on Coding Horror blog shows how password rules are bad idea. However, they seem to be insecure in totally ignored mechanism having nothing to do with their length.

To illustrate this problem, let me tell a story about graphics card drivers. In 1997, to download a new driver to my video card, I could do the following thing:
1. Go to my card manufacturer's website
2. Click Support, then Downloads
3. Connect to FTP in "pub/drivers" directory, or select board from the list
4. Download driver for my OS. Mission accomplished, driver in my disk.

20 years later:
1. Go to my...

... Read More



Older posts...       Main page       Newer posts...