IT Trenches:

Password

1

August 17, 2010  5:48 PM

8-character passwords are so 1999 – 12 characters is 21st century



Posted by: Troy Tate
access management, authentication, brute force, hacking, identity management, information security, infosec, infosecurity, Password, password management, secure access, Security

Today's computers and add-on processors (think graphics processing units - GPU's) are extremely powerful. The GPU of today offers about 2 teraflops (10^12 floating...

May 12, 2010  1:16 PM

A password reminder to carry with you



Posted by: Troy Tate
access management, identity management, information security, infosec, infosecurity, Password, password management, secure access, Security

Okay, passwords may have reached the end of their useful life, but passwords are not gone yet. I know it is a challenge to come up with a unique secure password for all identities that we use to access secured...


December 4, 2009  1:22 PM

Generating and tracking passwords: Put javascript to work for you



Posted by: Troy Tate
complex password, information security, Password, password security, password tool, strong password, tool, utility

I recently came across this interesting website that uses javascript and SHA-1 hashes to generate passwords. The thing to remember about this tool is that the generated passwords are just numbers and letters. There are no...


May 22, 2009  6:03 PM

Strong passwords? Try this test



Posted by: Troy Tate
authentication, complex password, information security, Password, password strength, Security, strong password, tool

Passwords are the bane of security but currently and historically the primary authentication method for users. Check out this article by Roger Grimes and see how your password policy stacks up using the Excel spreadsheet tool he provides for download. You can use the to convince management how weak...


February 11, 2009  8:08 PM

Tracking down that user/computer that locks AD accounts



Posted by: Troy Tate
account management, Active Directory, AD, administration, analysis, anti-virus, antivirus, Data security, diagnostics, howto, information security, malicious activity, malware, Microsoft, Microsoft Windows, network security, Password, password management, policy enforcement, reporting, risk, risks, scanning, search, Security, security notification, tools, troubleshooting, Windows

With an environment spanning 18+ sites and more than 3000 computers around the globe, you could understand how challenging it would be to track down what device/user might be locking user accounts. There are tools out there that you can pay for that can help do this. However, Microsoft has some...


January 21, 2009  4:36 PM

Security news – Videos from Hack In The Box 2008 Malaysia available for download



Posted by: Troy Tate
Apple, education, hacking, hardware, Microsoft, OSX, Password, Security, software, training, vulnerabilities, Windows


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: