Security Corner

May 27, 2013  1:57 PM

To change or not to change passwords, that is the question.

Ken Harthun Ken Harthun Profile: Ken Harthun

158376_linux_loginDo you change your passwords regularly? Do you as an administrator require users to change passwords? Does your company have a password policy that requires regular changes?

I recently entered into a discussion with my fellow network administrators about their having password change policies and realized that opinions vary greatly on the efficacy of the practice. We had a rather lively discussion and in the end we just agreed to disagree. I am interested in your views on this and would greatly appreciate your feedback in the comments. To get things started, here are my answers to the three questions above and my reasoning for those answers.

  1. I do not change my passwords on a regular basis because there is no need to. I use extremely strong passwords and store them in LastPass. My Yubikey gives me two-factor authentication for LastPass on non-trusted computers. The only time I have changed a password is when I have been forced to by some policy on the network, or in the case of unusual behavior that could indicate a potential compromise. I was recently notified that one of my email addresses was on a list of sites that had been breached, so I changed that account password immediately. So, the simple answer to this question is that I change my passwords only a reactive basis.
  2. On my network, I do not require users to change passwords. I emphasize to users that strong passwords are easy to create and remember and I help them do so. Forcing users to change them pretty much guarantees that they will choose something simple. A strong password is golden.
  3. Since I am the Network Administrator for my company, there is no policy forcing changing of passwords. And for my reasoning on this, I think it’s best communicated by saying I agree with this this article by Bruce Schneier.

What’s your take on the subject?

May 26, 2013  12:12 PM

Cipher challenge: Can you decrypt this?

Ken Harthun Ken Harthun Profile: Ken Harthun

encryptionTime for some crypto fun. If you have been following my posts, you know that I’m a crypto freak. I have loved codes and ciphers since grade school days (and that is quite a long time…). Surely, I was a secret agent or a cryptographer in another life; it’s simply fascinating to me. Anyway, the internet makes simple ciphers and cryptograms trivial to solve, but it still takes some ingenuity to figure out how the ciphertext was generated. So, here’s a challenge for you: Decrypt a simple sentence using any means at your disposal, including tools available on the internet.

It won’t be as easy as you might think. The sentence is very short, and does not contain the standard distribution of vowels and consonants, so you won’t figure it out that way. Moreover, the sentence contains every letter of the alphabet (hint, hint <wink>). And for those of you who think it’s going to be ROT-13, think again – it’s not. I have preserved the spaces to make your job slightly easier.  Here’s the sentence:


Have fun and post your solution in the comments.

May 26, 2013  2:05 AM

Security Now! Illustrated – Episode 17: PPTP and IPSEC VPN Technology

Ken Harthun Ken Harthun Profile: Ken Harthun

I simply love these Ask Mr. Wizard animations and illustrations of Steve Gibson’s Security Now! episodes. Here is the latest post, and it’s a good one. Note: There are several segments to this series and this video will refer you to them at the Ask Mr. Wizard site.

May 25, 2013  4:54 PM

Twitter now has two-factor authentication

Ken Harthun Ken Harthun Profile: Ken Harthun

twitter-bird-white-on-blueFrom SANS News Bites Vol. 15 No. 41:

Twitter has introduced two-factor authentication for account access.
Users who opt in to the feature provide Twitter with a mobile phone
number, and whenever they want to log in to their accounts, they will
be required to provide their regular passwords along with a verification
code which will be sent to the specified phone. The introduction of this
feature comes just weeks after several high-profile Twitter accounts
were compromised and misused.

It’s fairly straightforward to set this up on Twitter. Simply log into your account, go into settings, select Password and you’ll see this message at the top:


Click on the link and follow the instructions to set it up on your mobile phone. Once you do, there is a complete range of settings that allow you to customize text notifications. Do what you want with that. My main interest is in the two-factor authentication.

After you get the preliminaries completed, you’ll have to go into your Account menu and activate the option. Here’s what that looks like:


Once you do this, you should be good to go and Twitter will require a code every time you log in.

Sidenote: Twitter is now more secure than my bank which only asks for username and password. Go figure. But more on that in another post.

May 22, 2013  3:51 PM

DO NOT open these attachments!

Ken Harthun Ken Harthun Profile: Ken Harthun

dot_not_touchWe all know that Adobe PDF Reader and Acrobat are hopelessly insecure due to their ability to use embedded JavaScript in the PDF content. Despite an unending stream of updates to these applications, users still get infected. (In Adobe’s defense, a big part of this problem is clueless users who actually open unsolicited attachments; nevertheless, the security vulnerabilities shouldn’t exist in the first place.)

Data gathered by Microsoft’s antimalware products has identified a list of common infected PDF files and they are listed on the Microsoft MSDN blog. Here they are:

  • pdf_new[1].pdf
  • auhtjseubpazbo5[1].pdf
  • avjudtcobzimxnj2[1].pdf
  • pricelist[1].pdf
  • couple_saying_lucky[1].pdf
  • 5661f[1].pdf 7927
  • 9fbe0[1].pdf 7065
  • pdf_old[1].pdf

More information is available at the Microsoft Malware Protection Center.

April 30, 2013  8:40 PM

Humor: Best password security message ever!

Ken Harthun Ken Harthun Profile: Ken Harthun

mega-icon-smiley-thumbs-upThanks to for lightening my otherwise stressful day. What would you do if you saw this?

Height of security! This error message was generated when Windows 2000 users logged into an MIT Kerberos realm and got a shock of their lives on attempting to change their password. They were given a seemingly impossible task of setting a password with 18,770 characters that was different from the last 30,689 passwords. Thankfully, this uncommon error was fixed with the release of SP3 for Windows 2000.

April 30, 2013  4:40 PM

!!!!!!!!!! RED ALERT for YOUR COMPUTER – Not!

Ken Harthun Ken Harthun Profile: Ken Harthun

stressedI guess the goofiness runs in cycles or waves. Variations of this hard-drive-burning-most-destructive-virus-that-ever-existed hoax have been floating around in email since email went public. Makes me want to tear my hair out. This one was recently seen floating around on Facebook:


Please circulate this notice to your friends, family and contacts!

In the coming days, warning: do not open any message containing an attachment called Archive (Windows live) regardless of who sends you. This is a virus that burns the entire hard disk. This virus comes from a known person you have in your mailing list, which is why you should send this message to all your contacts. If you receive a message called "UPDATING WINDOWS LIVE", even if is sent by a friend, do not open it and stop immediately. This is the worst virus announced by CNN. It has been classified by Microsoft as the most destructive virus that ever existed. The virus was discovered yesterday afternoon by McAfee, and there is no chance of repair for this type of virus. Simply destroys Sector Zero of the hard disk. Just copy and paste..

C’mon, people! A simple check of would reveal any such virus hoax.

April 30, 2013  12:57 PM

Same password for every site. Will they ever learn?

Ken Harthun Ken Harthun Profile: Ken Harthun

question-markFrom Naked Security:

A study by Ofcom, the UK communications watchdog…, “Adults’ Media Use and Attitudes Report 2013″, [comprising] a poll of 1805 adults aged 16 and over discovered that 55% of them used the same password for most – if not all! – websites.

Unbelievable! Will they ever learn? It’s precisely this kind of thing that gives us Network Administrators nightmares, especially when these same people are given access to resources on our networks. Don’t they realize that if one site gets compromised, the hackers have access to all of them?

This is compounded by the types of passwords people tend use, i.e., easy-to-remember passwords such as birthdays, pet names, etc. The study found that 26% of the people polled do this.

If you are one of these people, or if you know someone who is, please see to it that the passwords get fixed as soon as possible.

April 29, 2013  7:49 PM

Log out and shut down!

Ken Harthun Ken Harthun Profile: Ken Harthun

Are you one of those people who leave their computers logged into everything all the time? If not, then good for you, but I bet you know someone who does. It’s a bad idea. Even if you run with a limited user account, you’re at risk. An XKCD cartoon does a fine job of illustrating.

xkcd-login-cartoonLog out of those sites and shut down your PC or laptop.

April 28, 2013  11:54 PM

“Memory Hard Problem” thwarts password cracking

Ken Harthun Ken Harthun Profile: Ken Harthun

In one of his famous “propeller head” episodes, Steve Gibson of Security Now! podcast fame describes an algorithm that thwarts even the most powerful super computers’ attempts at cracking passwords. Episode 388 [MP3] in January, 2013 describes an ingenious method of requiring huge amounts of memory for each hash function iteration, effectively crippling even the best tools that cyber-criminals can deploy.

The podcast is nicely summarized in this AskMisterWizard video:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: