From: Kenny McCormack on
In article <hvg758$hc5$1(a)speranza.aioe.org>,
jellybean stonerfish <stonerfish(a)geocities.com> wrote:
....
>He smiled when I created a password in front of him that will be
>impossible to forget, and the system he had told him it was 97%
>strength.

Obvious caveat on the word "impossible"...

But seriously, yes, if you only have one password to remember, then it
can't be as obscure and weird as you are capable of, and you will pretty
much have acheived the goal.

But this conflicts with the other edict, which says you should have
different passwords on different systems (and note that even without
that edict, most people who work in IT have two separate existences -
their "at work" personna and their "at home" personna, and you will
probably not want to use the same password across these two universes).

So, I agree with the previous poster, that the rule to break here is the
edict that says not to write it down. If you want to have strong,
distinct passwords across your many systems, then you got to write them
down - and the point of storing them with your credit cards is a good
one - right up until someone steals your wallet...

Finally, note that another way to solve this problem is to use one of
the available "Keychain" programs - where you put all your passwords
there, and then never have to worry/type them again. This to me seems
inherenly unsafe (do we really trust the writers of these keychain
programs?), but that is the solution that many shops adopt.

--
> No, I haven't, that's why I'm asking questions. If you won't help me,
> why don't you just go find your lost manhood elsewhere.

CLC in a nutshell.

From: Keith Keller on
On 2010-06-18, John Hasler <jhasler(a)newsguy.com> wrote:
>
> Right. So the thing for "normal users" to do is use a seperate strong
> password (i.e., one generated by software, not by them) for each
> seperate purpose and _write it down_. That's right, _write it down_ and
> keep the written record in a safe place such as in their wallets with
> their credit cards. The constant admonition to never write down a
> password is idiotic. It is primarily responsible for the very common
> practice of using a single easily-guessed password everywhere.

For people who carry such a device, use an application like GNU Keyring
for PalmOS (which I know is all but dead). You remember your Keyring
password, then store all your other passwords in a PGP-encrypted
database. The Keyring password is not crackable unless someone obtains
your device (or the file from your drive, if you sync with a desktop),
so it can be a simpler password.

I also use Keyring to generate passwords. It generates random
passwords; I am required to change some of my passwords every six
months. For passwords used frequently it takes me about a week to be
able to remember it without looking it up.

As I mentioned, PalmOS is basically dead. What are comparable apps for
iPhone or Android?

--keith


--
kkeller-usenet(a)wombat.san-francisco.ca.us
(try just my userid to email me)
AOLSFAQ=http://www.therockgarden.ca/aolsfaq.txt
see X- headers for PGP signature information

From: The Natural Philosopher on
John Hasler wrote:
> Kenny McCormack writes:
>> You and I might just be able to handle what you suggest above, but
>> normal users? No way.
>
> Right. So the thing for "normal users" to do is use a seperate strong
> password (i.e., one generated by software, not by them) for each
> seperate purpose and _write it down_. That's right, _write it down_ and
> keep the written record in a safe place such as in their wallets with
> their credit cards. The constant admonition to never write down a
> password is idiotic. It is primarily responsible for the very common
> practice of using a single easily-guessed password everywhere.

well we had a book of system passwords in the safe...issued on request
by the office manager on a per system basis, and ALWAYS changed at that
point, and the new one written down there and then.

however, there are many ways to have highly memorable passwords that are
as good as unguessable.

All tat is required is something you know really well, but no one else
is likely to. And write down the HINT.

So, lets say you had a mistress at 1032 French Boulevard..


1032.frog.bvd is pretty strong.

and the hint might be 'red hot'
From: John Hasler on
The Natural Philosopher writes:
> however, there are many ways to have highly memorable passwords that
> are as good as unguessable.

> All that is required is something you know really well, but no one
> else is likely to. And write down the HINT.

Yes, this works for you and I. Unfortunately, most people live very
boring, predictable lives and lack imagination or creativity. They
think that their pet's name spelled backward is terribly clever and
unguessable. His name is Spot and his picture (with name) is on their
desk.
--
John Hasler
jhasler(a)newsguy.com
Dancing Horse Hill
Elmwood, WI USA
From: Kenny McCormack on
In article <877hlwutaq.fsf(a)thumper.dhh.gt.org>,
John Hasler <jhasler(a)newsguy.com> wrote:
>Kenny McCormack writes:
>> ...and the point of storing them with your credit cards is a good one
>> - right up until someone steals your wallet...
>
>What are the chances that they will figure out what the passwords are
>for and use them before you discover that your wallet is missing and
>change them?

Ya know - I hoped that'd would be clear enough as I wrote it, but then
again, this is Usenet, where you have to make everything 100000% clear,
or someone will find a way to misinterpret.

Obviously, the guy who steals your wallet doesn't give a flip about your
passwords - he probably doesn't even care about your credit cards. He
just takes the cash and goes and buys drugs with it.

The point is that *you* are greatly inconvenienced by losing all your
passwords (since, by assumption, you haven't even tried to memorize them
- that was the whole point of keeping the slips of paper).

--
Just for a change of pace, this sig is *not* an obscure reference to
comp.lang.c...