Last Articles


Most popular password

Network Information Security: Myths and Realities Omnipotence hackers

Hackers and crackers, or what is good and what is bad?

Chronology of the ARPANET - INTERNET

Protection system in Windows - Fact or Fiction

The basic principles of security

Manager SAM and Active Directory

Administrative boundaries: the forest or domain?

Can you trust a domain that is connected to the Internet?

Идентификаторы защиты (SID)

Why can not I log in as an administrator from any location?

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Fake ARP-server on the Internet

False DNS-server on the Internet

Substitution of one of the subjects TCP-connections on the Internet

Malfunction host on the network

Mythical remote attacks on the Internet

Dedicated channel communication between objects distributed CS

Passwords - Protecting your computer system

  What Needs to be used in passwords these days, perhaps, explains to nobody needs, but with regard to their species and the rules of creation, here is austere some tribulation begins to attack and only! Here is a recent example from the life of the average user.

   Password (password, privacy lock) - used to restrict access to systems and computer resources, and in addition to the internal needs of the administrator: blocking the recording function on the drive, a ban on opening archives to prevent discharge or remove some programs to protect PCs, encryption of data, limiting actions of other users, etc.

  All passwords are different in their manner of presentation and implementation of 7 types:

   - User passwords, passwords that are set by the users themselves;

   - Generated passwords, ie, create the most system;

   - Access codes - to unpredictable (random) in its structure the keys generated by the system;

   - Complex passwords either, as they are called, "serious" work in cooperation with external electronic (mechanical) devices.

   - Passwords, hint - a picture of passwords that users create and reinforced by additional generating system in automatic mode.

  Example: hitrov/P02mTGga.

  Tip: The keys are option, users can create and own what is called a "manual" and, of course, not necessary to insert in his own data, as was done by me for example!

  •  Passwords, passphrases - consisting of citations or just any individual proposals within the meaning and content (of course, the lack of profanity). As their sub-species is not prohibited to allocate passwords, acronyms. The acronym for the base are taken in addition some excerpts, with the difference that the key to create only used all the first letters of words. Let's say: "We've seen a lot of roads in the world ..." the result will be the password "MMDPNS." It is worth mentioning as an additional combinations are not forbidden to use the last letters of the words and change the orientation of the reader is not left to right and from right to left side;
  •  Interactive passwords - represent a sequence of questions and answers. The main examples here are the questions: "maiden name of your mother?" "How to name your dog?" "What is your favorite dish?" Etc. Someday this picture keys acted as flawless, but on this day was to take their positions.

  Tip: when you register such a key, if the organization would try to push another word (phrase), not perfectly related to the subject matter, it will increase your chances of protection. Only by all means write down and save what you typed in a safe place!

   As there is no perfection in the world, so there is no perfection and in the midst of passwords, because extremely hope that you have sufficient wisdom to understand the simple axiom that all passwords (keys) are allowed to evaluate, unfortunately, only as a quasi-safe and no more than that. Based on what I said above, I offer you some pretty effective "means of care" for the computer system and personal data:

  ! Under no circumstances should you use when constructing their own passwords (and improper) the names, initials, year of birth. With this approach, your armor will not cost a penny, and;

  ! As a password under any circumstances, do not specify the name of your pet, eliminate, whatever that may be geographical names or scope of your hobbies, it's all calculated quite easily, if not utter, it is elementary;

  ! Store your passwords (keys) and access codes in two copies in the event of loss of one of the copies;

  ! Under no circumstances and no one to transmit data over access to your resources;

  ! To create a password using at least seven alphanumeric characters arranged alternately and executed in a different register;

! Use only licensed software, password generators (not to be confused with hacking tools «Keygen »!!). One of these programs «SCARABAY» you can download immediately, the site of the author of this material;

  ! Certainly by the time specified period of time systematically replace existing passwords with new ones. Resource-related rather big risk, such a procedure is done once a month and sometimes more often;

  ! Do not use only the same password for different logins the network;

  ! God forbid you to save passwords, keys and access codes on a computer in the form of text documents (txt). A good solution would be external media (flash cards, USB-key chains, CDs, paper, in the end);

  ! When you work with keys and store them on your computer, use only password manager with a secure entrance, so a worthy example is again the same «SCARABAY» (this is its main purpose), he uses in his work data encryption.

  ! Neither in life, do not use copy and paste (copy / paste) when you enter passwords, remember that entered this way the keys are in your computer's clipboard, do not want to take.

Top 5 most read

The basic rules of safe behavior on the Internet

Manager SAM and Active Directory

You forget your password. What should I do? Part 3

Идентификаторы защиты (SID)

Social engineering as a way of committing crimes in the sphere of computer information

Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта