Beefy Boxes and Bandwidth Generously Provided by pair Networks
Do you know where your variables are?
 
PerlMonks  

Re^2: Password Generation and Module Multiplication

by ysth (Canon)
on Nov 28, 2010 at 08:11 UTC ( #874083=note: print w/ replies, xml ) Need Help??


in reply to Re: Password Generation and Module Multiplication
in thread Password Generation and Module Multiplication

Brute force attacks against a single password, granted.

But without complexity rules, a letter-only brute force attack or rainbow table attack against a list of hashed passwords will too easily pick off the lazy users. I'd assume the complexity rules are really designed to protect against this case.

--
A math joke: r = | |csc(θ)|+|sec(θ)|-||csc(θ)|-|sec(θ)|| |
Online Fortune Cookie Search
Office Space merchandise


Comment on Re^2: Password Generation and Module Multiplication
Re^3: Password Generation and Module Multiplication
by sundialsvc4 (Abbot) on Nov 29, 2010 at 13:42 UTC

    That, basically, is the case.   The number-one most often used password is:   password.   Close behind them are:   enter, secret.

    Nevertheless, it doesn’t work.   Enforcing complex password-rules simply causes more passwords to be written down.   When a system is broken into, it usually is not from “forcing” a password.   There are too many “other” ways into a complex system.

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://874083]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others imbibing at the Monastery: (16)
As of 2014-12-18 15:26 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    Is guessing a good strategy for surviving in the IT business?





    Results (57 votes), past polls