Beefy Boxes and Bandwidth Generously Provided by pair Networks
good chemistry is complicated,
and a little bit messy -LW

Re^2: Password Generation and Module Multiplication

by ysth (Canon)
on Nov 28, 2010 at 08:11 UTC ( #874083=note: print w/ replies, xml ) Need Help??

in reply to Re: Password Generation and Module Multiplication
in thread Password Generation and Module Multiplication

Brute force attacks against a single password, granted.

But without complexity rules, a letter-only brute force attack or rainbow table attack against a list of hashed passwords will too easily pick off the lazy users. I'd assume the complexity rules are really designed to protect against this case.

A math joke: r = | |csc(θ)|+|sec(θ)|-||csc(θ)|-|sec(θ)|| |
Online Fortune Cookie Search
Office Space merchandise

Comment on Re^2: Password Generation and Module Multiplication
Replies are listed 'Best First'.
Re^3: Password Generation and Module Multiplication
by sundialsvc4 (Abbot) on Nov 29, 2010 at 13:42 UTC

    That, basically, is the case.   The number-one most often used password is:   password.   Close behind them are:   enter, secret.

    Nevertheless, it doesn’t work.   Enforcing complex password-rules simply causes more passwords to be written down.   When a system is broken into, it usually is not from “forcing” a password.   There are too many “other” ways into a complex system.

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://874083]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others making s'mores by the fire in the courtyard of the Monastery: (5)
As of 2015-07-28 03:38 GMT
Find Nodes?
    Voting Booth?

    The top three priorities of my open tasks are (in descending order of likelihood to be worked on) ...

    Results (252 votes), past polls