That's actually the article I read that kicked off my e-mail to you guys, LOL.
-----Original Message----- From: Angus Scott-Fleming [mailto:[email protected]] Sent: Thursday, January 31, 2013 7:36 PM To: NT System Admin Issues Subject: Re: Password complexity question On 31 Jan 2013 at 14:16, David Lum wrote: > > I have seen a few articles on password cracking and using unrelated words, > so I have a question Given the "Making complex passwords" section here: > http://www.digitaltrends.com/mobile/crack-this-how-to-pick-strong-password > s-and-keep-them -that-way/ Could you use a fairly simple method to > identify what the password is for and still have it tough to crack? I'm > guessing no, but have to ask For a twitter account: Twitter1 vodka eagles! > Then for a Facebook account:Facebook2 vodka eagles! Ebay: Ebay3 vodka > eagles! Then follow that same pattern for the various accounts. While it > seems like bad practice to include the service name as part of the > password I thought I'd ask your guys' opinion. It's at least better than > using the same password for everything...or is it? It is. But I would recommend using a password manager like LastPass or KeePass with one very strong password to access it rather than worry about individual passwords and patterns. FWIW, I came across this earlier today: More interesting news: passPHRASES aren't more secure, since the dictionary attacks now use them as well. Grammar badness makes cracking harder the long password | Ars Technica When it comes to long phrases used to defeat recent advances in password cracking, bigger isn't necessarily better, particularly when the phrases adhere to grammatical rules. ... A team of Ph.D. and grad students at Carnegie Mellon University and the Massachusetts Institute of Technology have developed an algorithm that targets passcodes with a minimum number of 16 characters and built it into the freely available John the Ripper cracking program. The result: it was much more efficient at cracking passphrases such as "abiggerbetter password" or "thecommunistfairy" because they followed commonly used grammatical rules-in this case, ordering parts of speech in the sequence "determiner, adjective, noun." When tested against 1,434 passwords containing 16 or more characters, the grammar-aware cracker surpassed other state-of-the-art password crackers when the passcodes had grammatical structures, with 10 percent of the dataset cracked exclusively by the team“s algorithm. See: http://arstechnica.com/security/2013/01/grammar-badness-makes-cracking-harder-the-long-password/ One thing I do to mitigate dictionary attacks: m11spelll wuurds wh33n EEYYEE yuuse tthheemm iiNn P@@ssww00rdd5z....not sure how long the black hats will take to add stuff like this ;-) but it's just an arms race. -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
