|
With all due respect to those who have offered there suggestions on generating passwords, I think we need to reconsider the scenario of the original request. The original request was that new users be given a password, that would be changed by them to whatever they want the first time they sign in. This is where the real problem lies. No matter how sophisticated or randomised the password, it will be useful for about 30 seconds. After that, the user will put in the wife's name or the dog or (heaven forbid) 'password'. So while we can come up with all sorts of wonderful formulas, if, in the end, the user is choosing their own password, it will all be for naught. And even if we assign passwords, please remember the most common method of password hacking in companies. It is that the hacker simply rings up and asks IT for the password, or for IT to reset it to 'password' so he/she can start again. "Hi, I'm Fred from manufacturing. I've forgotten my password. Can you tell me what it is?". Not exactly high tech! It doesn't matter how sophisticated you make the password, if you simply tell it to the hacker over the phone, you've achieved nothing. The closest anyone has got to recognising this fact is the suggestion to use the Mother's maiden name as the reset password. A good start, but not foolproof, of course. Any smart hacker can get your mother's maiden name quite quickly. "Hello, I'm from Visa. We have a problem with your credit Card. Can you confirm your identity by giving us your mother's maiden name?" If the aim is to keep unauthorised users out, and surely that's the point of passwords in the first place, the best method of defense is administrative, not technical. It is in controlling the distribution of passwords, the choices users have in creating their own vs taking one from IT, and the processes we use to replace lost passwords. All else is secondary, no matter how sophisticated. ##################################################################################### Attention: The information contained in this message and or attachments is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited. Opinions expressed in this email and any attachment are those of the sender and not necessarily the opinions of DENSO. If you received this in error, please contact the sender and delete the material from any system and destroy any copies. The DENSO Australia Group of companies does not represent, warrant or guarantee that the integrity of this communication has been maintained nor that the communication is free of errors, virus or interference. ######################################################################################
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.