*>> Do these calculations take into account any predicted future increase in
computing power? *

Or distributed computing of current computing power?

They never ever do.

* *

*ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Thu, Aug 11, 2011 at 11:36 AM, Ken Schaefer <k...@adopenstatic.com> wrote:

>  Is the maths behind this published?****
>
> ** **
>
> e.g. patterns in the alphabet or keyboard (asdf / abcd) should be tried
> first, vs otherwise random combinations. Additionally, if a brute force
> attacker started at a random point in the alphabet (e.g. starting at ‘x’)
> would the same prediction be true? Do these calculations take into account
> any predicted future increase in computing power? Personally, I think
> there’s too many assumptions in it.****
>
> ** **
>
> For better password security (with the overhead of management and
> repudiation), 2FA / 3FA is far more secure.****
>
> ** **
>
> Cheers****
>
> Ken****
>
> ** **
>
> ** **
>
> *From:* Maglinger, Paul [mailto:pmaglin...@scvl.com]
> *Sent:* Thursday, 11 August 2011 11:03 PM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Almost, but not quite OT: Passwords****
>
>  ** **
>
> Using XxXxXxXxXxXx on GRC:****
>
> ** **
>
> Time Required to Exhaustively Search this Password's Space:****
>
> Online Attack Scenario:
> (Assuming one thousand guesses per second)****
>
> 1.27 hundred million centuries****
>
> Offline Fast Attack Scenario:
> (Assuming one hundred billion guesses per second)****
>
> 1.27 centuries****
>
> Massive Cracking Array Scenario:
> (Assuming one hundred trillion guesses per second)****
>
> 1.52 months****
>
> ** **
>
> ** **
>
> *From:* Webster [mailto:webs...@carlwebster.com]
> *Sent:* Thursday, August 11, 2011 9:38 AM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Almost, but not quite OT: Passwords****
>
>  ** **
>
> Using the one from GRC:****
>
> ** **
>
> Time Required to Exhaustively Search this Password's Space:****
>
> Online Attack Scenario:
> (Assuming one thousand guesses per second)****
>
> 4.58 hundred trillion trillion trillion trillion trillion centuries****
>
> Offline Fast Attack Scenario:
> (Assuming one hundred billion guesses per second)****
>
> 4.58 million trillion trillion trillion trillion centuries****
>
> Massive Cracking Array Scenario:
> (Assuming one hundred trillion guesses per second)****
>
> 4.58 thousand trillion trillion trillion trillion centuries****
>
> ** **
>
> I like my password!****
>
> ** **
>
> ** **
>
> Carl Webster****
>
> Consultant and Citrix Technology Professional****
>
> http://www.CarlWebster.com <http://www.carlwebster.com/>****
>
> ** **
>
> ** **
>
> *From:* Sean Rector [mailto:sean.rec...@vaopera.org]
> *Sent:* Thursday, August 11, 2011 9:33 AM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Almost, but not quite OT: Passwords****
>
>  ** **
>
> One of mine gave back 5 septillion years. ;)****
>
> ** **
>
> Sean Rector, MCSE****
>
> ** **
>
> *From:* Steven M. Caesare [mailto:scaes...@caesare.com]
> *Sent:* Thursday, August 11, 2011 10:25 AM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Almost, but not quite OT: Passwords****
>
>  ** **
>
> It would take a desktop PC
> About 193 trillion years
> to hack your password****
>
> ** **
>
> I’ll take it.****
>
> ** **
>
> -sc****
>
> ** **
>
> *From:* Martin Blackstone [mailto:mblackst...@gmail.com]
> *Sent:* Thursday, August 11, 2011 10:20 AM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Almost, but not quite OT: Passwords****
>
>  ** **
>
> I got one year.****
>
> ** **
>
> *From:* Shauna Hensala [mailto:she...@msn.com]
> *Sent:* Thursday, August 11, 2011 7:16 AM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Almost, but not quite OT: Passwords****
>
>  ** **
>
> Have your users go here:  http://www.howsecureismypassword.net/
> and enter their password to see how long it would take to crack.  A fun
> little exercise.
>
> [image: Red rose]Shauna Hensala****
>  ------------------------------
>
> From: webs...@carlwebster.com
> To: ntsysadmin@lyris.sunbelt-software.com
> Subject: RE: Almost, but not quite OT: Passwords
> Date: Thu, 11 Aug 2011 13:43:08 +0000****
>
> I changed my bed linens at the beginning of each semester whether they
> needed changing or not. J****
>
>  ****
>
>  ****
>
> Carl Webster****
>
> Consultant and Citrix Technology Professional****
>
> http://www.CarlWebster.com <http://www.carlwebster.com/>****
>
>  ****
>
>  ****
>
> *From:* Crawford, Scott [mailto:crawfo...@evangel.edu]
> *Sent:* Thursday, August 11, 2011 8:32 AM
> *To:* NT System Admin Issues
> *Subject:* RE: Almost, but not quite OT: Passwords****
>
>  ****
>
> nice. ****
>
>  ****
>
> Reminds me of an old roommate, "I clean the shower every six months whether
> it needs it or not."****
>
> Sent from my Palm Pre on the Now Network from Sprint****
>
> ** **
>     ------------------------------
>
> On Aug 11, 2011 7:42 AM, Webster <webs...@carlwebster.com> wrote: ****
>
> I change my passwords religiously every 7 years.****
>
>  ****
>
> Carl Webster****
>
> Consultant and Citrix Technology Professional****
>
> http://www.CarlWebster.com <http://www.carlwebster.com/>****
>
>  ****
>
>  ****
>
> *From:* Gasper, Rick [mailto:rickgas...@kings.edu]
> *Subject:* RE: Almost, but not quite OT: Passwords****
>
>  ****
>
> Crap…I now have to change my password again…****
>
>  ****
>
> *From:* Jon Harris [mailto:jk.har...@gmail.com]
> *Subject:* Re: Almost, but not quite OT: Passwords****
>
>  ****
>
> If the in-house team ever got a round to it both could be kept happy but
> using something like "Horses like 2 fly, like bugs like to be stepped on!"
> Complex and easy to remember.  How long would that take for a brute force
> attack or a dictionary attack to get the password?****
>
>  ****
>
> FYI that is NOT one of my passwords!****
>
>  ****
>
> Jon****
>
> On Wed, Aug 10, 2011 at 6:10 PM, Webster <webs...@carlwebster.com> wrote:*
> ***
>
> Because the security team and or auditor are simply following a check
> list.  Complex passwords required – check.  My job is done.****
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to