I keep a few important but seldom used passwords, account numbers, PINs etc. in 
my wallet, but they are unlabeled and somewhat obfuscated using a simple code I 
made up as well as inserting extra characters.  Seems a little weird to do when 
I write it out like that.

-----Original Message-----
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Sent: Friday, March 16, 2012 12:56 PM
To: NT System Admin Issues
Subject: Re: Worth some consideration...

Nothing is without risk I'm in favor of keeping passwords on a piece of paper, 
or even better, an electronic equivalent such as password safe or keepass.

Given the number of passwords folks have to use (or at least should use - using 
the same password for multiple accounts is of course a sin), even the best of 
us require help with remembering them - the problem then becomes how best to do 
it.

Better the piece of paper in your wallet/purse than the piece of paper 
unattended somewhere near your computer.

Kurt

On Thu, Mar 15, 2012 at 21:49, Mathew Shember <mathew.shem...@synopsys.com> 
wrote:
>
> But if they have to keep pulling out the note to enter the password; 
> doesn’t that increase the chances of “over the shoulder” password learning?
>
>
>
>
>
>
>
> From: Kurt Buff [mailto:kurt.b...@gmail.com]
> Sent: Thursday, March 15, 2012 9:13 PM
>
>
> To: NT System Admin Issues
> Subject: Re: Worth some consideration..
>
>
>
> Don't be obtuse. I made no recommendation with my statement.
>
> If you're looking for options, I recommend fully formed but easy to 
> type sentences of at least 20 characters. If they must be written 
> down, advise your clients to keep them in their wallets.
>
> Kurt
>
> On Thu, Mar 15, 2012 at 16:51, Mack Bolan <mack.bola...@gmail.com> wrote:
>
> So that makes sticky notes ok?
>
> Mack S. Bolan
>
>
> On Thu, Mar 15, 2012 at 5:43 PM, Kurt Buff <kurt.b...@gmail.com> wrote:
>
> Perhaps you might want to rethink your threat model:
>
> http://www.darkreading.com/database-security/167901020/security/attack
> s-breaches/232601717/new-verizon-breach-data-shows-outside-threat-domi
> nated-2011.html
>
> On Thu, Mar 15, 2012 at 13:50, Doug Hampshire <dhampsh...@gmail.com>
> wrote:
>
> Are you sure about that? The vast majority of security incidents 
> happen on the inside of your network from known individuals. Also it 
> was addressing offline brute force attacks. Most online systems have 
> lockout policies and other countermeasures to limit exposure to brute force 
> attacks.
>
>
>
> On Thu, Mar 15, 2012 at 2:49 PM, Crawford, Scott 
> <crawfo...@evangel.edu>
> wrote:
>
> I'd rather have "good" passwords written down on a sticky note 
> accessible only to a limited number of coworkers than "bad" passwords 
> that can be exploited by any black-hat on the internet.
>
> Sent from my Windows Phone
>
> ________________________________
>
> From: Heaton, Joseph@DFG
> Sent: 3/15/2012 11:07 AM
> To: NT System Admin Issues
> Subject: RE: Worth some consideration...
>
>
>
> Wait… I’m NOT supposed to write my password on a sticky note?  How am 
> I supposed to let my coworker use my login, then?
>
>
>
> Joe Heaton
>
> ITB – Windows Server Support
>
>
>
> From: Andrew S. Baker [mailto:asbz...@gmail.com]
> Sent: Thursday, March 15, 2012 7:49 AM
> To: Heaton, Joseph@DFG; NT System Admin Issues
> Subject: Re: Worth some consideration...
>
>
>
> That's an implementation problem.
>
>
>
> If I choose a passphrase of "Mary had a little lamb" then of course 
> that will be relatively weak as passphrases go.  That that is not an 
> inherent weakness of passphrases, but of people.
>
>
>
> Lots of things are undermined by poor choices.   Completely random 20 
> character passwords with a unicode character set are undermined by 
> having them posted on sticky notes.
>
>
>
> We didn't need a whole article to point that out.
>
>
>
> ASB
>
> http://XeeMe.com/AndrewBaker
>
> Harnessing the Advantages of Technology for the SMB market…
>
>
>
> On Thu, Mar 15, 2012 at 10:12 AM, Kurt Buff <kurt.b...@gmail.com> wrote:
>
>
> http://arstechnica.com/business/news/2012/03/passphrases-only-marginal
> ly-more-secure-than-passwords-because-of-poor-choices.ars
>
> By Dan Goodin
> Ars Technica
> March 14, 2012
>
> Passwords that contain multiple words aren't as resistant as some 
> researchers expected to certain types of cracking attacks, mainly 
> because users frequently pick phrases that occur regularly in everyday 
> speech, a recently published paper concludes.
>
> Security managers have long regarded passphrases as an 
> easy-to-remember way to pack dozens of characters into the string that 
> must be entered to access online accounts or to unlock private 
> encryption keys. The more characters, the thinking goes, the harder it 
> is for attackers to guess or otherwise crack the code, since there are 
> orders of magnitude more possible combinations.
>
> But a pair of computer scientists from Cambridge University has found 
> that a significant percentage of passphrases used in a real-world 
> scenario were easy to guess. Using a dictionary containing 20,656 
> phrases of movie titles, sports team names, and other proper nouns, 
> they were able to find about 8,000 passphrases chosen by users of 
> Amazon's now-defunct PayPhrase system. That's an estimated 1.13 
> percent of the available accounts. The promise of passphrases'
> increased entropy, it seems, was undone by many users' tendency to 
> pick phrases that are staples of the everyday lexicon.
>
> "Our results suggest that users aren't able to choose phrases made of 
> completely random words, but are influenced by the probability of a 
> phrase occurring in natural language," researchers Joseph Bonneau and 
> Ekaterina Shutova wrote in the paper (PDF), which is titled 
> "Linguistic properties of multi-word passphrases." "Examining the 
> surprisingly weak distribution of phrases in natural language, we can 
> conclude that even 4-word phrases probably provide less than 30 bits 
> of security which is insufficient against offline attack," the paper 
> says.
>
> [...]
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to