Beyond way OT
bobkoure wrote:
> I remember when Clipper was introduced. Lots of folks were exercised
> about it (I was working in Cambridge at the time - RMS was making a
> really big deal about it). And then it just, basically... disappeared.
> I hadn't realized that it was withdrawn because
pfarrell;297898 Wrote:
> This is actually a better example, assuming you are not internationally
> known as an expert on dickens.
Well, if I was, I'd pick a line from Hemingway - assuming that I could
find a line with more than nine words in it :-)
I remember when Clipper was introduced. Lots of
https://www.grc.com/passwords.htm
/DVB
--
DVB
DVB's Profile: http://forums.slimdevices.com/member.php?userid=13707
View this thread: http://forums.slimdevices.com/showthread.php?t=46953
__
bobkoure wrote:
> But it's nice to be able to come up with a password that can both be
> remembered (there are a lot of passwords on post-its) and that is at
> least not totally susceptible to dictionary attack.
post-it-notes is the death of security.
> iwtbotiwtwot (Dickens).
This is actually a
pfarrell;297861 Wrote:
> >
> Protecting your music library does not require serious security.
>
Indeed.
But it's nice to be able to come up with a password that can both be
remembered (there are a lot of passwords on post-its) and that is at
least not totally susceptible to dictionary attack.
I'
> For what it's worth; I use a similar manual system; which creates a
> strong password which are very easy to remember. (ie password
> containing a mix of upper case letters, lower case letters and
> numbers.)
> You have two cats called Tiddles and Cuddles which were born in 2002
> = TidCud02
St
there's www.goodpassword.com
For what it's worth; I use a similar manual system; which creates a
strong password which are very easy to remember. (ie password
containing a mix of upper case letters, lower case letters and
numbers.)
Think of a phrase which is personal to you and shrink it into a
There at least used to be a web site that would generate passwords that
were "strong" but were at the same time at least somewhat memorizable.
I've lost it. Anyone remember it (and care to share)?
--
bobkoure
bobkoure's Pr
Pat Farrell wrote:
> The problem is always social engineering, humans simply can't remember
> strong random things. We have not evolved to do so. So we either use
> something not random, like the phrase about Transporters in my posting
> up thread, or we write it down on yellow sticky pads and p
Mnyb wrote:
> Interesting responses, some of you must be in to encryption and such ?
> this has gone very off topic but interesting.
Yes, way OT.
> On the same tangent, the SBC has a limited charset, so all phassprases
> are not possible to type with the controller, the same applies to the
> SB
Interesting responses, some of you must be in to encryption and such ?
this has gone very off topic but interesting.
On the same tangent, the SBC has a limited charset, so all phassprases
are not possible to type with the controller, the same applies to the
SB
I see that tomato has got to 1.19 i
All very truebut I don't see anything suggesting a particularly good
KPT attack on RC4. There's one paper I read suggesting a way to reduce
the search space a little, but TKIP solves the major problem with WEP.
> If you look at the serious research, you find that even folks using what
>
> th
radish wrote:
> How does the amount of entropy affect the crack time for brute force,
> provided there's a trivial amount so the key isn't in a dictionary?
This is getting OT, and complicated.
First, it depends on the cipher and the amount of ciphertext you have
access to. With WiFi, its easy to
pfarrell;297026 Wrote:
>
> This is much too strong of a statement without some qualifications.
> WPA with AES-CCMP is strong, WPA with RC4 is substantially weaker, and
>
> is used in many (most?) places.
>
True, but I haven't found any evidence for a better attack than brute
force. Provided yo
radish wrote:
> 2. Break the WPA encryption
>[snip]
> decent password is basically impossible unless (and possibly even if)
> you're the NSA.
This is much too strong of a statement without some qualifications.
WPA with AES-CCMP is strong, WPA with RC4 is substantially weaker, and
is used in man
My SBC works fine with SSID broadcast turned off. There were some
problems very early on in the
beta test but it has been fine for several months.
I have a similar setup to yours (WRT54GL, Tomato 1.19), but I don't
have any encryption turned on.
--
jth
-
Nonetheless I agree that it is a bug if the SBC cannot handle hidden
SSID, so if it is not working a bug report should be filed (if one does
not already exist). Of course it might not get very high priority.
--
bhaagensen
So to get into your network you would have to do the following:
1. Find the network (given that SSID beacon is off)
2. Break the WPA encryption
3. Grab a valid MAC to associate with the AP
4. Select an unused IP (no spoofing required)
Of these, all are trivially easy to do except step 2, which g
Well I can see that MAC filtering can be cracked.
Does it not do any good as my filtered devices SB SBR and SBC are on
the net all the time.
and the only Mac's the router lets through is these 3 adresses.
So any hack has to compete with these for bandwith.
The Mac filterings works without any pr
SuperQ wrote:
> Hide SSID is a non-security feature. It's useless and just invites more
> haxx0rs to try and get into your network.
>
> WPA2-AES is reasonably secure as long as your key is moderately
> complex.
>
MAC filtering is useless too and only complicates things.
WPA2 has not been crack
Hide SSID is a non-security feature. It's useless and just invites more
haxx0rs to try and get into your network.
WPA2-AES is reasonably secure as long as your key is moderately
complex.
--
SuperQ
SuperQ's Profile: http:
21 matches
Mail list logo