Pathetic passwords

Harrison, Ann
February 1998
Software Magazine;Feb98, Vol. 18 Issue 3, p18
Trade Publication
No abstract available.


Related Articles

  • Password hardening based on keystroke dynamics. Monrose, Fabian; Reiter, Michael K.; Wetzel, Susanne // International Journal of Information Security;2002, Vol. 1 Issue 2, p69 

    We present a novel approach to improving the security of passwords. In our approach, the legitimate user's typing patterns (e.g., durations of keystrokes and latencies between keystrokes) are combined with the user's password to generate a hardened password that is convincingly more secure than...

  • 'Password' is a bad password.  // Office Professional;Jun2011, Vol. 31 Issue 6, p5 

    The article offers tips on how improve password to prevent hackers from getting into user's email.

  • How Secure Is Your Password?  // Journal of Financial Planning;Apr2013, Vol. 26 Issue 4, p10 

    The article briefly discusses a study by accounting firm Deloitte that determined people often use relatively simple, and hence vulnerable, passwords for their various online and at-work accounts, and presents advice to corporate information-technology professionals on improving password security.

  • Power passwords. G. M. // Entrepreneur;Mar2011, Vol. 39 Issue 3, p61 

    The article presents advise on how to create easily-remembered passwords that are not easily hacked, which includes integrating numbers and symbols into the password and utilizing a variety of base passwords for different areas.

  • Sports fever could help crooks crack computers.  // Long Island Business News (7/1993 to 5/2009);02/16/98, Vol. 45 Issue 7, p44 

    Looks into how errors in the use of access passwords can cause breach in computer security. Common terms used as passwords; Factors which contribute to the vulnerability of passwords; Resources available to computer hackers in accessing computer files.

  • ASK JAMES. Hunt, James // Micro Mart;11/28/2013, Issue 1288, p94 

    The article provides an answer to a question about a procedure for recovering lost router passwords.

  • How to protect online passwords.  // Administrative Professional Today;Nov2013, Vol. 39 Issue 11, p4 

    The article offers guidelines on how to protect online passwords, adapted from the article "Is Your Password Really Protecting You?," by Denise Lu.

  • Cracking Passwords? Child's Play. Valcke, Jan // SC Magazine: For IT Security Professionals (15476693);May/Jun2014 Supplement, p12 

    In this article, the author ponders on the efficiency and effectiveness of passwords to address the issue of computer security worldwide in 2014.

  • Manage Passwords Safely--and Simply. Kandra, Anne // PC World;Apr2003, Vol. 21 Issue 4, p47 

    Discusses ways of managing safe and secure passwords. Maintenance of a balance between password efficiency and security; Passwords for Internet use; Password management tools.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics