TITLE

PASSWORD? I FAIL!

AUTHOR(S)
Philip Nolan
PUB. DATE
May 2013
SOURCE
Daily Mail;5/17/2013, p13
SOURCE TYPE
Newspaper
DOC. TYPE
Article
ABSTRACT
IT has happened to all of us. We've just been through the online process of buying a book or a DVD, and now we're at the checkout, and the dreaded box appears. The one marked 'password'.
ACCESSION #
87612056

 

Related Articles

  • Building a Better Password. Brandon, John // Inc.;Mar2013, Vol. 35 Issue 2, p39 

    The article features several tools that entrepreneurs can use to manage their computer passwords including the Dashlane software, 1Password tool for creating master passwords and LaunchKey application for iPhone and Android smartphones.

  • A key technology innovation. Braham, James // Machine Design;08/07/97, Vol. 69 Issue 15, p126 

    Looks at the introduction of the first electronic key by Mercedes-Benz for its 1998 CLK coupe. Information on the use of access password; Examination into the use of a convention key if password fails.

  • Capitals, Symbols, Numerals, and Whimsy. Thomas, Orin // Windows IT Pro;Jun2010, Vol. 16 Issue 6, p76 

    The article contends that it may not be possible to regularly create and remember passwords that cannot be easily guessed or replicated. According to the author, passwords are a terrible solution to the problem of authentication. The author believes system administrators are the worst in terms...

  • Security of Graphical Passwords Using PCCP. Choudhary, Sarika; Singh, Ajit // International Journal of Computer Science Engineering & Technolo;May2014, Vol. 4 Issue 5, p143 

    We are well aware about problems persists in typically text-based passwords. Users generally choose memorable passwords, that are easy for attackers to guess, but the strong system generated passwords are difficult to remember. So a password authentication system should emphasis on maintaining...

  • The 10 Deadliest Data Breach Prevention Sins. URRICO, ROY // Credit Union Times;6/3/2015, Vol. 26 Issue 19, p8 

    The article presents a list of oversight of data breach prevention including failing to monitor social media, use of weaker passwords, and using obsolete data protection strategies.

  • BARRATT STARTER HOME.  // Mail on Sunday;3/10/2013, p68 

    Password: HOME

  • PW.  // Computer Desktop Encyclopedia;2015, p1 

    See password.

  • passphrase.  // Computer Desktop Encyclopedia;2015, p1 

    See password.

  • This Was War. TEMPLE, PHILLIPS // America;10/29/1955, Vol. 94 Issue 5, p132 

    The article reviews "Maybe I'm Dead," by Joe Klaas and "The Password is Courage," by John Castle.

  • USEFUL UTILITIES. Frakes, Dan // Macworld;Aug2010, Vol. 27 Issue 8, p43 

    The article evaluates the 1Password for iPad application from Agile Web Solutions.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics