Entry tags:
you fuckin' killjoys
I wanted to ask how often you change your secure passwords, but i'd probably get another bucketload of "LOL NOT TELLIN LOL" answers, so forget it.
I wanted to ask how often you change your secure passwords, but i'd probably get another bucketload of "LOL NOT TELLIN LOL" answers, so forget it.
no subject
no subject
no subject
no subject
It's a bitch to remember, but I'd rather spend my time having them send me the "Secret Questions" that I always lie to.
You know, so nobody can find my mother online and find her maiden name.
Fuck that shit, her maiden name is aways something like "Tittyshaker" as far as passwords questions are concerned.
no subject
no subject
no subject
no subject
no subject
(probably about once a year)
no subject
Thanks for asking it, rone!
no subject
no subject
no subject
no subject
no subject
no subject
no subject
(Anonymous) 2006-03-14 03:49 pm (UTC)(link)no subject
At work, monthly
Outside work, never, until I develop enough trust to use online banking. The worst somebody could do at this point is steal my credit card number. I do have online credit card payment, so they could pay it off from my checking account, but not without alerting me.
no subject
no subject
no subject
For others, varies between every 6 months and never. This is dumb, I know, but it depends on how much I like my password and how sensitive I believe the protected information to be. (Some passwords aren't protecting much besides a whole lot of spam emails sent to a junk collector email account.)
no subject
no subject
I try to avoid using computers in public places.
no subject
In the mean time, I flat out ignore those warnings until my password stops working, then set it to a new one, based on the exact same heuristic I always use.
The passwords I have are pretty simple: thing + serial number. When the system tells me to change the password, I increment the serial number. "Thing" is some memorable string that is long enough and not in violation of the policies. When they told me I couldn't have a password containing the string "password," I changed it to "wordpass#" for a while, but never got cranky enough to tell the wizenuts that.
The reason people are reluctant to tell this info is because we are all convinced that now said wizenuts is going to outlaw whatever heuristics we've evolved to make up passwords in a memorable way. (Darth Vader voice: "That WAS a good heuristic (exhale-inhale). Now you shall DIE.") These people live for the opportunity to make us memorize crap, never mind that the next time I am told my password HAS to me one selected from a list of "easy to pronounce, highly memorable suggestions," I am going to make sure to have it set in 288 pt Grog Extra Grotesq and posted on the ceiling of my office.
(Mac OS X has a built-in suggester that actually is pretty damn good. I just got: "cull61\navel", a password that I would never use, but which suggests an algorithm I would use. I am sure
As someone else said, the most important password I have comes from a security token. Luckily, I don't have to carry it on my keychain, but if I did, it would be way better than having these shenanigans. Of course, it COSTS MONEY, so I guess that corporate security isn't THAT important.
Incidentally, I remember the first time my Dad came home from a computer facility that actually HAD passwords instead of just a counter with a flunkie you handed your deck of punchcards. The ONLY password he had was my sister's first name. Now it's the dog's name, mixed with memorable numbers.
no subject
no subject
no subject
no subject
Now here's a possibly stupid question... how is changing a secure password on a regular basis more secure?
no subject
Seriously, Italian law
Because we don't prevent employees in Italy from gaining access to our systems around the world--and because more and more of our support is being done on a worldwide basis--corporate direction came down to adopt these periods on all our systems. What they'll do when other countries start passing contradictory laws, I don't even want to find out.
no subject
no subject
Unfortunately, there are a number of ways that secure passwords can leak. For example, perhaps someone has cloned the backup tapes with the password store and is even now using a network of 10,000 compromised zombie PClones in a brute force attack. Or a cracker got a keylogger onto a PClone for a week without getting detected, and is now trying to figure out how to get into your internal network to use them.
(In a sane world people who care a lot about the risks, enough to make you change passwords frequently, would be using two-factor authentication to start with.)
no subject
no subject
(Without meaning to slam Windows particularly, part of the reason that I feel I can get away with this is that I don't use Windows desktops. I'm not sure what I'd do if I had to use one; maybe switch to using S/Key or some other sort of one-time passwords, and get a PDA or the like to run the actual S/Key stuff on.)
no subject