| Forum Home | ||||
| PC World Chat | ||||
| Thread ID: 139533 | 2015-05-18 21:15:00 | Bank Changes | pctek (84) | PC World Chat |
| Post ID | Timestamp | Content | User | ||
| 1400969 | 2015-05-19 02:53:00 | I was being humorous, I don't need 100 characters,. If I did I'd use a phrase. had one of those type passwords at Webdrive once..... |
pctek (84) | ||
| 1400970 | 2015-05-19 07:47:00 | . Perhaps: Asdhsfljdf347%&kdhsdf$#@dnnkIIG2288DFGTsdfhfgsdh-0984mfdfnn^^#0djsg kasdfnnaFFDTIkjd*gsa#hjbhh@lfgip Well, it would have been a brilliant password if you hadn't gone and posted it on the internet . The only time I've had password drama was when I did as the bank recommended and replaced an old password with a new one, which I promptly forgot, necessitating a trip to the bank to get myself another password issued . So yeah, cycling constantly through new passwords does indeed negate some of the merit of changing them . I can't claim to be very comfortable with the myriad of passwords sloshing about in my head . I'd love to have a mix of biometrics and a simpler 'base' password to accompany it for everything . |
Paul.Cov (425) | ||
| 1400971 | 2015-05-19 10:30:00 | After being beaten by various websites for not enough characters or not using letters and numbers and caps I came up with a password consisting of my first printers model number, my birth date, my alarm code at work and my pin number to make the ultimate password that is really really easy to remember even if it's 16 characters long. Best part is I can drop half of it for things that limit password length and it's still easy to remember. Why you would need 100 characters is beyond me... | hueybot3000 (3646) | ||
| 1400972 | 2015-05-19 10:32:00 | Well, it would have been a brilliant password if you hadn't gone and posted it on the internet. The only time I've had password drama was when I did as the bank recommended and replaced an old password with a new one, which I promptly forgot, necessitating a trip to the bank to get myself another password issued. So yeah, cycling constantly through new passwords does indeed negate some of the merit of changing them. I can't claim to be very comfortable with the myriad of passwords sloshing about in my head. I'd love to have a mix of biometrics and a simpler 'base' password to accompany it for everything. Theres a couple of logins I use at work that need to be changed every month so I just add another number each time. ie it was sjkdajsda20, next month is sjkdajsda21. This only works if your using the login frequently though, otherwise you will forget what number you are up to and it defeats the purpose altogether |
hueybot3000 (3646) | ||
| 1400973 | 2015-05-19 10:41:00 | Theres a couple of logins I use at work that need to be changed every month so I just add another number each time. ie it was sjkdajsda20, next month is sjkdajsda21. This only works if your using the login frequently though, otherwise you will forget what number you are up to and it defeats the purpose altogether I sincerely hope you mean "e.g." (for example) and not "i.e." (that is) ... (and "you're", not "your") :devil |
WalOne (4202) | ||
| 1400974 | 2015-05-19 10:44:00 | I sincerely hope you mean "e.g." (for example) and not "i.e." (that is) ... (and "you're", not "your") :devil Maybe it is, maybe it isn't. But it isn't 16 characters so can't be! Your second point is well taken though |
hueybot3000 (3646) | ||
| 1400975 | 2015-05-19 11:12:00 | I can't do that, my work passwords need to be changed more than a few characters every 6 weeks or they won't be accepted. I've come up with a system but I won't explain it :) | dugimodo (138) | ||
| 1400976 | 2015-05-19 20:03:00 | Well, it would have been a brilliant password if you hadn't gone and posted it on the internet. . :p Well perhaps the characters can be rearranged a bit and then it can be still used. |
pctek (84) | ||
| 1400977 | 2015-05-20 08:07:00 | This has got me thinking... and not getting a decent answer. The internet has had numerous huge leaks of password databases. Now anyone using fairly blunt attacks have huge lists of pre-used passwords to try on an other sites, which will have better luck than ourely blunt attaccks that just try every combo ever possible. Now if someone else (or even yourself) had a leaked password that matched your own password, then your password is now somewhat 'public', and more vulnerable. So how do you know if your particular sequence is already out there in the public domain? Well, you could google your own password to see if it's a recurrent sequence anywhere else, but as soon as you do that you may be further exposing your own password to snoops. So what is best? To google your password to see how secure it may or may not be, or to refuse to google it, and in so doing take the chance that it's not already listed as used by dozens of other people (and leaked a dozen times by hotmail)? |
Paul.Cov (425) | ||
| 1 2 | |||||