Beefy Boxes and Bandwidth Generously Provided by pair Networks
Don't ask to ask, just ask
 
PerlMonks  

Re^2: Password Generation and Module Multiplication

by ysth (Canon)
on Nov 28, 2010 at 08:11 UTC ( [id://874083]=note: print w/replies, xml ) Need Help??


in reply to Re: Password Generation and Module Multiplication
in thread Password Generation and Module Multiplication

Brute force attacks against a single password, granted.

But without complexity rules, a letter-only brute force attack or rainbow table attack against a list of hashed passwords will too easily pick off the lazy users. I'd assume the complexity rules are really designed to protect against this case.

--
A math joke: r = | |csc(θ)|+|sec(θ)|-||csc(θ)|-|sec(θ)|| |
Online Fortune Cookie Search
Office Space merchandise
  • Comment on Re^2: Password Generation and Module Multiplication

Replies are listed 'Best First'.
Re^3: Password Generation and Module Multiplication
by sundialsvc4 (Abbot) on Nov 29, 2010 at 13:42 UTC

    That, basically, is the case.   The number-one most often used password is:   password.   Close behind them are:   enter, secret.

    Nevertheless, it doesn’t work.   Enforcing complex password-rules simply causes more passwords to be written down.   When a system is broken into, it usually is not from “forcing” a password.   There are too many “other” ways into a complex system.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://874083]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others imbibing at the Monastery: (6)
As of 2024-04-19 11:00 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found