wildweasel wrote:and testing your password's strength against known cracking algorithms with this tester
Entering your password on some random website that "tests" your password is a bad idea. They could as well store it in a dictionary.
wildweasel wrote:and testing your password's strength against known cracking algorithms with this tester
Slax wrote:WELP. Time to upgrade the forums.
Nope. Just shows that someone was trying to guess your password from a different system.scalliano wrote:Is it time to panic?
From a technical standpoint, 62^len is less breakable than 26^len.Graf Zahl wrote:Numbers and capital letters are highly overrated.
This is why I suggested a hybrid of the two.Graf Zahl wrote:Aside from some random sequence of characters, the best password is still some phrase that only has meaning to you.
I've seen this particular site recommended by the folks at Windows Secrets (who I've always seen on the ball about security-related things).boris wrote:Entering your password on some random website that "tests" your password is a bad idea. They could as well store it in a dictionary.
boris wrote:Entering your password on some random website that "tests" your password is a bad idea. They could as well store it in a dictionary.
NeuralStunner wrote:From a technical standpoint, 62^len is less breakable than 26^len.Graf Zahl wrote:Numbers and capital letters are highly overrated.
Gothic wrote:boris wrote:Entering your password on some random website that "tests" your password is a bad idea. They could as well store it in a dictionary.
But you don't click anything on that site, you just type and the result appears, like Google Translator.
If we're talking about using a personal phrase, that's still real words. For most people, the phrase is still going to be somehow related to the site it's used on (unless they're reusing it across sites), and even one bizarre substitution (I.E. not something as obvious as o->0) is going to be unpredictable.Graf Zahl wrote:But that's not how password cracking works. A random combination of small letters is still more secure than a real word where some characters have been capitalized or where 'o's have been replaced with '0's.
As computers have become faster, the guessers have got better, sometimes being able to test hundreds of thousands of passwords per second. These guessers might run for months on many machines simultaneously.
They guess intelligently. They don't run through every eight-letter combination from "aaaaaaaa" to "zzzzzzzz" in order. That's 200bn possible passwords, most of them very unlikely. They try the most common password first: "password1". (Don't laugh; the most common password used to be "password".)
A typical password consists of a root plus an appendage. The root isn't necessarily a dictionary word, but it's something pronounceable. An appendage is either a suffix (90% of the time) or a prefix (10% of the time). One guesser I studied starts with a dictionary of about 1,000 common passwords, things like "letmein," "temp," "123456," and so on. Then it tests them each with about 100 common suffix appendages: "1", "4u", "69", "abc", "!" and so on. It recovers about 24% of all passwords with just these 100,000 combinations.
Return to Rules and Forum Announcements
Users browsing this forum: No registered users and 0 guests