SlideShare a Scribd company logo
1 of 4
Download to read offline
Fix your terrible, insecure passwords in five minutes. - B...                    http://www.slate.com/id/2223478/pagenum/all/#p2




           BRIEFING NEWS & POLITICS ARTS LIFE BUSINESS & TECH SCIENCE PODCASTS & VIDEO BLOGS

                                                                                         Search

                                                                                           MORE TECHNOLOGY COLUMNS
           HOME / TECHNOLOGY : THE FUTURE AND WHAT TO DO ABOUT IT.
                                                                                           Fix Your Terrible, Insecure Passwords

           Fix Your Terrible,                                                              in Five Minutes
                                                                                           A foolproof technique to secure your
                                                                                           computer, e-mail, and bank account.

           Insecure Passwords in                                                           Farhad Manjoo | July 24, 2009

                                                                                           Why 2024 Will Be Like Nineteen

           Five Minutes                                                                    Eighty-Four
                                                                                           How Amazon's remote deletion of e-books
                                                                                           from the Kindle paves the way for
           A foolproof technique to secure your computer, e-mail, and                      book-banning's digital future.
           bank account.                                                                   Farhad Manjoo | July 20, 2009

           By Farhad Manjoo                                                                The World's Greatest Music Service
           Posted Friday, July 24, 2009, at 7:05 AM ET                                     Spotify streams every song you'd ever
                                                                                           want to hear for free—and it's not for
                                             It's tempting to blame the victim. In         American ears.
                                             May, a twentysomething French hacker          Farhad Manjoo | July 16, 2009
                                             broke into several Twitter employees'         Search for more Technology articles
                                             e-mail accounts and stole a trove of
                                                                                           Subscribe to the Technology RSS feed
                                             meeting notes, strategy documents,
                                             and other confidential scribbles. The         View our complete Technology
                                                                                           archive
                                             hacker eventually gave the stash to
                                             TechCrunch, which has since published
                                             notes from meetings in which Twitter        TODAY'S       TODAY'S  TODAY'S  TODAY'S
                                             execs discussed their very lofty goals.     PICTURES     CARTOONS DOONESBURY VIDEO

                                             (The company wants to be the first                                 Scoot!
                                             Web service to reach 1 billion users.)
                                             How'd the hacker get all this stuff? Like
                                             a lot of tech startups, Twitter runs
                                             without paper—much of the company's
                                             discussions take place in e-mail and
                                             over shared Google documents. All of
           these corporate secrets are kept secure with a very thin wall of
           protection: the employees' passwords, which the intruder managed to
           guess because some people at Twitter used the same passwords for
           many different sites. In other words, Twitter had it coming. The trouble
           is, so do the rest of us.                                                              MOST                        MOST
                                                                                                  READ                      E-MAILED

           Your passwords aren't very secure. Even if you             PRINT               1. Let the Baby Have His Bottle?
           think they are, they probably aren't. Do you use                                  Evaluating the dangers of bisphenol A.
                                                                      DISCUSS                By Nina Shen Rastogi | July 20, 2009
           the same or similar passwords for several different
                                                                      E-MAIL
           important sites? If you don't, pat yourself on the                             2. The Depressing Cycle of Racial
           back; if you do, you're not alone—one recent               RSS                    Accusation
                                                                                             The arrest of Henry Louis Gates Jr. is about
           survey found that half of people online use the            RECOMMEND...
                                                                                             neither racial profiling nor playing the race card.
           same password for all the sites they visit. Do you         SINGLE PAGE            By Richard Thompson Ford | July 23, 2009
           change your passwords often? Probably not; more                                3. Fix Your Terrible, Insecure Passwords
           than 90 percent don't. If one of your accounts falls to a hacker, will he         in Five Minutes
           find enough to get into your other accounts? For a scare, try this:               A foolproof technique to secure your computer,
                                                                                             e-mail, and bank account.
           Search your e-mail for some of your own passwords. You'll probably find           By Farhad Manjoo | July 24, 2009
           a lot of them, either because you've e-mailed them to yourself or
                                                                                          4. Yep, He's Gay
                                                                                             I found evidence that my husband likes men,




1 of 4                                                                                                                        7/24/2009 4:58 PM
Fix your terrible, insecure passwords in five minutes. - B...                       http://www.slate.com/id/2223478/pagenum/all/#p2


           because some Web sites send along your password when you register or                but he won't admit it.
                                                                                               July 23, 2009
           when you tell them you've forgotten it. If an attacker manages to get
           into your e-mail, he'll have an easy time accessing your bank account,            5. An Open Letter to Jon Stewart
                                                                                                Bring back Leibowitz!
           your social networking sites, and your fantasy baseball roster. That's
                                                                                                By Ron Rosenbaum | July 24, 2009
           exactly what happened at Twitter. (Here's my detailed explanation of
           how Twitter got compromised.)


           Everyone knows it's bad to use the same password for different sites.             Word of the Week
           People do it anyway because remembering different passwords is                    Are Microsoft and Google Faking it?
           annoying. Remembering different difficult passwords is even more                  Denny's Salty Shock
           annoying. Eric Thompson, the founder of AccessData, a technology
           forensics company that makes password-guessing software, says that
           most passwords follow a pattern. First, people choose a readable word as          Please, Professor Gates!
           a base for the password—not necessarily something in Webster's but                Will Downing in 'Classique' Form
           something that is pronounceable in English. Then, when pressed to add             Officer Says He Won't Apologize
           a numeral or symbol to make the password more secure, most people
           add a 1 or ! to the end of that word. Thompson's software, which uses a
           "brute force" technique that tries thousands of passwords until it                How Rappers Embraced Soft Power
           guesses yours correctly, can easily suss out such common passwords.               Obama Is Blowing It on the Settlements
           When it incorporates your computer's Web history in its algorithm—all             The World's Worst Healthcare Reforms
           your ramblings on Twitter, Facebook, and elsewhere—Thompson's
           software can come up with a list of passwords that is highly likely to
           include yours. (He doesn't use it for nefarious ends; AccessData usually          Sex Among the Spineless
           guesses passwords under the direction of a court order, for military              What's Playing in Your Toddler's Ear?
           purposes, or when companies get locked out of their own systems                   Abortion and the Health Care Debate
           —"systems administrator gets hit by a bus on the way to work,"
           Thompson says by way of example.)
                                                                                             U.S. Hunger For Fish Byproducts Not As
                                                                                            Strong As First Imagined
           Security expert Bruce Schneier writes about passwords often, and he
           distills Thompson's findings into a few rules: Choose a password that             Bad Lab Results Often Unreported
           doesn't contain a readable word. Mix upper and lower case. Use a                  Potato-Faced Youngster Lauded For
           number or symbol in the middle of the word, not on the end. Don't just           Memorizing Primitive 26-Character Alphabet
           use 1 or !, and don't use symbols as replacements for letters, such as @
           for a lowercase A—password-guessing software can see through that
                                                                                             Obama Uses Funding to Get Education
           trick. And of course, create unique passwords for your different sites.
                                                                                            Changes
                                                                                             Poll: Palin's Favorability Dips
                      RELATED IN                  That all sounds difficult and
                        SLATE                                                                Health Reform Deadline in Doubt
                                                  time-consuming. It doesn't have to be.
                                                  In Schneier's comment section, I found
            Farhad Manjoo recently explained
                                                  a foolproof technique to create
            the concept behind Twitter and                                                   Inside Russia's First School of Rock
                                                  passwords that are near-impossible to
            whether joining Twitter is                                                       Madonna's Latest Catholic Controversy
            necessary. In 2004, Paul Boutin       crack yet easy to remember. Even
                                                                                             The Science Behind Cancer Prognoses
            argued that we really don't want      better, it'll take just five minutes of
            Internet security. Plus, Josh Levin   your time. Ready?
            on stupid bank security questions.

                                               Start with an original but memorable
           phrase. For this exercise, let's use these two sentences: I like to eat
           bagels at the airport and My first Cadillac was a real lemon so I bought a
           Toyota. The phrase can have something to do with your life or it can be
           a random collection of words—just make sure it's something you can
           remember. That's the key: Because a mnemonic is easy to remember,
           you don't have to write it down anywhere. (If you can't remember it
           without writing it down, it's not a good mnemonic.) This reduces the
           chance that someone will guess it if he gets into your computer or your
           e-mail. What's more, a relatively simple mnemonic can be turned into a
           fanatically difficult password.


           Which brings us to Step 2: Turn your phrase into an acronym. Be sure



2 of 4                                                                                                                     7/24/2009 4:58 PM
Fix your terrible, insecure passwords in five minutes. - B...                   http://www.slate.com/id/2223478/pagenum/all/#p2


           to use some numbers and symbols and capital letters, too. I like to eat
           bagels at the airport becomes Ilteb@ta, and My first Cadillac was a real
           lemon so I bought a Toyota is M1stCwarlsIbaT.


           That's it—you're done. These mnemonic passwords are hard to forget,
           but they contain no guessable English words. You can even create pass
           phrases for specific sites that are coded with a hint about their purpose.
           A sentence like It's 20 degrees in February, so I use Gmail lets you set a
           new Gmail password every month and still never forget it: i90diSsIuG
           for September, i30diMsIuG for March, etc. (These aren't realistic
           temperatures; they're the month-number multiplied by 10.)


           How many different such passwords do you need? Four or five at most.
           You don't have to keep unique passwords for every single site you visit—
           Thompson says it's perfectly OK to repeat passwords on sites that don't
           need to be kept very secure. For instance, I can use the same password
           for my accounts at the New York Times, the New Republic, The New
           Yorker, and other online magazines, because it won't hurt me too much
           if someone breaks into those. (My mnemonic is, I like to read snooty
           publications quite often.) You should probably use different passwords
           for each your social networking accounts—someone can do real damage
           by breaking into your Facebook or Twitter, so you want to keep them
           distinct—but you can still come up with a single systematic mnemonic to
           protect them: Twitter is my second favorite social networking site,
           MySpace is my third favorite social networking site, etc. Reserve your
           strongest, most distinct passwords for the few very important services
           that, if cracked, could do the most damage—your bank account, your
           computer, and most of all your e-mail, which often contains the keys to
           everything else in your life.


           To be sure, this is more of a hassle than what you're doing now—but
           what you're doing now is going to come back to bite you. These days,
           we're all dishing personal information all the time; you may think that
           your password is totally unguessable, but your Facebook makes clear
           that you're a huge U2 fan and you graduated from college in 2000.
           Achtung2000, eh? Just go ahead and make some new passwords right
           now. Trust me, you'll feel better.


             21        267
            diggs      votes

            digg it


                                    PRINT      E-MAIL      RECOMMEND...      RSS




            YOU MIGHT ALSO LIKE:
               Bitterness, Compulsive Shopping, and Internet Addiction: The
               diagnostic madness of DSM-V.
               No, You Can't Have My Social Security Number: Why using SSNs for
               identification is risky and stupid.
               Why No More 9/11s?: An interactive inquiry about why America
               hasn't been attacked again
               Health Care Reform: An Online Guide: If you want to keep up, you
               must know these Web sites.




3 of 4                                                                                                       7/24/2009 4:58 PM
Fix your terrible, insecure passwords in five minutes. - B...                                      http://www.slate.com/id/2223478/pagenum/all/#p2


                    Farhad Manjoo is Slate's technology columnist and the author of
                    True Enough: Learning To Live in a Post-Fact Society. You can
                    e-mail him at farhad.manjoo@slate.com and follow him on
                    Twitter.

                    Il lust rati on b y Robert Neubecker.




                                W hat did you think of this article?
                               Join The Fray: Our Reader Discussion Forum
                                      POS T A MESSAGE | READ ME SSAG ES




         The Crucial Problem       In the Loop: The Best        Life Without             Snapping Turtles: Not    Is It Better To Drink   The Guy Who Taught
         That Health Care          Political Satire in Ages     Newspapers Wouldn't      Just Hissing, Lunging,   Fizzy Drinks From       Ricky Gervais and
         Reform Won't Solve                                     Be So Bad                Biting Beasts            Bottles or Cans?        Sacha Baron Cohen
                                                                                                                                          Everything They Know




                               s ite map | build your own Slate | the fray | about us | contact us | S late on Facebook | s earch
                                      feedback | help | advertise | newsletters | mobile | make Slate you r h omep age


                                                             2009 Wa shington Post.Newsweek Interactive Co. LLC
                                                            User Agree me nt and Privacy Policy | All rights reserved




4 of 4                                                                                                                                          7/24/2009 4:58 PM

More Related Content

Viewers also liked

How to Navigate Your Career 2-2015
How to Navigate Your Career 2-2015How to Navigate Your Career 2-2015
How to Navigate Your Career 2-2015Jeff Saperstein
 
Curricula based English language learning resource for learning centers
Curricula based English language learning resource for learning centersCurricula based English language learning resource for learning centers
Curricula based English language learning resource for learning centersShailaja Shah
 
Kaipod offensive-defense
Kaipod offensive-defenseKaipod offensive-defense
Kaipod offensive-defenserout3rx
 
Enabling modularization through OSGi and SpringDM
Enabling modularization through OSGi and SpringDMEnabling modularization through OSGi and SpringDM
Enabling modularization through OSGi and SpringDMmukulobject
 
Home Sellers Seminar - 4/2/11
Home Sellers Seminar - 4/2/11Home Sellers Seminar - 4/2/11
Home Sellers Seminar - 4/2/11Susy Hurlbert
 
EventBus for Android
EventBus for AndroidEventBus for Android
EventBus for Androidgreenrobot
 
Technology In Education
Technology  In  EducationTechnology  In  Education
Technology In EducationShailaja Shah
 

Viewers also liked (9)

How to Navigate Your Career 2-2015
How to Navigate Your Career 2-2015How to Navigate Your Career 2-2015
How to Navigate Your Career 2-2015
 
FHA203k Financing
FHA203k FinancingFHA203k Financing
FHA203k Financing
 
Curricula based English language learning resource for learning centers
Curricula based English language learning resource for learning centersCurricula based English language learning resource for learning centers
Curricula based English language learning resource for learning centers
 
Kaipod offensive-defense
Kaipod offensive-defenseKaipod offensive-defense
Kaipod offensive-defense
 
Enabling modularization through OSGi and SpringDM
Enabling modularization through OSGi and SpringDMEnabling modularization through OSGi and SpringDM
Enabling modularization through OSGi and SpringDM
 
Short Sales
Short SalesShort Sales
Short Sales
 
Home Sellers Seminar - 4/2/11
Home Sellers Seminar - 4/2/11Home Sellers Seminar - 4/2/11
Home Sellers Seminar - 4/2/11
 
EventBus for Android
EventBus for AndroidEventBus for Android
EventBus for Android
 
Technology In Education
Technology  In  EducationTechnology  In  Education
Technology In Education
 

Recently uploaded

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Recently uploaded (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Fix Your Terrible Insecure Passwords

  • 1. Fix your terrible, insecure passwords in five minutes. - B... http://www.slate.com/id/2223478/pagenum/all/#p2 BRIEFING NEWS & POLITICS ARTS LIFE BUSINESS & TECH SCIENCE PODCASTS & VIDEO BLOGS Search MORE TECHNOLOGY COLUMNS HOME / TECHNOLOGY : THE FUTURE AND WHAT TO DO ABOUT IT. Fix Your Terrible, Insecure Passwords Fix Your Terrible, in Five Minutes A foolproof technique to secure your computer, e-mail, and bank account. Insecure Passwords in Farhad Manjoo | July 24, 2009 Why 2024 Will Be Like Nineteen Five Minutes Eighty-Four How Amazon's remote deletion of e-books from the Kindle paves the way for A foolproof technique to secure your computer, e-mail, and book-banning's digital future. bank account. Farhad Manjoo | July 20, 2009 By Farhad Manjoo The World's Greatest Music Service Posted Friday, July 24, 2009, at 7:05 AM ET Spotify streams every song you'd ever want to hear for free—and it's not for It's tempting to blame the victim. In American ears. May, a twentysomething French hacker Farhad Manjoo | July 16, 2009 broke into several Twitter employees' Search for more Technology articles e-mail accounts and stole a trove of Subscribe to the Technology RSS feed meeting notes, strategy documents, and other confidential scribbles. The View our complete Technology archive hacker eventually gave the stash to TechCrunch, which has since published notes from meetings in which Twitter TODAY'S TODAY'S TODAY'S TODAY'S execs discussed their very lofty goals. PICTURES CARTOONS DOONESBURY VIDEO (The company wants to be the first Scoot! Web service to reach 1 billion users.) How'd the hacker get all this stuff? Like a lot of tech startups, Twitter runs without paper—much of the company's discussions take place in e-mail and over shared Google documents. All of these corporate secrets are kept secure with a very thin wall of protection: the employees' passwords, which the intruder managed to guess because some people at Twitter used the same passwords for many different sites. In other words, Twitter had it coming. The trouble is, so do the rest of us. MOST MOST READ E-MAILED Your passwords aren't very secure. Even if you PRINT 1. Let the Baby Have His Bottle? think they are, they probably aren't. Do you use Evaluating the dangers of bisphenol A. DISCUSS By Nina Shen Rastogi | July 20, 2009 the same or similar passwords for several different E-MAIL important sites? If you don't, pat yourself on the 2. The Depressing Cycle of Racial back; if you do, you're not alone—one recent RSS Accusation The arrest of Henry Louis Gates Jr. is about survey found that half of people online use the RECOMMEND... neither racial profiling nor playing the race card. same password for all the sites they visit. Do you SINGLE PAGE By Richard Thompson Ford | July 23, 2009 change your passwords often? Probably not; more 3. Fix Your Terrible, Insecure Passwords than 90 percent don't. If one of your accounts falls to a hacker, will he in Five Minutes find enough to get into your other accounts? For a scare, try this: A foolproof technique to secure your computer, e-mail, and bank account. Search your e-mail for some of your own passwords. You'll probably find By Farhad Manjoo | July 24, 2009 a lot of them, either because you've e-mailed them to yourself or 4. Yep, He's Gay I found evidence that my husband likes men, 1 of 4 7/24/2009 4:58 PM
  • 2. Fix your terrible, insecure passwords in five minutes. - B... http://www.slate.com/id/2223478/pagenum/all/#p2 because some Web sites send along your password when you register or but he won't admit it. July 23, 2009 when you tell them you've forgotten it. If an attacker manages to get into your e-mail, he'll have an easy time accessing your bank account, 5. An Open Letter to Jon Stewart Bring back Leibowitz! your social networking sites, and your fantasy baseball roster. That's By Ron Rosenbaum | July 24, 2009 exactly what happened at Twitter. (Here's my detailed explanation of how Twitter got compromised.) Everyone knows it's bad to use the same password for different sites. Word of the Week People do it anyway because remembering different passwords is Are Microsoft and Google Faking it? annoying. Remembering different difficult passwords is even more Denny's Salty Shock annoying. Eric Thompson, the founder of AccessData, a technology forensics company that makes password-guessing software, says that most passwords follow a pattern. First, people choose a readable word as Please, Professor Gates! a base for the password—not necessarily something in Webster's but Will Downing in 'Classique' Form something that is pronounceable in English. Then, when pressed to add Officer Says He Won't Apologize a numeral or symbol to make the password more secure, most people add a 1 or ! to the end of that word. Thompson's software, which uses a "brute force" technique that tries thousands of passwords until it How Rappers Embraced Soft Power guesses yours correctly, can easily suss out such common passwords. Obama Is Blowing It on the Settlements When it incorporates your computer's Web history in its algorithm—all The World's Worst Healthcare Reforms your ramblings on Twitter, Facebook, and elsewhere—Thompson's software can come up with a list of passwords that is highly likely to include yours. (He doesn't use it for nefarious ends; AccessData usually Sex Among the Spineless guesses passwords under the direction of a court order, for military What's Playing in Your Toddler's Ear? purposes, or when companies get locked out of their own systems Abortion and the Health Care Debate —"systems administrator gets hit by a bus on the way to work," Thompson says by way of example.) U.S. Hunger For Fish Byproducts Not As Strong As First Imagined Security expert Bruce Schneier writes about passwords often, and he distills Thompson's findings into a few rules: Choose a password that Bad Lab Results Often Unreported doesn't contain a readable word. Mix upper and lower case. Use a Potato-Faced Youngster Lauded For number or symbol in the middle of the word, not on the end. Don't just Memorizing Primitive 26-Character Alphabet use 1 or !, and don't use symbols as replacements for letters, such as @ for a lowercase A—password-guessing software can see through that Obama Uses Funding to Get Education trick. And of course, create unique passwords for your different sites. Changes Poll: Palin's Favorability Dips RELATED IN That all sounds difficult and SLATE Health Reform Deadline in Doubt time-consuming. It doesn't have to be. In Schneier's comment section, I found Farhad Manjoo recently explained a foolproof technique to create the concept behind Twitter and Inside Russia's First School of Rock passwords that are near-impossible to whether joining Twitter is Madonna's Latest Catholic Controversy necessary. In 2004, Paul Boutin crack yet easy to remember. Even The Science Behind Cancer Prognoses argued that we really don't want better, it'll take just five minutes of Internet security. Plus, Josh Levin your time. Ready? on stupid bank security questions. Start with an original but memorable phrase. For this exercise, let's use these two sentences: I like to eat bagels at the airport and My first Cadillac was a real lemon so I bought a Toyota. The phrase can have something to do with your life or it can be a random collection of words—just make sure it's something you can remember. That's the key: Because a mnemonic is easy to remember, you don't have to write it down anywhere. (If you can't remember it without writing it down, it's not a good mnemonic.) This reduces the chance that someone will guess it if he gets into your computer or your e-mail. What's more, a relatively simple mnemonic can be turned into a fanatically difficult password. Which brings us to Step 2: Turn your phrase into an acronym. Be sure 2 of 4 7/24/2009 4:58 PM
  • 3. Fix your terrible, insecure passwords in five minutes. - B... http://www.slate.com/id/2223478/pagenum/all/#p2 to use some numbers and symbols and capital letters, too. I like to eat bagels at the airport becomes Ilteb@ta, and My first Cadillac was a real lemon so I bought a Toyota is M1stCwarlsIbaT. That's it—you're done. These mnemonic passwords are hard to forget, but they contain no guessable English words. You can even create pass phrases for specific sites that are coded with a hint about their purpose. A sentence like It's 20 degrees in February, so I use Gmail lets you set a new Gmail password every month and still never forget it: i90diSsIuG for September, i30diMsIuG for March, etc. (These aren't realistic temperatures; they're the month-number multiplied by 10.) How many different such passwords do you need? Four or five at most. You don't have to keep unique passwords for every single site you visit— Thompson says it's perfectly OK to repeat passwords on sites that don't need to be kept very secure. For instance, I can use the same password for my accounts at the New York Times, the New Republic, The New Yorker, and other online magazines, because it won't hurt me too much if someone breaks into those. (My mnemonic is, I like to read snooty publications quite often.) You should probably use different passwords for each your social networking accounts—someone can do real damage by breaking into your Facebook or Twitter, so you want to keep them distinct—but you can still come up with a single systematic mnemonic to protect them: Twitter is my second favorite social networking site, MySpace is my third favorite social networking site, etc. Reserve your strongest, most distinct passwords for the few very important services that, if cracked, could do the most damage—your bank account, your computer, and most of all your e-mail, which often contains the keys to everything else in your life. To be sure, this is more of a hassle than what you're doing now—but what you're doing now is going to come back to bite you. These days, we're all dishing personal information all the time; you may think that your password is totally unguessable, but your Facebook makes clear that you're a huge U2 fan and you graduated from college in 2000. Achtung2000, eh? Just go ahead and make some new passwords right now. Trust me, you'll feel better. 21 267 diggs votes digg it PRINT E-MAIL RECOMMEND... RSS YOU MIGHT ALSO LIKE: Bitterness, Compulsive Shopping, and Internet Addiction: The diagnostic madness of DSM-V. No, You Can't Have My Social Security Number: Why using SSNs for identification is risky and stupid. Why No More 9/11s?: An interactive inquiry about why America hasn't been attacked again Health Care Reform: An Online Guide: If you want to keep up, you must know these Web sites. 3 of 4 7/24/2009 4:58 PM
  • 4. Fix your terrible, insecure passwords in five minutes. - B... http://www.slate.com/id/2223478/pagenum/all/#p2 Farhad Manjoo is Slate's technology columnist and the author of True Enough: Learning To Live in a Post-Fact Society. You can e-mail him at farhad.manjoo@slate.com and follow him on Twitter. Il lust rati on b y Robert Neubecker. W hat did you think of this article? Join The Fray: Our Reader Discussion Forum POS T A MESSAGE | READ ME SSAG ES The Crucial Problem In the Loop: The Best Life Without Snapping Turtles: Not Is It Better To Drink The Guy Who Taught That Health Care Political Satire in Ages Newspapers Wouldn't Just Hissing, Lunging, Fizzy Drinks From Ricky Gervais and Reform Won't Solve Be So Bad Biting Beasts Bottles or Cans? Sacha Baron Cohen Everything They Know s ite map | build your own Slate | the fray | about us | contact us | S late on Facebook | s earch feedback | help | advertise | newsletters | mobile | make Slate you r h omep age 2009 Wa shington Post.Newsweek Interactive Co. LLC User Agree me nt and Privacy Policy | All rights reserved 4 of 4 7/24/2009 4:58 PM