SlideShare a Scribd company logo
1 of 19
Download to read offline
How I solved my password problem 
By : Khawar Nehal 
Applied Technology Research Center 
http://atrc.net.pk 
Dubai Computer Services. 
http://dubai-computer-services.com 
Date : 6 Sep 2014
Problem 
Just like many other people, I have to have 
passwords.
Sentences 
Since many years the computers required longer 
passwords due to the ever increasing 
computation speeds of computers. 
So I came up with the pass-sentence idea many 
years ago and write about that. 
In this my passwords looks like a sentence like 
this : “thisismypasswordanditislong”
Storage 
What I used to do is create different passwords 
for many sites which I visited. Also I was 
responsible for a lot of ISPs concurrently so there 
needed to be a way to store all passwords.
Paper 
Initially it was all done on paper with paper 
backups. The paper was well guarded physically.
Electronic 
The about 10 years ago I stored the passwords in 
a directory aptly called “passwords.” 
I was not afraid of anyone getting access through 
the network because I was always using some 
version of Linux installed less than 6 months ago.
Encrypted partition 
Now the laptop and desktop had to be physically 
protected. 
Then a few years ago I started using an encrypted 
partition. This way, the computer needs the 
password on startup and if you do not give the 
password, the encrypted partition is not available.
Solution for you 
So I if you want peace of mind, you can use my 
password management system to prevent 
unauthorized access to your stuff on the 
computers and the net.
Procedure 
Copy all of your data off the computer to backup. 
Download the latest available ISO of the OS. 
Create an encrypted partition of about 100 MB 
when installing the OS. 
This procedure needs to be done every 6 months 
so your OS distribution is fresh. 
This solves the update causing your apps to go 
haywire issue. 
And increases security while keeping your system 
running smoothly.
Procedure 
Create a directory called passwords in an 
encrypted partition. 
Create directories in the passwords directory for 
each domain and application. Examples : 
yahoo.com, your_database, your_server, ...
Files 
Create text files or odt files in the directories with 
the date and version in the name of the file. 
Example : in yahoo.com you might have a file 
called khawar.nehal_5_sep_2014-1.txt
Contents of files 
Inside the file the contents look like : 
User khawar.nehal 
Password thisismylongpassword 
Date of birth 9/11/2001 
Alternative email : khawar@gmail.com 
… any other info relevant to the password.
File names. 
If the file is changed on the same day then the file 
name may look like 
Khawar.nehal_5_sep_2014-3.txt 
To represent the 3rd version on the 5th of sep 2014 
This is to avoid having any wrong CMOS/BIOS 
clock time messing up your backup/restore.
Old files 
Old files are deleted regularly. 
If a restore is required and they show up again, 
they are deleted. 
With terabytes of storage, the number of files 
does not matter. Just delete the old ones and 
keep the latest. 
Use save as to change the name to the new 
version to avoid restore disasters.
GPG 
Also use GPG with symmetric encryption when 
copying to backups. 
To make it easy, use a king of reminder in the 
GPG file name to help you figure out the master 
passwords of the whole backup file.
Reminder 
For example your master password for the GPG 
file is maryhadalittlelamb. You could use the 
reminder KG to remind you of the password. 
Anything which shall help you remember your 
long pass-sentence.
GPG 
I hope you shall be able to use this procedure to 
have strong passwords and keep them secure. 
If you need help with other computer security 
issues or better ideas on how to manage your 
enterprise security requirements. 
Please contact me : 
khawar@dubai-computer-services.com and 
mention this presentation.
How I solved my password problem 
By : Khawar Nehal 
Applied Technology Research Center 
http://atrc.net.pk 
Dubai Computer Services. 
http://dubai-computer-services.com 
Date : 6 Sep 2014
Request for contribution 
If you find this useful and would 
like to contribute resources, 
books, things or money to help 
my company to provide more 
such useful research please 
contact us. 
Do also contact to send ideas of 
things which you would like to 
see more research on.

More Related Content

Similar to Password security by_khawar_6_sep_2014-1

Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)softwaresatish
 
Carrera Backup
Carrera BackupCarrera Backup
Carrera Backup9ONE7
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)Shreyans Jain
 
Apache Con 2008 Top 10 Mistakes
Apache Con 2008 Top 10 MistakesApache Con 2008 Top 10 Mistakes
Apache Con 2008 Top 10 MistakesJohn Coggeshall
 
Best Practices for Using Alluxio with Spark
Best Practices for Using Alluxio with SparkBest Practices for Using Alluxio with Spark
Best Practices for Using Alluxio with SparkAlluxio, Inc.
 
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
AD113  Speed Up Your Applications w/ Nginx and PageSpeedAD113  Speed Up Your Applications w/ Nginx and PageSpeed
AD113 Speed Up Your Applications w/ Nginx and PageSpeededm00se
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurityricharddxd
 
Nagios Conference 2012 - Nathan Vonnahme - Writing Custom Nagios Plugins in Perl
Nagios Conference 2012 - Nathan Vonnahme - Writing Custom Nagios Plugins in PerlNagios Conference 2012 - Nathan Vonnahme - Writing Custom Nagios Plugins in Perl
Nagios Conference 2012 - Nathan Vonnahme - Writing Custom Nagios Plugins in PerlNagios
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security RequirementsSteven Cahill
 
Top 10 Scalability Mistakes
Top 10 Scalability MistakesTop 10 Scalability Mistakes
Top 10 Scalability MistakesJohn Coggeshall
 
Best Practices for Using Alluxio with Apache Spark with Cheng Chang and Haoyu...
Best Practices for Using Alluxio with Apache Spark with Cheng Chang and Haoyu...Best Practices for Using Alluxio with Apache Spark with Cheng Chang and Haoyu...
Best Practices for Using Alluxio with Apache Spark with Cheng Chang and Haoyu...Databricks
 
Top 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance SecurityTop 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance Security9 series
 
WP Joburg Meetup 10: Genesis Framework by Trish Cornelius
WP Joburg Meetup 10: Genesis Framework by Trish CorneliusWP Joburg Meetup 10: Genesis Framework by Trish Cornelius
WP Joburg Meetup 10: Genesis Framework by Trish CorneliusWPJoburg
 
SPFS - A filesystem for Spectrum Protect
SPFS - A filesystem for Spectrum ProtectSPFS - A filesystem for Spectrum Protect
SPFS - A filesystem for Spectrum Protecttdalebjork
 
SPFS - A filesystem for Spectrum Protect
SPFS - A filesystem for Spectrum ProtectSPFS - A filesystem for Spectrum Protect
SPFS - A filesystem for Spectrum Protecttdalebjork
 
Spark Pipelines in the Cloud with Alluxio by Bin Fan
Spark Pipelines in the Cloud with Alluxio by Bin FanSpark Pipelines in the Cloud with Alluxio by Bin Fan
Spark Pipelines in the Cloud with Alluxio by Bin FanData Con LA
 
Reversing & malware analysis training part 2 introduction to windows internals
Reversing & malware analysis training part 2   introduction to windows internalsReversing & malware analysis training part 2   introduction to windows internals
Reversing & malware analysis training part 2 introduction to windows internalssecurityxploded
 

Similar to Password security by_khawar_6_sep_2014-1 (20)

Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)Exercises portfolio-Digital Curation Tools (IS40620)
Exercises portfolio-Digital Curation Tools (IS40620)
 
Carrera Backup
Carrera BackupCarrera Backup
Carrera Backup
 
Generic RLM White Paper
Generic RLM White PaperGeneric RLM White Paper
Generic RLM White Paper
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)
 
Apache Con 2008 Top 10 Mistakes
Apache Con 2008 Top 10 MistakesApache Con 2008 Top 10 Mistakes
Apache Con 2008 Top 10 Mistakes
 
Best Practices for Using Alluxio with Spark
Best Practices for Using Alluxio with SparkBest Practices for Using Alluxio with Spark
Best Practices for Using Alluxio with Spark
 
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
AD113  Speed Up Your Applications w/ Nginx and PageSpeedAD113  Speed Up Your Applications w/ Nginx and PageSpeed
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
 
d-crypt
d-cryptd-crypt
d-crypt
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
 
Nagios Conference 2012 - Nathan Vonnahme - Writing Custom Nagios Plugins in Perl
Nagios Conference 2012 - Nathan Vonnahme - Writing Custom Nagios Plugins in PerlNagios Conference 2012 - Nathan Vonnahme - Writing Custom Nagios Plugins in Perl
Nagios Conference 2012 - Nathan Vonnahme - Writing Custom Nagios Plugins in Perl
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Top 10 Scalability Mistakes
Top 10 Scalability MistakesTop 10 Scalability Mistakes
Top 10 Scalability Mistakes
 
Best Practices for Using Alluxio with Apache Spark with Cheng Chang and Haoyu...
Best Practices for Using Alluxio with Apache Spark with Cheng Chang and Haoyu...Best Practices for Using Alluxio with Apache Spark with Cheng Chang and Haoyu...
Best Practices for Using Alluxio with Apache Spark with Cheng Chang and Haoyu...
 
Help Doctor, my application is an onion!
Help Doctor, my application is an onion!Help Doctor, my application is an onion!
Help Doctor, my application is an onion!
 
Top 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance SecurityTop 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance Security
 
WP Joburg Meetup 10: Genesis Framework by Trish Cornelius
WP Joburg Meetup 10: Genesis Framework by Trish CorneliusWP Joburg Meetup 10: Genesis Framework by Trish Cornelius
WP Joburg Meetup 10: Genesis Framework by Trish Cornelius
 
SPFS - A filesystem for Spectrum Protect
SPFS - A filesystem for Spectrum ProtectSPFS - A filesystem for Spectrum Protect
SPFS - A filesystem for Spectrum Protect
 
SPFS - A filesystem for Spectrum Protect
SPFS - A filesystem for Spectrum ProtectSPFS - A filesystem for Spectrum Protect
SPFS - A filesystem for Spectrum Protect
 
Spark Pipelines in the Cloud with Alluxio by Bin Fan
Spark Pipelines in the Cloud with Alluxio by Bin FanSpark Pipelines in the Cloud with Alluxio by Bin Fan
Spark Pipelines in the Cloud with Alluxio by Bin Fan
 
Reversing & malware analysis training part 2 introduction to windows internals
Reversing & malware analysis training part 2   introduction to windows internalsReversing & malware analysis training part 2   introduction to windows internals
Reversing & malware analysis training part 2 introduction to windows internals
 

More from Khawar Nehal khawar.nehal@atrc.net.pk

More from Khawar Nehal khawar.nehal@atrc.net.pk (20)

Important questions which a business plan should address.
Important questions which a business plan should address.Important questions which a business plan should address.
Important questions which a business plan should address.
 
Dubai Computer Services Company Profile
Dubai Computer Services Company ProfileDubai Computer Services Company Profile
Dubai Computer Services Company Profile
 
Atrc shale gas in Pakistan presentation 6 may 2015 1
Atrc shale gas in Pakistan presentation 6 may 2015 1Atrc shale gas in Pakistan presentation 6 may 2015 1
Atrc shale gas in Pakistan presentation 6 may 2015 1
 
Linux intro cbm_2_oct_2004-2
Linux intro cbm_2_oct_2004-2Linux intro cbm_2_oct_2004-2
Linux intro cbm_2_oct_2004-2
 
Atrc dcs crm_presentation_10_sep_2014-1
Atrc dcs crm_presentation_10_sep_2014-1Atrc dcs crm_presentation_10_sep_2014-1
Atrc dcs crm_presentation_10_sep_2014-1
 
Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014
 
Atrc social media presentation 5 Jan 2013 for international
Atrc social media presentation 5 Jan 2013 for internationalAtrc social media presentation 5 Jan 2013 for international
Atrc social media presentation 5 Jan 2013 for international
 
Accident investigation course
Accident investigation courseAccident investigation course
Accident investigation course
 
Do not be_late_inshallah_5_jan_2014-1
Do not be_late_inshallah_5_jan_2014-1Do not be_late_inshallah_5_jan_2014-1
Do not be_late_inshallah_5_jan_2014-1
 
Accident Investigation and Analysis
Accident Investigation and AnalysisAccident Investigation and Analysis
Accident Investigation and Analysis
 
Monotheism in the Bible
Monotheism in the BibleMonotheism in the Bible
Monotheism in the Bible
 
Autism cure by_khawar_nehal_atrc_10_oct_2013-2
Autism cure by_khawar_nehal_atrc_10_oct_2013-2Autism cure by_khawar_nehal_atrc_10_oct_2013-2
Autism cure by_khawar_nehal_atrc_10_oct_2013-2
 
Global climate change by IPCC
Global climate change by IPCCGlobal climate change by IPCC
Global climate change by IPCC
 
Topic 7 access control
Topic 7 access controlTopic 7 access control
Topic 7 access control
 
Topic 6 authentication2 12_dec_2012-1
Topic 6 authentication2 12_dec_2012-1Topic 6 authentication2 12_dec_2012-1
Topic 6 authentication2 12_dec_2012-1
 
Lect5 authentication 5_dec_2012-1
Lect5 authentication 5_dec_2012-1Lect5 authentication 5_dec_2012-1
Lect5 authentication 5_dec_2012-1
 
Topic 10 Emarketing plan 1
Topic 10 Emarketing plan 1Topic 10 Emarketing plan 1
Topic 10 Emarketing plan 1
 
Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2
 
Network Security Topic 3 cryptography
Network Security Topic 3 cryptographyNetwork Security Topic 3 cryptography
Network Security Topic 3 cryptography
 
Network security Topic 2 overview continued
Network security Topic 2 overview continuedNetwork security Topic 2 overview continued
Network security Topic 2 overview continued
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

Password security by_khawar_6_sep_2014-1

  • 1. How I solved my password problem By : Khawar Nehal Applied Technology Research Center http://atrc.net.pk Dubai Computer Services. http://dubai-computer-services.com Date : 6 Sep 2014
  • 2. Problem Just like many other people, I have to have passwords.
  • 3. Sentences Since many years the computers required longer passwords due to the ever increasing computation speeds of computers. So I came up with the pass-sentence idea many years ago and write about that. In this my passwords looks like a sentence like this : “thisismypasswordanditislong”
  • 4. Storage What I used to do is create different passwords for many sites which I visited. Also I was responsible for a lot of ISPs concurrently so there needed to be a way to store all passwords.
  • 5. Paper Initially it was all done on paper with paper backups. The paper was well guarded physically.
  • 6. Electronic The about 10 years ago I stored the passwords in a directory aptly called “passwords.” I was not afraid of anyone getting access through the network because I was always using some version of Linux installed less than 6 months ago.
  • 7. Encrypted partition Now the laptop and desktop had to be physically protected. Then a few years ago I started using an encrypted partition. This way, the computer needs the password on startup and if you do not give the password, the encrypted partition is not available.
  • 8. Solution for you So I if you want peace of mind, you can use my password management system to prevent unauthorized access to your stuff on the computers and the net.
  • 9. Procedure Copy all of your data off the computer to backup. Download the latest available ISO of the OS. Create an encrypted partition of about 100 MB when installing the OS. This procedure needs to be done every 6 months so your OS distribution is fresh. This solves the update causing your apps to go haywire issue. And increases security while keeping your system running smoothly.
  • 10. Procedure Create a directory called passwords in an encrypted partition. Create directories in the passwords directory for each domain and application. Examples : yahoo.com, your_database, your_server, ...
  • 11. Files Create text files or odt files in the directories with the date and version in the name of the file. Example : in yahoo.com you might have a file called khawar.nehal_5_sep_2014-1.txt
  • 12. Contents of files Inside the file the contents look like : User khawar.nehal Password thisismylongpassword Date of birth 9/11/2001 Alternative email : khawar@gmail.com … any other info relevant to the password.
  • 13. File names. If the file is changed on the same day then the file name may look like Khawar.nehal_5_sep_2014-3.txt To represent the 3rd version on the 5th of sep 2014 This is to avoid having any wrong CMOS/BIOS clock time messing up your backup/restore.
  • 14. Old files Old files are deleted regularly. If a restore is required and they show up again, they are deleted. With terabytes of storage, the number of files does not matter. Just delete the old ones and keep the latest. Use save as to change the name to the new version to avoid restore disasters.
  • 15. GPG Also use GPG with symmetric encryption when copying to backups. To make it easy, use a king of reminder in the GPG file name to help you figure out the master passwords of the whole backup file.
  • 16. Reminder For example your master password for the GPG file is maryhadalittlelamb. You could use the reminder KG to remind you of the password. Anything which shall help you remember your long pass-sentence.
  • 17. GPG I hope you shall be able to use this procedure to have strong passwords and keep them secure. If you need help with other computer security issues or better ideas on how to manage your enterprise security requirements. Please contact me : khawar@dubai-computer-services.com and mention this presentation.
  • 18. How I solved my password problem By : Khawar Nehal Applied Technology Research Center http://atrc.net.pk Dubai Computer Services. http://dubai-computer-services.com Date : 6 Sep 2014
  • 19. Request for contribution If you find this useful and would like to contribute resources, books, things or money to help my company to provide more such useful research please contact us. Do also contact to send ideas of things which you would like to see more research on.