SlideShare a Scribd company logo
1 of 15
Download to read offline
How Easily Can
Your Password
Be Hacked?
s1240190 Yuto Shoji
Abstract
› How secure in the password that we use
every day?
› How hard someone guess our password?
Credits
› Python™ is a registered trademark of Python
Software Foundation.
› Microsoft® is a registered trademark of
Microsoft Corporation.
› Apple® and Mac® are registered trademarks
of Apple Inc.
› Raspberry Pi® is a trademark of the Raspberry
Pi Foundation.
› Linux® is a registered trademark of Linus
Torvalds.
Based on the following cite
› http://www.sciencebuddies.org/science-
fair-
projects/project_ideas/CompSci_p046.sht
ml
Introduction
› Strong computer passwords are important
to protect our information on computer
system.
How to create strong
passwords
› Use totally random password generator from
an online.
› Think about passphrase which is phrase you
like or a quote from a movie. Then use the first
letter of each words and put in a number or
punctuation in there somewhere.
› Use two completely unrelated words and
separate them by numbers or characters.
› Consider pronounceable random password
Like “USiFiPiZOG”
Examples of Password type
› Easy to guess based on personal knowledge:
pie314
› Pronounceable random: USiFiPiZOG
› Completely random (hard to guess) :
9J8LZcWAMzjJQUnD
› Passphrase: T4IdtwiKa (Toto, 4I don't think
we're in Kansas anymore)
› Two unrelated words: deaf+anteater
› Two unrelated words + personal info:
deaf555+4715anteater
Refer to Bibliography to write
this presentation
› Imperva Application Defense Center. (2010). Consumer Password
Worst Practices. Retrieved January 9, 2014 from
http://www.imperva.com/download.asp?id=239
› Burnett, M. (2012, September 5). 6 New Password Rules. Xato.
Retrieved January 9, 2014 from https://xato.net/passwords/new-
password-rules
› Burnett, M. (2011, June 13). How I Collect Passwords. Xato.
Retrieved January 9, 2014 from https://xato.net/passwords/how-i-
collect-passwords
› Lucas, I. (2009, July 10). Password Recovery Speeds.
Lockdown.co.uk - The Home Computer Security Centre. Retrieved
January 9, 2014 from http://www.lockdown.co.uk/?pg=combi
› Shaffer, G. (2012). Good and Bad Passwords How-To. GeodSoft.
Retrieved January 9, 2014 from
http://geodsoft.com/howto/password/cracking_passwords.htm
Materials
› Computer with any type of web browser
› Lab notebook
› Pencil or pen
› Calculator
› Optional: Python software running on a
computer. We recommend Python 3, and the
example code we provide is written for
Python 3.
› Optional, but recommended: Python 3
reference book
Cracking a Password
› We consider how to crack about cash
box lock has three dials.
Cracking method 1
› Count from 0 to 999 and try all patterns to
unlock.
Cracking method 2
› Simulate the 62-character dial. The code
start with one dial and tries all 62
possibilities. Next tries all 62^2 possibilities.
After that tries all 62^3 possibilities.
Cracking method 3
› Simulate a list of passwords that people
often use.
Cracking method 4
› Simulate the combination of words and
other characters. Then use a number or
punctuation in between two words.
Finally
› Consider about passwords is very
important for our secure life.

More Related Content

Similar to English presentation for English class

UKSG - Just Do IT Yourself
UKSG  - Just Do IT YourselfUKSG  - Just Do IT Yourself
UKSG - Just Do IT Yourself
Tony Hirst
 
Engineering culture
Engineering cultureEngineering culture
Engineering culture
Pamela Fox
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
Steve Sokoloski
 
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Seattle Interactive Conference
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
STO STRATEGY
 

Similar to English presentation for English class (20)

Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
 
Every Business Needs a Chatbot
Every Business Needs a ChatbotEvery Business Needs a Chatbot
Every Business Needs a Chatbot
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security
 
Hello Coding anyone can learn coding now.pdf
Hello Coding anyone can learn coding now.pdfHello Coding anyone can learn coding now.pdf
Hello Coding anyone can learn coding now.pdf
 
Converging Big Data and Application Infrastructure by Steven Poutsy
Converging Big Data and Application Infrastructure by Steven PoutsyConverging Big Data and Application Infrastructure by Steven Poutsy
Converging Big Data and Application Infrastructure by Steven Poutsy
 
Mind Grill
Mind GrillMind Grill
Mind Grill
 
UKSG - Just Do IT Yourself
UKSG  - Just Do IT YourselfUKSG  - Just Do IT Yourself
UKSG - Just Do IT Yourself
 
Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwords
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Passwords & security
Passwords & securityPasswords & security
Passwords & security
 
Engineering culture
Engineering cultureEngineering culture
Engineering culture
 
Python basics
Python basicsPython basics
Python basics
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
 
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
Heidi Young - The Future of Search: How Measuring Satisfaction Will Enhance O...
 
Creating Chatbots Using TensorFlow | Chatbot Tutorial | Deep Learning Trainin...
Creating Chatbots Using TensorFlow | Chatbot Tutorial | Deep Learning Trainin...Creating Chatbots Using TensorFlow | Chatbot Tutorial | Deep Learning Trainin...
Creating Chatbots Using TensorFlow | Chatbot Tutorial | Deep Learning Trainin...
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Ux scot voice usability testing with woz - ar and sf - june 2019
Ux scot   voice usability testing with woz - ar and sf  - june 2019Ux scot   voice usability testing with woz - ar and sf  - june 2019
Ux scot voice usability testing with woz - ar and sf - june 2019
 
NLTK - Natural Language Processing in Python
NLTK - Natural Language Processing in PythonNLTK - Natural Language Processing in Python
NLTK - Natural Language Processing in Python
 
Intro to web 2.0 Security
Intro to web 2.0 SecurityIntro to web 2.0 Security
Intro to web 2.0 Security
 

Recently uploaded

Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
SaadHumayun7
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 
Liberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptxLiberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptx
Rizwan Abbas
 

Recently uploaded (20)

Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
Liberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptxLiberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptx
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 

English presentation for English class

  • 1. How Easily Can Your Password Be Hacked? s1240190 Yuto Shoji
  • 2. Abstract › How secure in the password that we use every day? › How hard someone guess our password?
  • 3. Credits › Python™ is a registered trademark of Python Software Foundation. › Microsoft® is a registered trademark of Microsoft Corporation. › Apple® and Mac® are registered trademarks of Apple Inc. › Raspberry Pi® is a trademark of the Raspberry Pi Foundation. › Linux® is a registered trademark of Linus Torvalds.
  • 4. Based on the following cite › http://www.sciencebuddies.org/science- fair- projects/project_ideas/CompSci_p046.sht ml
  • 5. Introduction › Strong computer passwords are important to protect our information on computer system.
  • 6. How to create strong passwords › Use totally random password generator from an online. › Think about passphrase which is phrase you like or a quote from a movie. Then use the first letter of each words and put in a number or punctuation in there somewhere. › Use two completely unrelated words and separate them by numbers or characters. › Consider pronounceable random password Like “USiFiPiZOG”
  • 7. Examples of Password type › Easy to guess based on personal knowledge: pie314 › Pronounceable random: USiFiPiZOG › Completely random (hard to guess) : 9J8LZcWAMzjJQUnD › Passphrase: T4IdtwiKa (Toto, 4I don't think we're in Kansas anymore) › Two unrelated words: deaf+anteater › Two unrelated words + personal info: deaf555+4715anteater
  • 8. Refer to Bibliography to write this presentation › Imperva Application Defense Center. (2010). Consumer Password Worst Practices. Retrieved January 9, 2014 from http://www.imperva.com/download.asp?id=239 › Burnett, M. (2012, September 5). 6 New Password Rules. Xato. Retrieved January 9, 2014 from https://xato.net/passwords/new- password-rules › Burnett, M. (2011, June 13). How I Collect Passwords. Xato. Retrieved January 9, 2014 from https://xato.net/passwords/how-i- collect-passwords › Lucas, I. (2009, July 10). Password Recovery Speeds. Lockdown.co.uk - The Home Computer Security Centre. Retrieved January 9, 2014 from http://www.lockdown.co.uk/?pg=combi › Shaffer, G. (2012). Good and Bad Passwords How-To. GeodSoft. Retrieved January 9, 2014 from http://geodsoft.com/howto/password/cracking_passwords.htm
  • 9. Materials › Computer with any type of web browser › Lab notebook › Pencil or pen › Calculator › Optional: Python software running on a computer. We recommend Python 3, and the example code we provide is written for Python 3. › Optional, but recommended: Python 3 reference book
  • 10. Cracking a Password › We consider how to crack about cash box lock has three dials.
  • 11. Cracking method 1 › Count from 0 to 999 and try all patterns to unlock.
  • 12. Cracking method 2 › Simulate the 62-character dial. The code start with one dial and tries all 62 possibilities. Next tries all 62^2 possibilities. After that tries all 62^3 possibilities.
  • 13. Cracking method 3 › Simulate a list of passwords that people often use.
  • 14. Cracking method 4 › Simulate the combination of words and other characters. Then use a number or punctuation in between two words.
  • 15. Finally › Consider about passwords is very important for our secure life.