SlideShare a Scribd company logo
1
Do you use the same
       password for multiple
            websites?
                   Never
                   19%
                               Few
                            different
        Always             passwords
         33%                  48%




http://www.sophos.com/pressoffice/news/articl
      es/2009/03/password-security.html
3
KeePass
Step 1: Create a
new database

File; New

You will need to
remember this
password!


                      4
5
KeePass
Step 2: Add
Entries

Right-click into the right
password entry view and
choose 'Add Entry...'.

A window will pop up. In
this window you can now
edit your entry: enter
some title for it, an
username, an URL, the
actual password, etc.

                             6
KeePass
Using Database:
You can copy the
username of the entry to
the Windows clipboard.
When you've copied it, you
can post it into any other
program of your choice.
The same works for
copying passwords.

KeePass can open the URL
you specified. To do
this, just click 'URL(s) -
Open URL(s)' in the
context menu. KeePass will
start the default browser
and open the specified       7
URL.
http://www.sophos.com/pressoffice/news/articles/2009/
03/password-security.html
http://keepass.info/
http://thedilbertstore.com/comic_strips/2011/04/28/
   (licensed for up to 200 viewers )




                                                  8

More Related Content

More from netc2012

Using Wordpress as Social Media to Educate and Interact with Clientele
Using Wordpress as  Social Media to Educate and Interact with ClienteleUsing Wordpress as  Social Media to Educate and Interact with Clientele
Using Wordpress as Social Media to Educate and Interact with Clientele
netc2012
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
netc2012
 
Virtual vs. In-Person Professional Development
Virtual vs. In-Person Professional DevelopmentVirtual vs. In-Person Professional Development
Virtual vs. In-Person Professional Development
netc2012
 
How to like your facebook presence
How to like your facebook presenceHow to like your facebook presence
How to like your facebook presence
netc2012
 
Extension educator certificate
Extension educator certificateExtension educator certificate
Extension educator certificate
netc2012
 
The iPad Lab
The iPad LabThe iPad Lab
The iPad Lab
netc2012
 
Virtual work space
Virtual work spaceVirtual work space
Virtual work space
netc2012
 
Beyond logic models
Beyond logic modelsBeyond logic models
Beyond logic models
netc2012
 
Evaluating social media
Evaluating social mediaEvaluating social media
Evaluating social media
netc2012
 
MS Dynamics CRM - One Stop Extension Reporting
MS Dynamics CRM - One Stop Extension ReportingMS Dynamics CRM - One Stop Extension Reporting
MS Dynamics CRM - One Stop Extension Reporting
netc2012
 
Moodle @ eXtension.org
Moodle @ eXtension.orgMoodle @ eXtension.org
Moodle @ eXtension.org
netc2012
 
Drupal CMS: eXtension’s collaborative workspace
Drupal CMS: eXtension’s collaborative workspaceDrupal CMS: eXtension’s collaborative workspace
Drupal CMS: eXtension’s collaborative workspace
netc2012
 
Video Streaming: Broadcast quality on a shoe string budget.
Video Streaming: Broadcast quality on a shoe string budget.  Video Streaming: Broadcast quality on a shoe string budget.
Video Streaming: Broadcast quality on a shoe string budget.
netc2012
 
Getting found - Search Engine Optimizaton
Getting found - Search Engine OptimizatonGetting found - Search Engine Optimizaton
Getting found - Search Engine Optimizaton
netc2012
 
Frameworks Galore: A Pragmatic Review
Frameworks Galore: A Pragmatic ReviewFrameworks Galore: A Pragmatic Review
Frameworks Galore: A Pragmatic Review
netc2012
 
Drinking with the horses
Drinking with the horsesDrinking with the horses
Drinking with the horses
netc2012
 
Developing iPad apps for extension education
Developing iPad apps for extension educationDeveloping iPad apps for extension education
Developing iPad apps for extension education
netc2012
 
Integrating Technology in a Childhood Obesity Prevention Program: A Practical...
Integrating Technology in a Childhood Obesity Prevention Program: A Practical...Integrating Technology in a Childhood Obesity Prevention Program: A Practical...
Integrating Technology in a Childhood Obesity Prevention Program: A Practical...
netc2012
 
10 Steps to Lead Extension into the 21st Century
10 Steps to Lead Extension into the 21st Century10 Steps to Lead Extension into the 21st Century
10 Steps to Lead Extension into the 21st Century
netc2012
 

More from netc2012 (19)

Using Wordpress as Social Media to Educate and Interact with Clientele
Using Wordpress as  Social Media to Educate and Interact with ClienteleUsing Wordpress as  Social Media to Educate and Interact with Clientele
Using Wordpress as Social Media to Educate and Interact with Clientele
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
 
Virtual vs. In-Person Professional Development
Virtual vs. In-Person Professional DevelopmentVirtual vs. In-Person Professional Development
Virtual vs. In-Person Professional Development
 
How to like your facebook presence
How to like your facebook presenceHow to like your facebook presence
How to like your facebook presence
 
Extension educator certificate
Extension educator certificateExtension educator certificate
Extension educator certificate
 
The iPad Lab
The iPad LabThe iPad Lab
The iPad Lab
 
Virtual work space
Virtual work spaceVirtual work space
Virtual work space
 
Beyond logic models
Beyond logic modelsBeyond logic models
Beyond logic models
 
Evaluating social media
Evaluating social mediaEvaluating social media
Evaluating social media
 
MS Dynamics CRM - One Stop Extension Reporting
MS Dynamics CRM - One Stop Extension ReportingMS Dynamics CRM - One Stop Extension Reporting
MS Dynamics CRM - One Stop Extension Reporting
 
Moodle @ eXtension.org
Moodle @ eXtension.orgMoodle @ eXtension.org
Moodle @ eXtension.org
 
Drupal CMS: eXtension’s collaborative workspace
Drupal CMS: eXtension’s collaborative workspaceDrupal CMS: eXtension’s collaborative workspace
Drupal CMS: eXtension’s collaborative workspace
 
Video Streaming: Broadcast quality on a shoe string budget.
Video Streaming: Broadcast quality on a shoe string budget.  Video Streaming: Broadcast quality on a shoe string budget.
Video Streaming: Broadcast quality on a shoe string budget.
 
Getting found - Search Engine Optimizaton
Getting found - Search Engine OptimizatonGetting found - Search Engine Optimizaton
Getting found - Search Engine Optimizaton
 
Frameworks Galore: A Pragmatic Review
Frameworks Galore: A Pragmatic ReviewFrameworks Galore: A Pragmatic Review
Frameworks Galore: A Pragmatic Review
 
Drinking with the horses
Drinking with the horsesDrinking with the horses
Drinking with the horses
 
Developing iPad apps for extension education
Developing iPad apps for extension educationDeveloping iPad apps for extension education
Developing iPad apps for extension education
 
Integrating Technology in a Childhood Obesity Prevention Program: A Practical...
Integrating Technology in a Childhood Obesity Prevention Program: A Practical...Integrating Technology in a Childhood Obesity Prevention Program: A Practical...
Integrating Technology in a Childhood Obesity Prevention Program: A Practical...
 
10 Steps to Lead Extension into the 21st Century
10 Steps to Lead Extension into the 21st Century10 Steps to Lead Extension into the 21st Century
10 Steps to Lead Extension into the 21st Century
 

Recently uploaded

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 

Recently uploaded (20)

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 

Security Roundtable for Desktop and Handheld Devices

Editor's Notes

  1. Welcome!Please feel free to interrupt at any time. The time to answer questions is when you have them, not after you’ve forgotten what didn’t make sense. This is supposed to be for your benefit. If we can answer your questions we’re at least moving in that direction.“I used to use one password for everything. I needed to change, so now I have like 5 and can't remember them." Sound familiar? If this is you, a password safe can help. We'll show you how to easily keep up with hundreds of passwords using the KeePass Password Safe.
  2. An online survey of over 600 respondents showed that the vast majority of people either use the same password everywhere, or have a few passwords they use for all accounts. So what if you try to log in to a site you don’t use everyday and it fails? Most likely you’ll try the other few passwords to see if you used the wrong one. Guess what?...
  3. A “man-in-the-middle” or “impersonation” attack makes any browser and any computer vulnerable. Only your habits can protect you, and you are as vulnerable as your weakest, or most hurried moment.As if on cue, Citi released information that customer data was breached! 6/8/2011
  4. One such program is KeePass. This software is available at no cost from http://www.keepass.info. Donations are encouraged. This software supports the Advanced Encryption Standard (AES, Rijndael) and the Twofish algorithms to encrypt its password databases for strong security and encrypted passwords. There is even a "security level meter" to show how strong your passwords are. It also has a strong random password generator to make up passwords for you.KeePass is portable. It can be carried on a USB thumb drive, or other portable media, and will run on Windows systems without being installed. It can also run other devices and operating systems like Linux, Mac OS X, PocketPC, and Smartphone.Searchable. You can search your database of passwords for specific entries or fields. It is intuitive. It works similar to other Windows based applications. You access features like copy, past, sort just like you do in other Windows programs. It will clear the "clipboard" where copied items reside automatically to increase security.Exportable. The password database can be exported to various formats like TXT, HTML, CSV so that it can be referenced by you or used in or by other programs if necessary. The database is also easily moved in a single file to be used on another computer if you need to. The first thing you till need to do after you download and install KeePass is to create a new database for your passwords. From the KeePass program, you will click on File; New and you will see this page. This is where you will assign your MASTER password. Now you can put your “passphrase” generating skills to work. This password needs to be something you will remember and it needs to meet strong password rules too. To help you meet the strong password rules, there is an estimated quality meter. The farther to the right and greener the bar, the more secure (less guessable) and better the password is. Then you press <OK> and <OK> again at the next window to return to the program. YOU MUST REMEMBER you master password. Don't write it on a post-it and put it on your monitor!From this point, you can start adding your sites!  
  5. You SHOULD use numbers, capital letters, and special characters throughout your phrase. As you can see from our two previous examples: "I was born in Dale County Hospital" and "Imagination is more important than knowledge", many variants can easily be created. . Substituting numbers for vowels, symbols for letters and such, you can be as creative as you desire. The more creative you are and the longer the phrase used, the more secure your password is likely to be. It will be meaningless to others. Iwb1DCH! means nothing - to them. If you use a different passphrase for each different site, even if they DO see it, chances are it will not work for every site.  
  6. Adding entries to your password database is fairly simple and easy to get used to doing. You right click your mouse over the password entry windows and it will pull up this window. You enter all the information for the website here. You can give it a title, enter the username and password for the site, and the URL of the main webpage. You are also able to type in notes about the site. It is important to enter the correct username and password for each site. It is also best to be as descriptive as you can about the information and website in case you need to reference it later.Then press <OK> to go back to the main program.    
  7. One of the nice features of the program is the ability to copy the credentials into the “clip board” and paste them directly into your username and password prompts. It will also open the web page URL’s for you directly from the program in your default browser. That is something else you won’t have to remember or manage!