|
Chicken soup - the universal cure all.
-- any Jewish grandmother
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
Daniel Pfeffer wrote: -- any Jewish grandmother I'm pretty sure that grannies are stamped with a biscuit cutter.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
You're probably right.
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
I used to work with a guy who wrote "spaghetti code", does that count?
|
|
|
|
|
Only if it was noodle soup.
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
Of the many, many, many bad things about passwords, you know what the worst is? Password rules. And by that he means, 'fragrant effluvia of male bovines that helps wildflowers to grow in meadows.'
However, he seems to imply that's a bad thing? Perhaps I'm mistaken.
|
|
|
|
|
Oh good, my main password sabai-dee is not on the list.
|
|
|
|
|
Yup.
According to the rules laid down in the article, you're safe to keep using it.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
It means, "I'm fine" in Thai.
|
|
|
|
|
I was commenting more along the lines of: There is no rule mentioned about posting your passwords on message boards.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
A problem with his minimum length only "rule" is that once every site, system, etc adopts that then all the hacked passwords will be at least that long. Then his "only need to check this tiny list of hacked passwords with length greater than 10" won't be so tiny any longer.
A false sense of security.
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
I agree.
If you have rules, the hackers know them, and that means their job is easier.
|
|
|
|
|
The only winning move is not to play...
... By rules you read on the Internet.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
And nothing in the article or in the comments (or at least in as many of the comments that I read) mention passwords with short expiration dates. The worst are those that last 30 days. This instantly means that they are monthly and the easiest way of dealing with them is some algorithm that includes the month in its contents, e.g. P201703£ for March 2017, P201704$ for April 2017 (Using Shift-lastCharInMonth as the special char). [My actual algorithm for my 30-day expiring passwords is (slightly) more complex than this one and has been used successfully for 19 years!]
|
|
|
|
|
jsc42 wrote: My actual algorithm for my 30-day expiring passwords is (slightly) more complex than this one... Try to explain about an algorithm to the secretary, the salesman or other non-tech positions in a company. Password rules end with a password that they can not remember and write down to a post it on the monitor or in the top drawer
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Malicious apps were surreptitiously added somewhere along the supply chain. Why waste time and hack them after they leave the factory?
|
|
|
|
|
Shh, or everyone will want one!
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Having begun my time here covering the late 1990s email/collaboration battles between Lotus Notes/Domino, Microsoft Outlook/Exchange, and, yes, Novell GroupWise, it’s interesting to see IBM, which bought Lotus in 1995, pledging to support Domino and Notes for, well, an open-ended long period of time. Because the good die young
|
|
|
|
|
Title correction.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Ions oscillate in synchrony, but will do so only if there is some noise. So, now you can save them in a bottle?
|
|
|
|
|
The broader .NET community is porting .NET Core to various Internet of Things (IoT) platforms, including Raspberry Pi 2 and 3. Silly people, raspberries don't have cores, they're drupes
|
|
|
|
|
But if they ported Swift to it first, it'd have an apple core.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
|
Well, given this and the other news article a few posts down, it seems that my article on Merkle trees that should be ready for posting by Monday will be quite relevant.
Marc
|
|
|
|
|
Cultivating a ‘memory palace’ can make long-lasting improvements to recall, say scientists, suggesting many of us have untapped memory reserves. Ancient wisdom is wisdom for a reason
|
|
|
|