CONFOCALMICROSCOPY Archives

August 2011

CONFOCALMICROSCOPY@LISTS.UMN.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Stephen C. Kempf" <[log in to unmask]>
Reply To:
Confocal Microscopy List <[log in to unmask]>
Date:
Wed, 10 Aug 2011 15:50:32 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (77 lines)
*****
To join, leave or search the confocal microscopy listserv, go to:
http://lists.umn.edu/cgi-bin/wa?A0=confocalmicroscopy
*****

One thing I've always wondered is why systems can't be set-up so they won't accept more than one password attempt on a given account every 1 sec, 5 sec or whatever. I suppose this might be a problem if large numbers of people had to access the same account, but other than that I would think this would greatly reduce the number of successful hacks. Of course, maybe I'm missing something, if so, enlighten me. (-;{

Steve

On Aug 10, 2011, at 3:12 PM, Guy Cox wrote:

> *****
> To join, leave or search the confocal microscopy listserv, go to:
> http://lists.umn.edu/cgi-bin/wa?A0=confocalmicroscopy
> *****
> 
> Martin, 
> 
>            It's probably right, but 1000 guesses per second would require a connection speed way beyond even what I get on campus to another on-campus computer.  Even 100 per second (one month) seems implausible.  At 10 guesses per second you're looking at 2½ years ... And any system that will allow you 268,435,456 attempts at logging in before it freezes you out is terminally insecure!  (MS exchange allows 5 tries).
> 
> 		The four random words thing is fine provided that (a) only very few do it and (b) the words truly are random.  But if it catches on then all a cracking algorithm has to do is try every combination of dictionary words that add up to the password length, a vastly simpler task.
> 
>                                        Guy
> 
> 
> Optical Imaging Techniques in Cell Biology
> by Guy Cox    CRC Press / Taylor & Francis
>     http://www.guycox.com/optical.htm
> ______________________________________________
> Associate Professor Guy Cox, MA, DPhil(Oxon) 
> Australian Centre for Microscopy & Microanalysis, 
> Madsen Building F09, University of Sydney, NSW 2006 
> 
> Phone +61 2 9351 3176     Fax +61 2 9351 7682
>             Mobile 0413 281 861
> ______________________________________________
>      http://www.guycox.net
> 
> 
> 
> -----Original Message-----
> From: Confocal Microscopy List [mailto:[log in to unmask]] On Behalf Of Martin Wessendorf
> Sent: Thursday, 11 August 2011 5:31 AM
> To: [log in to unmask]
> Subject: Password Strength
> 
> *****
> To join, leave or search the confocal microscopy listserv, go to:
> http://lists.umn.edu/cgi-bin/wa?A0=confocalmicroscopy
> *****
> 
> Dear List--
> 
> I can't say I've ever sent a link for a webcomic to the confocal list, 
> but here goes.
> 
> http://xkcd.com/936/
> 
> (As far as I know, clicking on this link will not infect your computer 
> with a virus or take you to a porn site.)
> 
> Anybody able to verify or disprove this?  Intuitively, it makes sense, 
> but so do a lot of things that are wrong.
> 
> Martin
> -- 
> Martin Wessendorf, Ph.D.                   office: (612) 626-0145
> Assoc Prof, Dept Neuroscience                 lab: (612) 624-2991
> University of Minnesota             Preferred FAX: (612) 624-8118
> 6-145 Jackson Hall, 321 Church St. SE    Dept Fax: (612) 626-5009
> Minneapolis, MN  55455                    e-mail: [log in to unmask]
> 
> -----
> No virus found in this message.
> Checked by AVG - www.avg.com
> Version: 10.0.1391 / Virus Database: 1520/3824 - Release Date: 08/09/11

ATOM RSS1 RSS2