Get flash to fully experience Pearltrees
Make your PIN code more secure using three unique numbers – Cell Phones & Mobile Device Technology News & UpdatesWith half of the adults in America now owning some sort of smartphone that has access to personal information, hackers are using some simple methods to discover the PIN numbers used to unlock devices. Instead of using high-tech equipment to run an attack, they are simply looking to see where the fingerprint smudges are in relation to the phone’s keypad, then entering the different permutations of the four numbers until they hit on the right one. However, by using an equally as simple method suggested by security expert, Karl Sigler, you can make it harder for someone trying to steal your information from a misplaced or stolen device.
In a recent survey conducted by ZoneAlarm, 79% of consumers were found to use risky password construction practices, such as using personal information and common words. The graphic below illustrates some of the most commonly made mistakes people make when selecting a password, as well as some tips on how to make your password more secure: (click on image to enlarge) Internet Security <img src="http://www.zonealarm.com/blog/wp-content/uploads/2011/01/110110-ZA-PASSWORD.png" alt="How to Avoid the Most Common and Dangerous Passwords" width="500" border="0" /><br /><a href="http://www.zonealarm.com/blog/index.php/2011/01/securing-yourself-from-a-world-of-hackers">Internet Security</a>
Return to vpnc
Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides knows a thing or two about password security—and he knows exactly how he'd hack the weak passwords you use all over the internet.
Password cracking tool instantly reveals cached passwords stored in popular applications
This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories . Computer passwords are like locks on doors – they keep honest people honest.
In an earlier post I had written about how to create an invisible folder .
I quite often get people asking me where to get Wordlists, after all brute forcing and password cracking often relies on the quality of your word list. Do note there are also various tools to generate wordlists for brute forcing based on information gathered such as documents and web pages (such as Wyd – password profiling tool ) These are useful resources that can add unique words that you might not have if your generic lists. Also add all the company related words you can and if possible use industry specific word lists (chemical names for a lab, medical terms for a hospital etc).
John the Ripper has been out there for a long time, it’s a great tool for auditing passwords.