Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Insider News
  4. Barbarians at the password gate

Barbarians at the password gate

Scheduled Pinned Locked Moved The Insider News
comsecurity
9 Posts 4 Posters 2 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K Offline
    K Offline
    Kent Sharkey
    wrote on last edited by
    #1

    Techcrunch[^]:

    If you haven’t had your password hijacked, it’s really just a matter of time.

    Here's my new idea: every login form will have a new checkbox, "Yes, it's really me, not a hacker." Bulletproof security!

    M L N 3 Replies Last reply
    0
    • K Kent Sharkey

      Techcrunch[^]:

      If you haven’t had your password hijacked, it’s really just a matter of time.

      Here's my new idea: every login form will have a new checkbox, "Yes, it's really me, not a hacker." Bulletproof security!

      M Offline
      M Offline
      Michael Pauli
      wrote on last edited by
      #2

      What about the hacker then? There must be a constitutional founded legislation enabling even hacker-scumbacks to login now and then. Or otherwise you could just as well disable the checkmark to begin with if the current loged in user has a TRUE marking for Session.User.IsHacker <--- you know that one?

      Michael Pauli

      1 Reply Last reply
      0
      • K Kent Sharkey

        Techcrunch[^]:

        If you haven’t had your password hijacked, it’s really just a matter of time.

        Here's my new idea: every login form will have a new checkbox, "Yes, it's really me, not a hacker." Bulletproof security!

        L Offline
        L Offline
        Lost User
        wrote on last edited by
        #3

        Crunsh wrote:

        A hacker armed with the right password can get almost anything of yours

        Imagine what a thief can do if they have the key :thumbsup:

        Crunch wrote:

        Hackers generally buy your password from data breaches.

        ..and the companies where passwords are "stolen" should be held financially liable for all consequences thereof. As long as it is not, there will not be an incentive (and hence, budget) to secure anything. Larger companies have proven this to be true. It's simply cheaper to do some marketing in case of fire, as opposed to prevention. Any system that "knows" your password (by mailing it to you, best proof that it is saved in the database in a readable form) is insecure. And no, there is NO EXCUSE for saving a password in your database.

        Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^]

        M N 2 Replies Last reply
        0
        • L Lost User

          Crunsh wrote:

          A hacker armed with the right password can get almost anything of yours

          Imagine what a thief can do if they have the key :thumbsup:

          Crunch wrote:

          Hackers generally buy your password from data breaches.

          ..and the companies where passwords are "stolen" should be held financially liable for all consequences thereof. As long as it is not, there will not be an incentive (and hence, budget) to secure anything. Larger companies have proven this to be true. It's simply cheaper to do some marketing in case of fire, as opposed to prevention. Any system that "knows" your password (by mailing it to you, best proof that it is saved in the database in a readable form) is insecure. And no, there is NO EXCUSE for saving a password in your database.

          Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^]

          M Offline
          M Offline
          Michael Pauli
          wrote on last edited by
          #4

          What about an Al-Queda-version instead?: If security is so insecure to begin with why not remove it all together? Therefore a name should be enough. Also passwords are so difficult to remember - right? On attempts to login on other peoples behalf a finger are chubbed off at the local police station and on following attempts another finger. On the 10'th attempt no more fingers are left and he/she can't login anymore. Set and done! Top security and as a result - over time - no more security are compromised.

          Michael Pauli

          1 Reply Last reply
          0
          • K Kent Sharkey

            Techcrunch[^]:

            If you haven’t had your password hijacked, it’s really just a matter of time.

            Here's my new idea: every login form will have a new checkbox, "Yes, it's really me, not a hacker." Bulletproof security!

            N Offline
            N Offline
            newton saber
            wrote on last edited by
            #5

            Have you seen this dashlane[^] thing? It is an interesting concept for storing retrieving passwords. I just saw the commercial over the weekend and I had been thinking about just such an application.

            K 1 Reply Last reply
            0
            • L Lost User

              Crunsh wrote:

              A hacker armed with the right password can get almost anything of yours

              Imagine what a thief can do if they have the key :thumbsup:

              Crunch wrote:

              Hackers generally buy your password from data breaches.

              ..and the companies where passwords are "stolen" should be held financially liable for all consequences thereof. As long as it is not, there will not be an incentive (and hence, budget) to secure anything. Larger companies have proven this to be true. It's simply cheaper to do some marketing in case of fire, as opposed to prevention. Any system that "knows" your password (by mailing it to you, best proof that it is saved in the database in a readable form) is insecure. And no, there is NO EXCUSE for saving a password in your database.

              Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^]

              N Offline
              N Offline
              newton saber
              wrote on last edited by
              #6

              I had joked that the way to keep your passwords secure is to never know them. Create some 100 character mess by mashing on the keyboard and then, just request a new password every time you sign in. I know. I know. GENIUS!!! well, as long as the email acct associated with the password recovery is good, then you are ok.

              L 1 Reply Last reply
              0
              • N newton saber

                Have you seen this dashlane[^] thing? It is an interesting concept for storing retrieving passwords. I just saw the commercial over the weekend and I had been thinking about just such an application.

                K Offline
                K Offline
                Kent Sharkey
                wrote on last edited by
                #7

                Interesting. No, I hadn't heard of them. Looks at first glance to be yet another LastPass[^], 1Password[^], etc. clone, but it does seem to to a bit more than them. Thanks.

                TTFN - Kent

                1 Reply Last reply
                0
                • N newton saber

                  I had joked that the way to keep your passwords secure is to never know them. Create some 100 character mess by mashing on the keyboard and then, just request a new password every time you sign in. I know. I know. GENIUS!!! well, as long as the email acct associated with the password recovery is good, then you are ok.

                  L Offline
                  L Offline
                  Lost User
                  wrote on last edited by
                  #8

                  The password should not be sent (be known to me as an employee), but stored as a hash. If need be, one could reset it. From, say, an email account.

                  Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^]

                  N 1 Reply Last reply
                  0
                  • L Lost User

                    The password should not be sent (be known to me as an employee), but stored as a hash. If need be, one could reset it. From, say, an email account.

                    Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^]

                    N Offline
                    N Offline
                    newton saber
                    wrote on last edited by
                    #9

                    You are right. I should've said that more clearly. I meant "send me a temporary generated one". Then I can forget about that one and get a new one next time.

                    1 Reply Last reply
                    0
                    Reply
                    • Reply as topic
                    Log in to reply
                    • Oldest to Newest
                    • Newest to Oldest
                    • Most Votes


                    • Login

                    • Don't have an account? Register

                    • Login or register to search.
                    • First post
                      Last post
                    0
                    • Categories
                    • Recent
                    • Tags
                    • Popular
                    • World
                    • Users
                    • Groups