test content
What is the Arc Client?
Install Arc

- How To Make A Star Trek Like Secure Password -

SystemSystem Member, NoReporting Posts: 178,019 Arc User
edited February 2012 in Ten Forward
HOW TO MAKE A STAR TREK LIKE SECURE PASSWORD

Make sure your STO account isn't TRIBBLE. Make a Strong password.

In star trek first contact Captain Picard activates the U.S.S. ENTERPRISE 1701 E Autodestruct.
youtu.be/IvTfbQRnA8s

PICARD47ALPHATANGO
WORF37GAMMAECHO
CRUSHER22BETACHARLIE


Janeway sets selfdestruct for U.S.S. Voyager NCC-74656
youtu.be/qNTHnPbVtsw

JANEWAYPi110

Use a format like this Expample:

( Last name ) ( The 3 numbers of the middle of your social security number ) ( Greek alphabet ) ( Greek alphabet )

Don't have the last two the same. like Alpha, Alpha. Mix them. Put Upper & Lower Case letters in the password. Test our your password at the website below.

Test your new Password out.
www.passwordmeter.com/

Entire List of Greek Alphabet
www.physlink.com/reference/greekalphabet.cfm
Post edited by Unknown User on

Comments

  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    Hmmm maybe I should change my: 12345678 password?
    I'm just messing, my actual password is much more secure than that
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    Hmmm maybe I should change my: 12345678 password?
    I'm just messing, my actual password is much more secure than that

    Yes, you should add a 9 to the end. Nobody expects that.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    Hmm mine was very strong
    interesting. I am tempted to use this idea seeing that my current password is only 95%
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    Holy ****! That's the same code I use on my luggage!
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    I much prefer the Garibaldi password from Babylon 5.

    Garibaldi "Reset Command Code Password, this is Chief of Security Michael Garibaldi. Password: Peekaboo"

    Ivanova:(Looking at Garibaldi) "Peekaboo?"

    Garibaldi (to Ivanova) "Would you have guessed it?"
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    I tried this, but when I typed "000destruct0", my computer exploded.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    OOP wrote: »
    Test your new Password out.
    www.passwordmeter.com/

    Transmitting my password to a site to see how strong it is makes my eye twitch. :eek:

    This is the most intelligent thing I've ever seen about modern passwords.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    hort_wort wrote: »
    Transmitting my password to a site to see how strong it is makes my eye twitch. :eek:

    This is the most intelligent thing I've ever seen about modern passwords.

    haha, nice.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    hort_wort wrote: »
    Transmitting my password to a site to see how strong it is makes my eye twitch. :eek:

    This is the most intelligent thing I've ever seen about modern passwords.

    There's some good counters to this, though. A common variation on a dictionary attack will get the second in about 9 days (still longer than brute forcing the complex password), but will never solve the first. Tables specifically designed for multiple dictionary words can get that down to a few hours, or even down to minutes if you can narrow the word list (say, 7 letter maximum and common nouns only - which would crack the xkcd example but fail against many others), provided of course you're reasonably certain when you start that this type of password is in use.


    The real problem, though, is that actually breaking passwords is very, very rare. On the order of single digit percents of actual security breaches. Even a password that can be cracked in a matter of seconds is unlikely to be broken before password policies automatically lock the account out entirely.

    The vast majority of consumer-level security breaches are captured passwords - keyloggers and phishing scams have been the primary means of stealing bank accounts since the Windows 95 days, and they've exploded into the MMO world to the point that gold farmers almost never actually farm gold, but harvest it from accounts they took by simply capturing passwords.

    A 680 character password that requires a second keyboard and special control codes to input might as well be "aaaaaa" if a keylogger is involved.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    pvnrt wrote:
    Holy ****! That's the same code I use on my luggage!

    Yay you won the cake! :D
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    There's also what's referred to as "lead-pipe cryptanalysis", as noted in another xkcd strip and this Schlock Mercenary strip.

    If someone really wants your password, they'll get it.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    hevach wrote: »
    There's some good counters to this, though. A common variation on a dictionary attack will get the second in about 9 days (still longer than brute forcing the complex password), but will never solve the first.

    Well, yeah, if the guy sets up an attack knowing that you used words with lowercase letters, no numbers, and is so sure of that he's willing to commit his computer to 9 days trying to guess it.... :p
    HF_Mudd wrote:
    There's also what's referred to as "lead-pipe cryptanalysis", as noted in another xkcd strip and this Schlock Mercenary strip.

    If someone really wants your password, they'll get it.

    Hah! Yeah, that was a good one too. Reminds me of the story about NASA investing a million $ in a study to figure out how to use a pen in space. Russians used a pencil. :rolleyes:
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    Everyone seems to think they know how to make a secure password, but they end up making passwords that are difficult for humans to remember and easy for machines to crack, as they have fewer bits of entrophy.

    http://xkcd.com/936/
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    OOP wrote: »
    Test your new Password out.
    www.passwordmeter.com/

    Entire List of Greek Alphabet
    www.physlink.com/reference/greekalphabet.cfm

    I doubt its findings. It said "Passw0rd!" was secure.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    ( incidentally, I've been reminded that a rubber hose is also an acceptable, and possibly preferred, implement. )
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    I'm waiting for the day someone creates a password so complex, they forget it themselves. Saw a picture once with a circle graph representing who can't crack their super-complex password:

    Hackers: 1%
    Me: 99%

    FYI: An American SSN has two middle digits and is generally in the format of 3-2-4. Canadians follow the 3-3-3 format, IIRC.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    I'm waiting for the day someone creates a password so complex, they forget it themselves.

    I actually get this a lot at my shop, people lock themselves out of their laptops all the time, usually because they make a complex password and can't remember if it's a capital X or >< or whatever, or an obscure hint that they then can't decipher. Got it enough that I separated it from my general boot resolution service and gave it a cheap while-you-wait price, since no matter how good the password is it's a 5 minute hack on a Windows system.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    I like http://howsecureismypassword.net/ , tells you how secure your password is by suggesting how long it would take a pc to crack it.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    certurash wrote:
    I like http://howsecureismypassword.net/ , tells you how secure your password is by suggesting how long it would take a pc to crack it.

    13 Quadrillion Years. That should be sufficient. :p
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    Jupiter Broadcasting covered password security a few months back using this site 'My Last Pass', it works very will for me.
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    I change my password frequently and random never the same constantanly changing don't give em time to adapt always works lol
  • Archived PostArchived Post Member Posts: 2,264,498 Arc User
    edited February 2012
    "If you like Pina Coladas in the falling rain"

    Will take about About 5 vigintillion years to hack.

    The first paragraph of The Lord of the Rings: About 150 trigintillion years
Sign In or Register to comment.