- 最后登录
- 2012-7-10
- 在线时间
- 143 小时
- 寄托币
- 903
- 声望
- 24
- 注册时间
- 2009-3-21
- 阅读权限
- 25
- 帖子
- 9
- 精华
- 0
- 积分
- 864
- UID
- 2619326

- 声望
- 24
- 寄托币
- 903
- 注册时间
- 2009-3-21
- 精华
- 0
- 帖子
- 9
|
昨天的comments作业
https://bbs.gter.net/thread-1045471-1-1.html
Useful words and expressions:
dog-eared书页折角的,
aplenty丰富,
flout轻视,
vault地窖,
consolation抚慰,
aversion反感, averse反对的,不愿意的
jumbled混乱的,
alphanumeric字母数字混合的,
entropy熵,
encryption加密,加密术, encrypt把……译成密码
mnemonic记忆的,助记的
be locked up,
staying in touch with,
heaven forbid, 万万不可地
on scraps of paper,
crackable words,
Post-it notes便条纸,
brute-force methods暴力搜索法,
Best to最好是,
He considers it crucial in order to keep abreast of(跟上某事物的发展) all the ingenious technology which, once debugged by the world’s most acquisitive consumers, will wind up in American and European shops a year or two later.
For ordinary purposes, that would seem overkill小题大做的.
Choose passwords that are strong enough to make cracking them too time consuming for thieves to bother.
A good length is at least eight symbols.
A password with 64 bits of entropy is as strong as a string of data comprising 64 randomly selected binary digits. Put another way, a 64-bit password would require 2 raised to the power of 64 attempts to crack it by brute force—in short, 18 billion billion attempts.
Your correspondent has been experimenting with LastPass.
To be on the safe side, however, his dog-eared list of passwords will still go with him.
My comments:
I am very excited to read such a report about technology. For the past week, boring articles on politics and economy, though useful for improving my reading ability, have made me feel sick. Partly because of my major of engineering or links to our daily life, it costs me relatively less time to finish the reading.
The report starts by posting a question of how to preserve our logons and passwords use to surf the web from being thieved by hackers. Then the writer introduces the easiness of cracking an ordinary password, followed by the relationship between the safety and the length, complexity and randomness (or entropy) of a password. Sometimes it is jumbled to memorize different logons and passwords used in different web sites. Therefore, some software managers aimed to help us administer our passwords or ever shopping on lines are introduced. However, the point of reliance on software being not a securest method after all is stated in the end.
This article makes me think about something convenient and, to some extent, deleterious technology brings us. Cell phones combine us with wireless communication, but radiowave contamination followed. Automobile replaces our foot to get to a far distance, yet tail gas it produces is warming our earth everyday. Like the report here introduces, while the internet is becoming a new part of our modern life, it becomes another thread to our privacy. Dealing with such tough problems is a contradiction itself. As far as I am concerned, negatively maybe, the most original method is available, just like the ending of the report. |
|