- 最后登录
- 2013-3-19
- 在线时间
- 362 小时
- 寄托币
- 605
- 声望
- 38
- 注册时间
- 2008-8-18
- 阅读权限
- 20
- 帖子
- 0
- 精华
- 0
- 积分
- 542
- UID
- 2533330
 
- 声望
- 38
- 寄托币
- 605
- 注册时间
- 2008-8-18
- 精华
- 0
- 帖子
- 0
|
发表于 2009-12-27 22:04:45
|显示全部楼层
My comment
Since my major in Information Security at college just covers the subject of this article, I have a lot of comments to make on it from the professional perspective. The article introduced several method of password cracking, and described to audiences how powerful the password crackers. In fact, depending on the computer technology, there are many approaches to protect our passwords from being cracked. Unfortunately, just like the article mentioned, it is a very general appearance that some people write their usernames and passwords down on scraps of paper, and some others save them with a document including even the information of their bank account. The lack of safe consciousness will bring a great loss.
Tech.view
Passwords aplenty
Dec 18th 2009 | LOS ANGELES
From Economist.com
How to stay sane as well as safe while surfing the web
surfing【Surfing is the activity of looking at different sites on the Internet, especially when you are not looking for anything in particular. (COMPUTING)】
AT THIS time of the year, your correspondent crosses the Pacific to Japan for a month or so. He repeats the trip during the summer. He considers it crucial in order to keep abreast of all the ingenious【Something that is ingenious is very clever and involves new ideas, methods, or equipment.】 technology which, once debugged by the world’s most acquisitive【If you describe a person or an organization as acquisitive, you do not approve of them because you think they are too concerned with getting new possessions.】 consumers, will wind up【终止】 in American and European shops a year or two later.
Each time he packs his bags, though, he is embarrassed by having to include a dog-eared【A book or piece of paper that is dog-eared has been used so much that the corners of the pages are turned down or torn.】 set of notes that really ought to be locked up in a safe. This is his list of logons and passwords for all the websites he uses for doing business and staying in touch with the rest of the world. At the last count, the inch-thick list accumulated over the past decade or so—your correspondent’s sole copy—includes access details for no fewer than 174 online services and computer networks.
He admits to flouting【If you flout something such as a law, an order, or an accepted way of behaving, you deliberately do not obey it or follow it.】 the advice of security experts: his failings include using essentially the same logon and password for many similar sites, relying on easily remembered words—and, heaven forbid【这个纯属娱乐,翻译成:天理不容】, writing them down on scraps of paper. So his new year’s resolution is to set up a proper software vault【储藏室A vault is a secure room where money and other valuable things can be kept safely.】 for the various passwords and ditch【If you ditch something that you have or are responsible for, you abandon it or get rid of it, because you no longer want it. (INFORMAL)】 the dog-eared list.
Your correspondent’s one consolation is that he is not alone in using easily crackable words for most of his passwords. Indeed, the majority of online users have an understandable aversion【If you have an aversion to someone or something, you dislike them very much.】 to strong, but hard-to-remember, passwords. The most popular passwords in Britain are “123” followed by “password”. At least people in America have learned to combine letters and numbers. Their most popular ones are “password1” followed by “abc123”.
Unfortunately, the easier a password is to remember, the easier it is for thieves to guess. Ironically, the opposite—the harder it is to remember, the harder it is to crack—is often far from true. That is because, not being able to remember long, jumbled sets of alphanumeric characters interspersed with【If one group of things are interspersed with another or interspersed among another, the second things occur between or among the first things.】 symbols, people resort to writing them down on Post-it notes left lying around the office or home for all and sundry【All and sundry means everyone.】 to see.
Apart from stealing passwords from Post-it notes and the like, intruders【An intruder is a person who goes into a place where they are not supposed to be.】 basically use one of two hacks to gain access to other people’s computers or networks. If time and money is no problem, they can use brute-force methods【暴力破解法】 that simply try every combination of letters, numbers and symbols until a match is found. That takes a lot of patience and computing power, and tends to be the sort of thing only intelligence agencies indulge in.
A more popular, though less effective, way is to use commercial software tools such as “L0phtCrack” or “John the Ripper” that can be found on the internet. These use dictionaries, lists of popular passwords and rainbow tables (lookup tools that turn long numbers computed from alphanumeric characters back into their original plain text) to recover passwords.
According to Bruce Schneier, an independent security expert, today’s password crackers “can test tens—even hundreds—of millions of passwords per second.” In short, the vast majority of passwords used in the real world can be guessed in minutes. And do not think you are being smart by replacing the letters “l” or “i” in a password with the number “1”; or the letter “s” with the number “5” or the symbol “$”. Cracking programs check all such alternatives, and more, as a matter of course.
What should you do to protect yourself? Choose passwords that are strong enough to make cracking them too time consuming for thieves to bother.
The strength of a password depends on its length, complexity and randomness. A good length is at least eight symbols. The complexity depends on the character set. Using numbers alone limits the choice to just ten symbols. Add upper- and lower-case letters and the complexity rises to 62. Use all the symbols on a standard ASCII keyboard and you have 95 to choose from.
The third component, randomness, is measured by a concept borrowed from thermodynamics【热力学Thermodynamics is the branch of physics that is concerned with the relationship between heat and other forms of energy.】—the notion of entropy (the tendency for things to become disordered). In information theory, a tossed coin has an entropy of one “bit” (binary digit). That is because it can come down randomly in one of two equally possible binary states.
At the other extreme, when you set the encryption of a Wi-Fi link, you are usually given the choice of 64-bit or even 128-bit security. Those bit-numbers represent the entropy (or randomness) of the encryption used. A password with 64 bits of entropy is as strong as a string of data comprising 64 randomly selected binary digits. Put another way, a 64-bit password would require 2 raised to the power of 64【2的64次方】 attempts to crack it by brute force—in short, 18 billion billion attempts. A 64-bit password was finally cracked in 2002 using brute-force methods. It took a network of volunteers nearly five years to do so.
The National Institute of Standards and Technology, the American government’s standards-measuring laboratory in Gaithersburg, Maryland, recommends 80-bit passwords for state secrets and the like. Such security can be achieved using passwords with 12 symbols, drawn from【To draw something from a particular thing or place means to take or get it from that thing or place.】 the full set of 95 symbols on the standard American keyboard. For ordinary purposes, that would seem overkill. A 52-bit password based on eight symbols selected from the standard keyboard is generally adequate.
How to select the eight? Best to let a computer program generate them randomly for you. Unfortunately, the result will be something like 6sDt%k&3 that probably needs to be written down. One answer, only slightly less rigorous【A test, system, or procedure that is rigorous is very thorough and strict.】, is to use a mnemonic【A mnemonic is a word, short poem, or sentence that is intended to help you remember things such as scientific rules or spelling rules.】 constructed from the first letters (plus contractions) of an easily remembered phrase like “Murder Considered as One of the Fine Arts” (MCa1otFA) or “To be or not to be: that is the question” (2Bo-2b:?).
Given a robust【robust在上一篇文章里形容的是system,这里用来形容password】 52-bit password, you can then use a password manager to take care of the dozens of easily guessable ones used to access various web services. There are a number of perfectly adequate products for doing this. In an early attempt to fulfil his new year’s pledge, your correspondent has been experimenting with LastPass, a free password manager that works as an add-on to the Firefox web browser for Windows, Linux or Macintosh. Versions also exist for Internet Explorer on Windows and Safari on the Mac.
Once installed and given a strong password of its own, plus an e-mail address, LastPass encrypts all the logons and passwords stored on your computer. So, be warned: forget your master password and you could be in trouble—especially if you have let the program delete (as it urges you to let it do) all the vulnerable logons and passwords on your own computer.
Thereafter, to visit various web services, all you have to do is log into LastPass and click the website you wish to check out. The tool then automatically logs you on securely to the selected site. It will even complete all the forms needed to buy goods online if you have stored your home address, telephone number and credit-card details in the vault as well.
Your correspondent looks forward to using the service while travelling around Japan over the next month or so. To be on the safe side, however, his dog-eared list of passwords will still go with him. |
|