Re: Security Audits (RE: Two million passwords stolen and posted online)

Subject: Re: Security Audits (RE: Two million passwords stolen and posted online)
From: Kathleen MacDowell <kathleen -dot- eamd -at- gmail -dot- com>
To: Dan Goldstein <DGoldstein -at- cytomedix -dot- com>
Date: Thu, 5 Dec 2013 19:25:29 -0600

Thanks!


On Thu, Dec 5, 2013 at 12:31 PM, Dan Goldstein <DGoldstein -at- cytomedix -dot- com>wrote:

> Here's an analysis of, and improvement on, the XKCD tutorial:
>
> https://xato.net/passwords/analyzing-the-xkcd-comic/#.UqDFduLjS6A
>
>
> -----Original Message-----
> From: Dan Goldstein
> Sent: Thursday, December 05, 2013 11:04 AM
> To: TECHWR-L (techwr-l -at- lists -dot- techwr-l -dot- com)
> Subject: RE: Security Audits (RE: Two million passwords stolen and posted
> online)
>
> I think perhaps the password strength rating lacks a clear definition of
> "password strength."
>
> In this regard, see http://xkcd.com/936/
>
>
> -----Original Message-----
> From: Kathleen MacDowell
> Sent: Thursday, December 05, 2013 10:52 AM
> To: Mike McCallister
> Cc: techwr-l -at- techwr-l -dot- com
> Subject: Security Audits (RE: Two million passwords stolen and posted
> online)
>
> I haven't read through this article yet, but it might be helpful to anyone
> who's concerned: "How to Run a Last Pass Security Audit (and Why It Canât
> Wait).
>
> This is at today's How To Geek, which is a helpful and often entertaining
> newsletter.
>
>
> http://www.howtogeek.com/176038/how-to-run-a-last-pass-security-audit-and-why-it-cant-wait/
>
>
>
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> New! Doc-to-Help 2013 features the industry's first HTML5 editor for
> authoring.
>
> Learn more: http://bit.ly/ZeOZeQ
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> You are currently subscribed to TECHWR-L as kathleen -dot- eamd -at- gmail -dot- com -dot-
>
> To unsubscribe send a blank email to
> techwr-l-leave -at- lists -dot- techwr-l -dot- com
>
>
> Send administrative questions to admin -at- techwr-l -dot- com -dot- Visit
> http://www.techwhirl.com/email-discussion-groups/ for more resources and
> info.
>
> Looking for articles on Technical Communications? Head over to our online
> magazine at http://techwhirl.com
>
> Looking for the archived Techwr-l email discussions? Search our public
> email archives @ http://techwr-l.com/archives
>



--
Kathleen MacDowell
kathleen -dot- eamd -at- gmail -dot- com


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
New! Doc-to-Help 2013 features the industry's first HTML5 editor for authoring.

Learn more: http://bit.ly/ZeOZeQ

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

You are currently subscribed to TECHWR-L as archive -at- web -dot- techwr-l -dot- com -dot-

To unsubscribe send a blank email to
techwr-l-leave -at- lists -dot- techwr-l -dot- com


Send administrative questions to admin -at- techwr-l -dot- com -dot- Visit
http://www.techwhirl.com/email-discussion-groups/ for more resources and info.

Looking for articles on Technical Communications? Head over to our online magazine at http://techwhirl.com

Looking for the archived Techwr-l email discussions? Search our public email archives @ http://techwr-l.com/archives


References:
RE: Security Audits (RE: Two million passwords stolen and posted online): From: Dan Goldstein

Previous by Author: decision trees and localization
Next by Author: Re: Security Audits (RE: Two million passwords stolen and posted online)
Previous by Thread: RE: Security Audits (RE: Two million passwords stolen and posted online)
Next by Thread: Re: Security Audits (RE: Two million passwords stolen and posted online)


What this post helpful? Share it with friends and colleagues:


Sponsored Ads