RE: Security Audits (RE: Two million passwords stolen and posted online)

Subject: RE: Security Audits (RE: Two million passwords stolen and posted online)
From: "Elissa K. Miller" <emiller -at- doubleknot -dot- com>
To: <techwr-l -at- lists -dot- techwr-l -dot- com>
Date: Thu, 5 Dec 2013 12:20:22 -0800

Meanwhile, I'm changing all my passwords to correcthorsebatterystaple. Wasn't that XKCD's point?


-----Original Message-----
From: techwr-l-bounces+emiller=doubleknot -dot- com -at- lists -dot- techwr-l -dot- com [mailto:techwr-l-bounces+emiller=doubleknot -dot- com -at- lists -dot- techwr-l -dot- com] On Behalf Of Dan Goldstein
Sent: Thursday, December 05, 2013 10:31 AM
To: TECHWR-L (techwr-l -at- lists -dot- techwr-l -dot- com)
Subject: RE: Security Audits (RE: Two million passwords stolen and posted online)

Here's an analysis of, and improvement on, the XKCD tutorial:

https://xato.net/passwords/analyzing-the-xkcd-comic/#.UqDFduLjS6A


-----Original Message-----
From: Dan Goldstein
Sent: Thursday, December 05, 2013 11:04 AM
To: TECHWR-L (techwr-l -at- lists -dot- techwr-l -dot- com)
Subject: RE: Security Audits (RE: Two million passwords stolen and posted online)

I think perhaps the password strength rating lacks a clear definition of "password strength."

In this regard, see http://xkcd.com/936/


-----Original Message-----
From: Kathleen MacDowell
Sent: Thursday, December 05, 2013 10:52 AM
To: Mike McCallister
Cc: techwr-l -at- techwr-l -dot- com
Subject: Security Audits (RE: Two million passwords stolen and posted online)

I haven't read through this article yet, but it might be helpful to anyone who's concerned: "How to Run a Last Pass Security Audit (and Why It Canât Wait).

This is at today's How To Geek, which is a helpful and often entertaining newsletter.

http://www.howtogeek.com/176038/how-to-run-a-last-pass-security-audit-and-why-it-cant-wait/




^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
New! Doc-to-Help 2013 features the industry's first HTML5 editor for authoring.

Learn more: http://bit.ly/ZeOZeQ

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

You are currently subscribed to TECHWR-L as emiller -at- doubleknot -dot- com -dot-

To unsubscribe send a blank email to
techwr-l-leave -at- lists -dot- techwr-l -dot- com


Send administrative questions to admin -at- techwr-l -dot- com -dot- Visit http://www.techwhirl.com/email-discussion-groups/ for more resources and info.

Looking for articles on Technical Communications? Head over to our online magazine at http://techwhirl.com

Looking for the archived Techwr-l email discussions? Search our public email archives @ http://techwr-l.com/archives



^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
New! Doc-to-Help 2013 features the industry's first HTML5 editor for authoring.

Learn more: http://bit.ly/ZeOZeQ

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

You are currently subscribed to TECHWR-L as archive -at- web -dot- techwr-l -dot- com -dot-

To unsubscribe send a blank email to
techwr-l-leave -at- lists -dot- techwr-l -dot- com


Send administrative questions to admin -at- techwr-l -dot- com -dot- Visit
http://www.techwhirl.com/email-discussion-groups/ for more resources and info.

Looking for articles on Technical Communications? Head over to our online magazine at http://techwhirl.com

Looking for the archived Techwr-l email discussions? Search our public email archives @ http://techwr-l.com/archives


References:
RE: Security Audits (RE: Two million passwords stolen and posted online): From: Dan Goldstein

Previous by Author: RE: 12 High-Paying Jobs For People Who Don't Like Math
Next by Author: RE: Creative Labeling
Previous by Thread: Re: Security Audits (RE: Two million passwords stolen and posted online)
Next by Thread: Transitioning from fiction to tech comm


What this post helpful? Share it with friends and colleagues:

Sponsored Ads


Sponsored Ads