|
|
don't bother; it's easy to crack your password no matter how long it is
it doesn't matter how long your password is, it's trivial for an attacker to recover it, using at least two different methods. make no mistake, OS X's password security is a total joke right now.
don't bother; it's easy to crack your password no matter how long it is
I don't know about method 2, but I tried method 1 on /private/var/vm/swapfile0, searching for my full login name, my short login name and even my password itself. Only the short name was found. This is with 10.3.6.
don't bother; it's easy to crack your password no matter how long it is
your login password can be written to the swapfile after you run sudo or are asked to authenticate by the gui. I have 640mb of ram on my system, and have seen my passphrase in the swap file.
don't bother; it's easy to crack your password no matter how long it is
It's good practice to have the keychain password different from the login password, for this reason. Even if you have my login password, you would not be (easily) able to inspect my mail, ssh info or gpg keys (which are symlinked to an encrypted disk image) unless you provide the passphrase for my keychain.
don't bother; it's easy to crack your password no matter how long it is
It is an exaggeration to say that Mac OS X password security is a complete joke and even if it were, it is highly irresponsible to recommend that people not bother with password security.
don't bother; it's easy to crack your password no matter how long it is
Nice followup, Derrick. |
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysNo new commentsLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.10 seconds |
|