Site Tools


pass

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
pass [2023/02/27 19:19] Alan Sheapass [2023/06/27 01:14] (current) Alan Shea
Line 1: Line 1:
 ======PassPhrase Generator== ======PassPhrase Generator==
-[[http://xkcd.com/936/ |{{ https://imgs.xkcd.com/comics/password_strength.png?400|Through 20 years of effort we've successfully trained everyone to use passwords that are hard for humans to remember but easy for computers to guess. }}]]+[[http://xkcd.com/936/ |{{ https://imgs.xkcd.com/comics/password_strength.png?350|Through 20 years of effort we've successfully trained everyone to use passwords that are hard for humans to remember but easy for computers to guess. }}]]
  
 Inspired by the xkcd comic: ((Code borrowed under BSD license from http://www.passphra.se, with longer word list from [[https://www.wordfrequency.info/free.asp?s=y |www.wordfrequency.info]].))  Inspired by the xkcd comic: ((Code borrowed under BSD license from http://www.passphra.se, with longer word list from [[https://www.wordfrequency.info/free.asp?s=y |www.wordfrequency.info]].)) 
Line 8: Line 8:
 ----  ---- 
  
-====Passphrase==+<WRAP round download 90%> 
 +=====Passphrase==
 <html> <html>
 <noscript><div id="javascript-required">Sorry, JavaScript is required!</div> <noscript><div id="javascript-required">Sorry, JavaScript is required!</div>
Line 17: Line 18:
 </html> </html>
  
-  * //This password is generated entirely in your browser//; the server has no possible way to record which password you choose. +  * Add **//at least one//** randomly //capitalized letter// (not the first letter of a word) and a //numeral// and/or //punctuation// to make your password significantly stronger (harder for computers to guess).  
-  * //Add **at least one** __randomly__ capitalized letter //(not the first letter of a word)// and a numeral or punctuation// to make your password significantly stronger (harder for computers to guess). +</WRAP>
  
-[[https://www.security.org/how-secure-is-my-password/|{{:wiki:security.org_how-secure-is-my-password.png?nolink&200 |}}]]+ 
 +<WRAP round left info 90%> 
 +**This password is generated entirely in your browser**; the server has no possible way to record which password you choose. 
 +</WRAP> <WRAP clear/> 
 + 
 +<WRAP noprint> 
 +[[https://www.security.org/how-secure-is-my-password/|{{:wiki:security.org_how-secure-is-my-password.png?nolink&200 |}}]] </WRAP>
 To test relative strength, copy and paste one of the suggested passwords into one of these testing sites to see how long it might take for a computer to brute-force guess your password: \\  To test relative strength, copy and paste one of the suggested passwords into one of these testing sites to see how long it might take for a computer to brute-force guess your password: \\ 
   * https://www.security.org/how-secure-is-my-password/    * https://www.security.org/how-secure-is-my-password/ 
-  * https://zxcvbn-ts.github.io/zxcvbn/demo/ +  * https://bitwarden.com/password-strength/ ((https://zxcvbn-ts.github.io/zxcvbn/demo/)) 
 +<WRAP pagebreak></WRAP>
 <WRAP center round tip 60%> <WRAP center round tip 60%>
 \\ **//Length// is the most important part of a password!** \\ **//Length// is the most important part of a password!**
Line 31: Line 38:
 ----  ---- 
 \\  \\ 
-For further discussion on the tradeoff between length and password complexity to make passwords more secure:  https://www.hivesystems.io/blog/are-your-passwords-in-the-green+Further discussion on the tradeoff between length and password complexity to make passwords more secure:  https://www.hivesystems.io/blog/are-your-passwords-in-the-green
  
 [[https://www.hivesystems.io/blog/are-your-passwords-in-the-green|{{:wiki:hivesystems.io_password_table.png?nolink&400 |}}]] <WRAP clear/> [[https://www.hivesystems.io/blog/are-your-passwords-in-the-green|{{:wiki:hivesystems.io_password_table.png?nolink&400 |}}]] <WRAP clear/>
Line 39: Line 46:
  
 <WRAP left round info 80%> <WRAP left round info 80%>
-A cryptographically stronger password generator (random "seed" generated for each visit)((The fact that many people use the password generator on this MetaTek page is in effect an additional random seed and makes it difficult for an attacker to predict the order of passwords that will be generated for any particular user. An attacker would also have to know the exact time you created your password in order to re-create the pseudorandom sequence of passwords created. A random "seed" created for each user would further increase the entropy of the sequence that passwords are selected. The random seed for this service is regenerated regularly, but not for every visit.)) can be found at: http://fourmilab.ch/javascrypt/pass_phrase.html +A cryptographically stronger password generator (random "seed" generated for each visit)((The fact that many people use the password generator on this page is in effect an additional random seed and makes it difficult for an attacker to predict the order of passwords that will be generated for any particular user. An attacker would also have to know the exact time you created your password in order to re-create the pseudorandom sequence of passwords created. A random "seed" created for each user would further increase the entropy of the sequence that passwords are selected. The random seed for this service is regenerated regularly, but not for every visit.)) can be found at: http://fourmilab.ch/javascrypt/pass_phrase.html 
 </WRAP> </WRAP>
 \\ \\  \\ \\ 
pass.1677525548.txt.gz · Last modified: 2023/02/27 19:19 by Alan Shea