Our life is filled with passwords! At home, at work, on the street, everywhere we use passwords on passwords. The research conducted in 2002 showed that the average modern man must actually keep 21 codes. E-mail account, user accounts in the member sites and the widely used social tools such as MSN and Facebook are part of daily life. Besides the passwords that everybody has to remember from the pin code of the mobile phone to the credit card password, there is also a burden that the usage of the internet loads with our heads.
Where did these passwords come from? What is a password? The simplest answer is that the password is confidential information that only two parties know. This confidential information allows parties to identify each other as secure.
A page from the date of the password and the password could not pass by those who did not know the password in Rome, now it is the case … The registered usage of the passwords extends to the history of Rome and even earlier. As a republic and an empire, Rome is a civilization in which many elements in the modern world can be easily understood.
In Rome, the guards were asking for passwords by stopping people trying to enter certain areas or buildings. But those who knew the code had permission to enter. The camp commander gave a wooden tablet to the guards every day, where the cipher was written.
The guards carried this tablet among themselves and dug their personal signs. When the tablet returned to the commander, the commander knew that all the guards had received the password.
Today the password or password is still one of the soldiers’ bases. You will be asked for a password to know if you are friends or enemies. If he does not know, he is either held or shot; it usually strikes. The password at the time of the computer used MIT’s Compatible Time Sharing System in the IBM 7090 console used in NASA. In a computer, passwords are almost as old as operating systems. The first use of passwords is said to have been used in MIT’s Compatible Time Sharing System in 1961.If the password is set, it means there is confidential information. If the information is hidden, there is a third person with that information protected. These people try to guess the password to gain access to the information.
Since then, both creating passwords and solving these passwords has become a mutual competition.
The first way to unlock passwords is to guess. Though odds are very low, intelligent predictors play a role in resolving more cryptanalysis than you can imagine.
We have shared some of the tools that you can use to deal with these types of passwords in our previous articles. Password storing and automatically entering vehicles are not preferred by every user. After all, it is very natural for people to trust their own minds rather than for the computer.
Internet without encryption tools …Hyper text transfer protocol
Many encryption tools,softwares and methods have been developed and broken throughout the computer age; new was developed and he was broken.
As a result, it is a constantly evolving field and certainly does not forgive those who insist on the old methods. One of the worst data retention methods is to store user names and passwords as plain text files on the server. Anyone who enters this information database can get it.
Another insecure method is also unsafe to transfer data without encryption. Malware can intercept and copy data during transmission. That’s why data packets need to be encrypted.
We recommend that Internet users never send sensitive information over strictly unencrypted links. See how you are at your banking transactions and when shopping online …
How does one work? Are the passwords we keep in our minds more secure than the passwords we keep in the programs? Unfortunately no, if someone who knows you is talking about, the passwords you keep in mind are not safe either.
There is no need to read the mind, you can easily see the work of a hacker whose names are in the minds of a photograph, a writing, or a soccer chatting that you have with your computer at work. Some of the password crackers confess that they chatted about the daily life with the people in their surroundings and decoded it with their learning. Because people use the words that are important to them, the words they will keep on their mind.
How do you know you’re safe?
Https are as meaningful as the worlds at the end It is very easy to understand that your data is encrypted and transmitted. In the address bar of your Internet browser, there is a symbol that shows this next to the address of the page you are on.
If this symbol is a padlock, you notice that you are using https instead of http as a protocol if you pay attention to the address on the pages where you see the padlock. The letter S at the end of the HTTPS is Secure.
Https benefit from digital certificates. These certifications indicate that the site you are connected to is secure and has been inspected and approved by the competent authorities. By clicking on the padlock icon, you can see the security certificate that the site has.
Verisign is one of the most common certifications you’ll see. You can see how powerful the system is used by encrypting the traffic between your site and the site by entering it in the Details section.
A user-friendly example: PayPal Certificates are displayed properly
Consumer confidence and security are so important in payment systems like PayPal that they use 168 bit SSL, which is the most secure encryption system allowed for commercial use.
If you click on the site name on the left of the address line in a page that uses https under Firefox, you can see the security certificate, you can get more information by going to the details.
The information you will access will be quite diverse. However, it should be noted that the AES and RSA encryption systems are different from each other and that some given bit values ??can not be compared with each other. Nevertheless, more bits mean that whatever system is used, more combinations should be tried to break that encryption.
In the meantime, when you add http at the end of some sites, you can connect via admin’s secure 443 port which opens silently. However, this is already evident in important sites.
It is guaranteed that someone who tries 123456 password on a sufficiently different account will be credited to someone’s account. In
computers, passwords and user accounts are stored encrypted. Operating systems use asymmetric algorithms to calculate the entered passwords and transmit them in difficult-to-solve formats.
These passwords can be decrypted if enough attempts are made. This is called brute force method, and it is difficult for this method to be successful in algorithms that provide high security for long ciphers. Adds many combinations to be tested for each character or different character.
But it’s usually rough, so you do not have to try all the potential character combinations one by one. Dictionary attacks can find passwords in less time and with less experience. Users choose words that are meaningful to keep in mind. Dictionary attacks are also called meaningful words. Thus, those who use the name of a soccer team as a password become the first and easiest hunters.
There is nothing that technology can do against user error, as long as the algorithm is as advanced as it wants, the business ends with the user.
Here is a real event!
As social network users joke, hackers find the opportunity to get to know them closely.If you want to keep your passwords memorable but safe, make a meaningless password from the initials of the meaningful words.
Even if it is a bit more difficult to keep in mind, it will be worth it. We did not make fun of some password crackers when they told us that they loved to take advantage of their private lives. A hacker named Croll seized a Twitter employee’s Gmail account using Google Apps’s password reset mechanism.
The password reset process asks a special question to the user who forgot the password. Croll was able to gather information about his Twitter worker and guess what his account was asking. He then learned the personal information of other people on his account and hacked on the account of more people using them. Among them was even the wife of Twitter CEO Evan Williams.
So sharp intelligence and good observerism open up many doors to people.
The incredible power of dictionary attack!
It is not only the word meaning or spelling guide, it is the most powerful hacker tool …
Sometimes things can be easy in this. A lazy system administrator can create a way to put the password in the same user account name.
You can use free folder lock software for windows, which allows you to test for 15 days free of charge to measure your own ciphertext. It installs the plugin named Pcap and catches the data passing through the network connection card. If you are using software such as Wireshark, it will already be installed on your system.
In this software test, 8 characters of English words can be found in 29 seconds. It also breaks a word of 10 characters selected from the English dictionary in 32 seconds. If you think about doing this on an average computer, it’s understandable how insignificant it is to write a straight word.
The licensed version also comes with different testing methods. But our goal is not to promote this software, but to call you to be more careful. All passwords can be broken, but a password that’s hard enough will protect you from annoying and low-skilled attackers, it will nibble them.
Replacing your really important passwords at regular intervals will also be useful for your long-term safety. Updating and protecting your digital life with new software security tools.Do not use your username and password in other places, especially if you use your email address. Email is an important information source, a key account used to hack many of your accounts; protect him and your self.
Read More »