• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Comments for “A Password for my Password”

September 4, 2016 by Wade Mackey 3 Comments

One thing to keep in mind is that password keepers and the browser function to remember passwords have their own vulnerabilities that can resut in an attacker taking advantage of these.

Wade

 

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Mengxue Ni says

    September 4, 2016 at 7:52 pm

    Thanks Loi for posting this interesting article. Passwords are made to protect our information, but it also becomes a problem for some people. Usually, people like using same password for everything because it is easy to remember and use. However, we always have a time that we need other people to enter the password for us. In this way, other people can be aware of your password. Then they can try it on your banking account. You recommenced several software for managing our password, but it is still a issue when we don’t have our computer with us. I think using finger print like iPhone is really a good way to help us to solve the problem. It is easy and hard to be stolen.

    Log in to Reply
  2. Ahmed A. Alkaysi says

    September 5, 2016 at 9:17 pm

    Between accessing different apps at work and various accounts/websites at home, managing all these passwords has been a pain. I am guilty of not being very creative when it comes to password creation. It’s just so hard to manage all of them, and I don’t trust any app to manage them for me. At work, I ended up creating a notepad with the list of my passwords with asterisks in them. I would just, for example, have 2 or 3 characters out of 10 that are not asterisks. This would help me remember what the pw was, if I ever forgot. With the advent of Samsung’s S7 Iris scanner, I am hoping it will catapult biometric scanning to become mainstream.

    Log in to Reply
  3. Wade Mackey says

    September 5, 2016 at 11:31 pm

    The finger print scanners have their own issues. There are known techniques for tricking the scanners with copies of prints. Also, there have been some studies indicating familial similarities. Finally, until recently, IOS let you add additional people to your phone without resetting access to applications. This leads to people having unintended access.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in