Tuesday, October 30, 2007

More Household Chores

Well, once again, I've been tasked with fixing another appliance in the house. This time, the dryer. And before anyone asks, yes, Angel trusts me working with high power electricity. The dryer was functional in all ways except the slightly important part, heat. So, something doesn't work, how do you fix it? Tear it open.

Read More......

Sunday, October 28, 2007

Identity Theft

About a month ago, Angel & I both experienced an instance of Identity Theft. A combined total temporary loss of about $375. We got the full amounts back almost immediately, so the loss was a non-issue. However, I thought I'd share our experience with everyone.

Read More......

Password Quagmire

As a follow up to my RTFM post, about getting my password situation under better secure control with a password manager, I have learned something interesting. The number of places that require a password that I use are numerable. I new that there were many places that I use a regular basis, however, I didn't know how many. Now that I have all of my passwords configured into my manager, I'm shocked.



AN EXTREME EXAMPLE –

The following is an example of a complex offset that
combines multiple techniques which can be used
separately or in combination with other techniques.
This example includes (1) a fractional reading of only
a subset of the displayed code; (2) applying
multipliers against displayed numeric characters; and
(3) substitutions for displayed alpha characters.

For this example, lets say a user utilizing the token
generates and stores a purely random string of 14
printable characters.

The Display reads:

\BjrGjh3>u7A&t

The user secretly applies the following complex
offsets only known to him/her to arrive at the true
password for the Login Record:

Offset (1): The password length is only the last 8
Characters read right to left on the display;

Offset (2): All displayed alphas are decrement by
one character;

Offset(3): All displayed numbers are incremented by
one.

The actual password for the Login would be
discerned in the following 3 step process:

Step 1: - Locate the Last 8 Characters of the
displayed password and read them right to left.

t&A7u>3h

Step #2: All displayed alphas are decremented by
one character (application of offset #2):

s&Z7t>3g

Step #3: All displayed numbers are incremented by
one character (application of offset #3):

s&Z8t>4g

Under this complex example, the displayed password
of

\BjrGjh3>u7A&t

would be converted by the user to the actual
password of

s&Z8t>4g

Without knowledge of the offset only known to the
user, it is impossible to deduce the actual password
from the displayed password.



So, since getting this bad boy configured for use, I have done myself a favor to force myself to use it. The first thing was to put all of my passwords into it. The second was to completely turn off password saving in my browser. Since these passwords are more complex and different from anything that I have memorized, I have to go back to it each time I want to log in somewhere of less common use or if I press the wrong link and log out of a commonly used site or due to a reboot.

This might sound and be annoying, however, it is better then what I was doing before. The same password everywhere and/or exposing my site usage to anyone that can obtain access to my computer. For any of you wondering, yes, this also included my passwords for my financial websites. I feel safer knowing that even I don't know my passwords.

Read More......

RTFM

For as long as I've been into computers, this has been a recurring theme. Read The Fine (or other "F" word of choice) Manual (RTFM) is the mantra of a support analyst. We use this term for those people that don't have the drive or skill with computers that would have lead them to a simple answer.

Unfortunately, every once in a long while, there are circumstances that arise I have to use this against myself.

Read More......