Posts

Showing posts from February, 2015

 

Silly Password Tricks

Image
I managed to get out last night and visit the Tech It Easy WordPress meetup group. I've not gotten far enough into my deep dive into WordPress to be terribly concerned about security issues. I was glad to learn that I was already most things right. Part of the meeting got to talking about how to set strong passwords. My favorite password algorithm is to pick a poem, lyrics from a song, or famous passage of literature and adapt that to a password. For example, consider the nursery rhyme, "Mary had a little lamb, little lamb, little lamb; Mary had a little lamb, it's fleece was white as snow."  That could easily parse into a few passwords. Here are a couple: Mhall,*3; or Mhall1fwwas. Both of these are at least eight characters in mixed case and contain numbers and punctuation. (Of course, everyone who reads this page will know these passwords, so you probably should not use them.) Most importantly, you wont find them in any dictionary, so they are not subject to a brute...

What's a "Network Protocol"?

Image
If a bunch of  networks are going to be connected , they have to agree on how to talk to one another. They agree on a common set of network "protocols" to exchange email, transfer files, even to emulate telephones. A protocol is just a standardized way to talk. When your phone rings, you pick it up and say, "Hello?" I might respond with "Hi, this Brian. Is now a good time to talk about next week's meeting?" And the conversation continues. When it's over, polite "telephone protocol" requires that we each say, "good bye", then hang up and close the connection. Sending letters in the mail uses a couple of protocols. You remember writing letters, don't you? You get out a piece of paper and write the date at the top of the page, then, if it's an official letter, you add your return address, the name and address of the recipient, and a polite salutation. "Dear Mr. Smith, I'm writing to tell you how pleased I am that y...