lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: smcmahon at eiv.com (Shawn McMahon)
Subject: Zone Alarm

On Wed, Jun 04, 2003 at 04:03:57PM -0500, Schmehl, Paul L said:
> 
> There *are* cases where "not so great" security is better than "really
> great" simply because "really great" won't get used and "not so great"
> is therefore better (than nothing.)  It's all well and good that experts

And I would submit that most of us here are in fact guilty of that; how
many of us have at least one password, somewhere, that's ~8 characters,
mostly letters, as opposed to 128 random alphanumerics?  Who here has a
house with a deadbolt and an alarm system, but no armed guards?  A car
that you park in parking lots, with no bomb-sniffing dog going under it
before you get in?

Security that won't get used isn't security, it's theory.  It belongs in
classrooms and labs.  Security is a process, as well, not a binary flag.
It's not "exit code 1, insecure" one day, and "exit code 0, secure" the
next.


-- 
Shawn McMahon     | Let every nation know, whether it wishes us well or ill,
EIV Consulting    | that we shall pay any price, bear any burden, meet any
UNIX and Linux	  | hardship, support any friend, oppose any foe, to assure
http://www.eiv.com| the survival and the success of liberty. - JFK
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030605/40b4e0db/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ