Sunday, 21 November 2004

Jesper M. Johansson, Security Program Manager at Microsoft, has published the third in his series of three articles about the pro’s and con’s of using passwords or pass-phrases in authenticating users to a network or application.

This is the final article in our series on passwords versus pass phrases. The first part covered the fundamentals of passwords and pass phrases, how they are stored, and so on. The second part focused on relative strength and detailed mathematical approaches to determine which is stronger. This final installment concludes the series and gives some guidance on how to choose passwords and configure a password policy.”

Read the article here. Also read Rob Hensing’s review and point of view. His comments are worthwhile.



Add/Read: Comments [0]
IT Security | Tech
Comments are closed.