O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Password Selection and Use

Passwords were, and still are, the most common authentication method, and will probably remain so for some time. There are a number of explanations for this—the most important ones being their ease of use and implementation and, therefore, their cost. Unlike most other authentication methods, such as smart cards, tokens, and one-time passwords, they don’t come at additional cost and are ready for immediate use out of box. However, these factors also contribute to their insecurity and weaknesses when used incorrectly. The security of password-protected systems lies in the “strength” of passwords—that is, how difficult it is to guess or find out the passwords. Not surprisingly, the best passwords from the computer’s ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required