Freescale doesn't want to be bothered

Fred Abse wrote:

On Sun, 17 Apr 2005 14:56:11 +0000, Genome wrote:

a cross between a horse
and a donkey. I wouldn't want one of those poking out of my trousers.

Chance would be a fine thing :)

Isn't "Arse" just "Ass" with the Southern British long "A"? They say
"Glarse", "Brarnch", and "Farsten", too.
Except in more Northern latitudes of the realm - lol. But I don't know if
you'd be familiar with those pronunciations either.


Graham
 
On 17 Apr 2005 07:52:08 -0700, "Andy" <andysharpe@juno.com> put finger
to keyboard and composed:

What is an ARSE ?
It's the back end of an ass, or the sum of two half-asses.


- Franc Zabkar
--
Please remove one 's' from my address when replying by email.
 
On Mon, 18 Apr 2005 06:32:01 +1000, the renowned Franc Zabkar
<fzabkar@optussnet.com.au> wrote:

On 17 Apr 2005 07:52:08 -0700, "Andy" <andysharpe@juno.com> put finger
to keyboard and composed:

What is an ARSE ?

It's the back end of an ass, or the sum of two half-asses.
http://www.speff.com/ass.jpg



Best regards,
Spehro Pefhany
--
"it's the network..." "The Journey is the reward"
speff@interlog.com Info for manufacturers: http://www.trexon.com
Embedded software/hardware/analog Info for designers: http://www.speff.com
 
On 17 Apr 2005 09:41:39 -0700, "JeffM" <jeffm_@email.com> wrote:

It's one thing for a bank to attempt secure password principles,
it's quite another for an IC manufacturer to do the same.
Why do they even need a password?
Winfield Hill

A useful site to end-run such idiots:
http://bugmenot.com/view.php?url=http://www.freescale.com

First I have heard of that. Thanks for the tip.

I installed the Firefox extension and tried it on a few places. Very
handy. Then I tried mercurynews (Silicon Valley newspaper) and didn't
find any id/passwords that worked. I even made sure to delete any
cookies between attempts. I wonder if they have created some kind of bot
to defend themselves from bugmenot listings?
 
Fred Abse wrote:
Isn't "Arse" just "Ass" with the Southern British long "A"? They say
"Glarse", "Brarnch", and "Farsten", too.

'Arse' is the word before Americans minced it, and still the usage in
the UK, including Wigan, where they definitely don't say glars. Cognate
with German 'Ersch' and no doubt Scandiwegians and Dutch speakers will
come up with their versions.

Paul Burke
 
On Sat, 16 Apr 2005 14:22:59 -0700, Jim Thompson wrote:
On Sat, 16 Apr 2005 14:18:25 -0700, John Larkin
On Sat, 16 Apr 2005 23:08:23 +0200, martin griffith
....
They sounds like a suitable candidate for Dilbert/scott adams
attention


Oh, one more rule: it can't be the same as your four last passwords!
I'm not kidding.

John

My banks are starting to do that shit. M$oft must have sold them some
crap software :-(
Did anybody else see that M$ commercial, oh, six months ago or so?
There's a cop car cruising the dark-alley side of town, and the cop
gets some street kid's attention and calls him over to the car, as
if the kid's some kind of informant or something, but the kid says,
"Oh, yeah, you have to press F8 and boot to safe mode..."

Maybe Uncle Billy has a Master Plan - to take down the bureaucracy
by getting them dependent on virus-friendly software or something.

Cheers!
Rich
 
"Winfield Hill" <hill_a@t_rowland-dotties-harvard-dot.s-edu> wrote in
message news:d3saoi02idl@drn.newsguy.com...

I can, rather than memorize another one. HELL, I'M UP TO OVER
100 PASSWORDS ALREADY. So much for so-called security. *&#(@#$
Just use the same "secure password" on every site on the planet, version it
and 'bump' the version whenever "they" desire that it be changed "for
security".

I mean; Who Cares In the Slightest if some vendors database gets hacked and
grossly abused? What will they even do? They can kick you - but that will
not last because you signed on with your disposable "hotmail" account as
Identification ... you just pull another one for the occasion.
 
In article <a703615malcene607cofv6m9pfo2d9km1j@4ax.com>,
jjlarkin@highNOTlandTHIStechnologyPART.com says...
On Sat, 16 Apr 2005 23:08:23 +0200, martin griffith
martingriffith@XXyahoo.co.uk> wrote:

On Sat, 16 Apr 2005 13:38:31 -0700, in sci.electronics.design John
Larkin <jjlarkin@highNOTlandTHIStechnologyPART.com> wrote:

I was registered with Motorola, but I'm not registered with Freescale.
If you're not registered, you can't send them mail, not even to the
webmaster. The password rules are so complex I can't remember them
all: something like requiring the length to be in a range, to have
nothing in common with the user ID, to have uppercase *and* lowercase
letters *and* numbers, to start with something or other...

I'll buy somewhere else.

John
They sounds like a suitable candidate for Dilbert/scott adams
attention


Oh, one more rule: it can't be the same as your four last passwords!
I'm not kidding.
IBM password rules, from A memo passed around some years back:

RULES FOR THE SELECTION OF PASSWORDS:

1. A password must be at least six characters long, and must not
contain two occurrences of a character in a row, or a sequence
of two or more characters from the alphabet in forward or
reverse order.
Example: HGQQXP is an invalid password.
GFEDCB is an invalid password.

2. A password may not contain two or more letters in the same
position as any previous password.
Example: If a previous password was GKPWTZ, then NRPWHS would
be invalid because PW occurs in the same position in both
passwords.

3. A password may not contain the name of a month or an
abbreviation for a month.
Example: MARCHBC is an invalid password.
VWMARBC is an invalid password.

4. A password may not contain the numeric representation of
a month. Therefore, a password containing any number except
zero is invalid.
Example: WKBH3LG is invalid because it contains the
numeric representation for the month of March.

5. A password may not contain any words from any language. Thus,
a password may not contain the letters A, or I, or sequences
such as AT, ME, or TO because these are all words.

6. A password may not contain sequences of two or more characters
which are adjacent to each other on a keyboard in a horizontal,
vertical or diagonal direction.
Example: QWERTY is an invalid password.
GHNLWT is an invalid password because G and H are
horizontally adjacent to each other.
HUKWVM is an invalid password because H and U are
diagonally adjacent to each other.

7. A password may not contain the name of a person, place or thing.
Example: JOHNBOY is an invalid password.

Because of the complexity of the password selection rules, there
is actually only one password which passes all the tests. To make
the selection of this password simpler for the user, it will be
distributed to all managers. All users are instructed to obtain this
password from his or her manager and begin using it immediately.

--
Keith
 
On Mon, 18 Apr 2005 12:19:31 -0400, Keith Williams <krw@att.bizzzz>
wrote:

[snip]
I'm not kidding.

IBM password rules, from A memo passed around some years back:

RULES FOR THE SELECTION OF PASSWORDS:

1. A password must be at least six characters long, and must not
[snip]

Because of the complexity of the password selection rules, there
is actually only one password which passes all the tests. To make
the selection of this password simpler for the user, it will be
distributed to all managers. All users are instructed to obtain this
password from his or her manager and begin using it immediately.
ROTFLMAO and coughing up coffee ;-)

...Jim Thompson
--
| James E.Thompson, P.E. | mens |
| Analog Innovations, Inc. | et |
| Analog/Mixed-Signal ASIC's and Discrete Systems | manus |
| Phoenix, Arizona Voice:(480)460-2350 | |
| E-mail Address at Website Fax:(480)460-2142 | Brass Rat |
| http://www.analog-innovations.com | 1962 |

I love to cook with wine. Sometimes I even put it in the food.
 
"Jim Thompson" <thegreatone@example.com> wrote in message
news:66p76156d7gjr8ibebih9mvbc2me25f21h@4ax.com...
On Mon, 18 Apr 2005 12:19:31 -0400, Keith Williams <krw@att.bizzzz
wrote:

[snip]
I'm not kidding.

IBM password rules, from A memo passed around some years back:

RULES FOR THE SELECTION OF PASSWORDS:

1. A password must be at least six characters long, and must not
[snip]

Because of the complexity of the password selection rules, there
is actually only one password which passes all the tests. To make
the selection of this password simpler for the user, it will be
distributed to all managers. All users are instructed to obtain this
password from his or her manager and begin using it immediately.

ROTFLMAO and coughing up coffee ;-)

...Jim Thompson
Ha ha, Tim Shoppa posted the same in this same thread.

Take a slap upside your head and kill your kill file.

Or are you going to admit my news service is better than yours?

DNA
 
Keith Williams wrote:
In article <a703615malcene607cofv6m9pfo2d9km1j@4ax.com>,
jjlarkin@highNOTlandTHIStechnologyPART.com says...

On Sat, 16 Apr 2005 23:08:23 +0200, martin griffith
martingriffith@XXyahoo.co.uk> wrote:


On Sat, 16 Apr 2005 13:38:31 -0700, in sci.electronics.design John
Larkin <jjlarkin@highNOTlandTHIStechnologyPART.com> wrote:


I was registered with Motorola, but I'm not registered with Freescale.
If you're not registered, you can't send them mail, not even to the
webmaster. The password rules are so complex I can't remember them
all: something like requiring the length to be in a range, to have
nothing in common with the user ID, to have uppercase *and* lowercase
letters *and* numbers, to start with something or other...

I'll buy somewhere else.

John

They sounds like a suitable candidate for Dilbert/scott adams
attention


Oh, one more rule: it can't be the same as your four last passwords!
I'm not kidding.


IBM password rules, from A memo passed around some years back:

RULES FOR THE SELECTION OF PASSWORDS:

1. A password must be at least six characters long, and must not
contain two occurrences of a character in a row, or a sequence
of two or more characters from the alphabet in forward or
reverse order.
Example: HGQQXP is an invalid password.
GFEDCB is an invalid password.

2. A password may not contain two or more letters in the same
position as any previous password.
Example: If a previous password was GKPWTZ, then NRPWHS would
be invalid because PW occurs in the same position in both
passwords.

3. A password may not contain the name of a month or an
abbreviation for a month.
Example: MARCHBC is an invalid password.
VWMARBC is an invalid password.

4. A password may not contain the numeric representation of
a month. Therefore, a password containing any number except
zero is invalid.
Example: WKBH3LG is invalid because it contains the
numeric representation for the month of March.

5. A password may not contain any words from any language. Thus,
a password may not contain the letters A, or I, or sequences
such as AT, ME, or TO because these are all words.

6. A password may not contain sequences of two or more characters
which are adjacent to each other on a keyboard in a horizontal,
vertical or diagonal direction.
Example: QWERTY is an invalid password.
GHNLWT is an invalid password because G and H are
horizontally adjacent to each other.
HUKWVM is an invalid password because H and U are
diagonally adjacent to each other.

7. A password may not contain the name of a person, place or thing.
Example: JOHNBOY is an invalid password.

Because of the complexity of the password selection rules, there
is actually only one password which passes all the tests. To make
the selection of this password simpler for the user, it will be
distributed to all managers. All users are instructed to obtain this
password from his or her manager and begin using it immediately.

Boy, this thread hits way too close to home! I have a 'letter' in my HR
package now, because I spent almost an hour trying to change my company
password, and in the process, was somewhat verbally abusive to two
different IT folks, and physically threatened (requested name of
induhvidual who wrote password program, so that I could inflict bodily
injury upon him...) a fellow employee.

Believe it or not, but 1, 2, and 5 are all on the official requirments,
but 1 is modified in that the password must be (deleted to keep out of
trouble with security folks... :cool: )

Password history goes back to EVERY password you have ever used. After
6years, that leaves out a lot of letter sequences! I don't know how the
long timers with 15 years manage to do it!

Charlie
 
Jim Thompson wrote:

On Mon, 18 Apr 2005 12:19:31 -0400, Keith Williams <krw@att.bizzzz
wrote:

[snip]
I'm not kidding.

IBM password rules, from A memo passed around some years back:

RULES FOR THE SELECTION OF PASSWORDS:

1. A password must be at least six characters long, and must not
[snip]

Because of the complexity of the password selection rules, there
is actually only one password which passes all the tests. To make
the selection of this password simpler for the user, it will be
distributed to all managers. All users are instructed to obtain this
password from his or her manager and begin using it immediately.

ROTFLMAO and coughing up coffee ;-)

...Jim Thompson
In another ng I once frequented this response became simply abbreviated to
'Keyboard !' - the usual recipient of the unholy mess. :)

It's when the coffee comes out your nose you need to worry !

Graham
 
Charles Edmondson wrote:

Keith Williams wrote:
In article <a703615malcene607cofv6m9pfo2d9km1j@4ax.com>,
jjlarkin@highNOTlandTHIStechnologyPART.com says...

On Sat, 16 Apr 2005 23:08:23 +0200, martin griffith
martingriffith@XXyahoo.co.uk> wrote:


On Sat, 16 Apr 2005 13:38:31 -0700, in sci.electronics.design John
Larkin <jjlarkin@highNOTlandTHIStechnologyPART.com> wrote:


I was registered with Motorola, but I'm not registered with Freescale.
If you're not registered, you can't send them mail, not even to the
webmaster. The password rules are so complex I can't remember them
all: something like requiring the length to be in a range, to have
nothing in common with the user ID, to have uppercase *and* lowercase
letters *and* numbers, to start with something or other...

I'll buy somewhere else.

John

They sounds like a suitable candidate for Dilbert/scott adams
attention


Oh, one more rule: it can't be the same as your four last passwords!
I'm not kidding.


IBM password rules, from A memo passed around some years back:

RULES FOR THE SELECTION OF PASSWORDS:

1. A password must be at least six characters long, and must not
contain two occurrences of a character in a row, or a sequence
of two or more characters from the alphabet in forward or
reverse order.
Example: HGQQXP is an invalid password.
GFEDCB is an invalid password.

2. A password may not contain two or more letters in the same
position as any previous password.
Example: If a previous password was GKPWTZ, then NRPWHS would
be invalid because PW occurs in the same position in both
passwords.

3. A password may not contain the name of a month or an
abbreviation for a month.
Example: MARCHBC is an invalid password.
VWMARBC is an invalid password.

4. A password may not contain the numeric representation of
a month. Therefore, a password containing any number except
zero is invalid.
Example: WKBH3LG is invalid because it contains the
numeric representation for the month of March.

5. A password may not contain any words from any language. Thus,
a password may not contain the letters A, or I, or sequences
such as AT, ME, or TO because these are all words.

6. A password may not contain sequences of two or more characters
which are adjacent to each other on a keyboard in a horizontal,
vertical or diagonal direction.
Example: QWERTY is an invalid password.
GHNLWT is an invalid password because G and H are
horizontally adjacent to each other.
HUKWVM is an invalid password because H and U are
diagonally adjacent to each other.

7. A password may not contain the name of a person, place or thing.
Example: JOHNBOY is an invalid password.

Because of the complexity of the password selection rules, there
is actually only one password which passes all the tests. To make
the selection of this password simpler for the user, it will be
distributed to all managers. All users are instructed to obtain this
password from his or her manager and begin using it immediately.

Boy, this thread hits way too close to home! I have a 'letter' in my HR
package now, because I spent almost an hour trying to change my company
password, and in the process, was somewhat verbally abusive to two
different IT folks, and physically threatened (requested name of
induhvidual who wrote password program, so that I could inflict bodily
injury upon him...) a fellow employee.

Believe it or not, but 1, 2, and 5 are all on the official requirments,
but 1 is modified in that the password must be (deleted to keep out of
trouble with security folks... :cool: )

Password history goes back to EVERY password you have ever used. After
6years, that leaves out a lot of letter sequences! I don't know how the
long timers with 15 years manage to do it!
They don't call the IT staff 'network nazis' for nothing you know.

Graham
 
Pooh Bear wrote:

Charles Edmondson wrote:

Boy, this thread hits way too close to home! I have a 'letter' in my HR
package now, because I spent almost an hour trying to change my company
password, and in the process, was somewhat verbally abusive to two
different IT folks, and physically threatened (requested name of
induhvidual who wrote password program, so that I could inflict bodily
injury upon him...) a fellow employee.

Believe it or not, but 1, 2, and 5 are all on the official requirments,
but 1 is modified in that the password must be (deleted to keep out of
trouble with security folks... :cool: )

Password history goes back to EVERY password you have ever used. After
6years, that leaves out a lot of letter sequences! I don't know how the
long timers with 15 years manage to do it!

They don't call the IT staff 'network nazis' for nothing you know.
You could always make your pw completely out of special characters. As
far as I know, &$&*)@$%#$ isn't a word in any language, except for
"comic strip". ;)

Many years ago, I encountered an IT guy who set the system up so that
your password expired every month, and the last 5 pws couldn't be
reused. Plus, the damn thing started warning you 2 weeks before the
expiry date so you were getting warnings 50% of the time. On top of
this, the system had no connection to the outside world and all
terminals were behind locked doors.

No amount of talking to this guy would convince him that this was a bad
idea so I just connected the serial port of my PC in place of the VT100
and whipped up a quick program to output the password change commands 6
times in a row. The first 5 pws were junk and the 6th was my preferred,
and quite secure, password. I used this once a week for several months
until the IT guy had some sort of run in with a higher up and was
released to inflict his nonsense on some other company. His replacement
adopted a much more reasonable expiry period (6 months IIRC), so I was
able to retire my program.
--
Tim Hubberstey, P.Eng. . . . . . Hardware/Software Consulting Engineer
Marmot Engineering . . . . . . . VHDL, ASICs, FPGAs, embedded systems
Vancouver, BC, Canada . . . . . . . . . . . http://www.marmot-eng.com
 
On Mon, 18 Apr 2005 22:12:35 GMT, Tim Hubberstey <bogus@bogusname.com>
wrote:

Pooh Bear wrote:

Charles Edmondson wrote:

Boy, this thread hits way too close to home! I have a 'letter' in my HR
package now, because I spent almost an hour trying to change my company
password, and in the process, was somewhat verbally abusive to two
different IT folks, and physically threatened (requested name of
induhvidual who wrote password program, so that I could inflict bodily
injury upon him...) a fellow employee.

Believe it or not, but 1, 2, and 5 are all on the official requirments,
but 1 is modified in that the password must be (deleted to keep out of
trouble with security folks... :cool: )

Password history goes back to EVERY password you have ever used. After
6years, that leaves out a lot of letter sequences! I don't know how the
long timers with 15 years manage to do it!

They don't call the IT staff 'network nazis' for nothing you know.

You could always make your pw completely out of special characters. As
far as I know, &$&*)@$%#$ isn't a word in any language, except for
"comic strip". ;)

Many years ago, I encountered an IT guy who set the system up so that
your password expired every month, and the last 5 pws couldn't be
reused. Plus, the damn thing started warning you 2 weeks before the
expiry date so you were getting warnings 50% of the time. On top of
this, the system had no connection to the outside world and all
terminals were behind locked doors.

No amount of talking to this guy would convince him that this was a bad
idea so I just connected the serial port of my PC in place of the VT100
and whipped up a quick program to output the password change commands 6
times in a row. The first 5 pws were junk and the 6th was my preferred,
and quite secure, password. I used this once a week for several months
until the IT guy had some sort of run in with a higher up and was
released to inflict his nonsense on some other company. His replacement
adopted a much more reasonable expiry period (6 months IIRC), so I was
able to retire my program.
I think the natural definition of an IT person is SCUM.

Twenty-some years ago now, back in the days when I drew schematics
with a pencil, numbered nodes and loaded a netlist into a VAX780, I
had a problem with an IT guy...

Since there would be periods of terminal inactivity while I drew and
numbered, this ASS would automatically log me off.

So I devised a little circuit that twiddled a keyboard signal
periodically.

So this ASS came by one day and said he was going to revoke my VAX
privileges.

I allowed as how that would not sit well with the management, since I
was, after-all, the ANALOG GOD; AND I would distribute my schematic to
everyone in the company. He decided to leave me alone.

Some months later, working from home, from a dial-up... remember...
twenty years ago... I had a drop-out.

Dialing back in, I rolled right into the system, without logging in.

What I saw was some traffic that made no sense to me, but looked
suspicious, so I reported it to my boss.

About a week later I'm walking in the front door, and the IT guy and
his assistant are being walked out the door, in HANDCUFFS.

Seems they were working a side business on GenRad's computer
facilities.

That was such a joy I damn near wet my pants ;-)

...Jim Thompson
--
| James E.Thompson, P.E. | mens |
| Analog Innovations, Inc. | et |
| Analog/Mixed-Signal ASIC's and Discrete Systems | manus |
| Phoenix, Arizona Voice:(480)460-2350 | |
| E-mail Address at Website Fax:(480)460-2142 | Brass Rat |
| http://www.analog-innovations.com | 1962 |

I love to cook with wine. Sometimes I even put it in the food.
 
On Mon, 18 Apr 2005 09:49:01 -0700, Jim Thompson wrote:

On Mon, 18 Apr 2005 12:19:31 -0400, Keith Williams <krw@att.bizzzz
wrote:

[snip]
I'm not kidding.

IBM password rules, from A memo passed around some years back:

RULES FOR THE SELECTION OF PASSWORDS:

1. A password must be at least six characters long, and must not
[snip]

Because of the complexity of the password selection rules, there
is actually only one password which passes all the tests. To make
the selection of this password simpler for the user, it will be
distributed to all managers. All users are instructed to obtain this
password from his or her manager and begin using it immediately.

ROTFLMAO and coughing up coffee ;-)
Our real requirements aren't a whole lot different. :-( We're now
required to have eight-character PW's with at least two of five classes of
characters and then change them every 90 days. They're so paranoid that
someone's going to crack a password that they've expanded the key space.
It seems that no one has noticed that there has been a
three-strikes-and-you're-out policy in place since forever. I guess the
CIO has to have somethign to do.

I'm goign to need a PDA just to keep track of my passwords. Indeed that's
the one application I really need a PDA for.

--
Keith
 
On Mon, 18 Apr 2005 15:33:15 -0700, Jim Thompson wrote:

On Mon, 18 Apr 2005 22:12:35 GMT, Tim Hubberstey <bogus@bogusname.com
wrote:

Pooh Bear wrote:

Charles Edmondson wrote:

Boy, this thread hits way too close to home! I have a 'letter' in my HR
package now, because I spent almost an hour trying to change my company
password, and in the process, was somewhat verbally abusive to two
different IT folks, and physically threatened (requested name of
induhvidual who wrote password program, so that I could inflict bodily
injury upon him...) a fellow employee.

Believe it or not, but 1, 2, and 5 are all on the official requirments,
but 1 is modified in that the password must be (deleted to keep out of
trouble with security folks... :cool: )

Password history goes back to EVERY password you have ever used. After
6years, that leaves out a lot of letter sequences! I don't know how the
long timers with 15 years manage to do it!

They don't call the IT staff 'network nazis' for nothing you know.

You could always make your pw completely out of special characters. As
far as I know, &$&*)@$%#$ isn't a word in any language, except for
"comic strip". ;)

Many years ago, I encountered an IT guy who set the system up so that
your password expired every month, and the last 5 pws couldn't be
reused. Plus, the damn thing started warning you 2 weeks before the
expiry date so you were getting warnings 50% of the time. On top of
this, the system had no connection to the outside world and all
terminals were behind locked doors.

No amount of talking to this guy would convince him that this was a bad
idea so I just connected the serial port of my PC in place of the VT100
and whipped up a quick program to output the password change commands 6
times in a row. The first 5 pws were junk and the 6th was my preferred,
and quite secure, password. I used this once a week for several months
until the IT guy had some sort of run in with a higher up and was
released to inflict his nonsense on some other company. His replacement
adopted a much more reasonable expiry period (6 months IIRC), so I was
able to retire my program.

I think the natural definition of an IT person is SCUM.

Twenty-some years ago now, back in the days when I drew schematics
with a pencil, numbered nodes and loaded a netlist into a VAX780, I
had a problem with an IT guy...

Since there would be periods of terminal inactivity while I drew and
numbered, this ASS would automatically log me off.

So I devised a little circuit that twiddled a keyboard signal
periodically.

So this ASS came by one day and said he was going to revoke my VAX
privileges.

I allowed as how that would not sit well with the management, since I
was, after-all, the ANALOG GOD; AND I would distribute my schematic to
everyone in the company. He decided to leave me alone.

Some months later, working from home, from a dial-up... remember...
twenty years ago... I had a drop-out.

Dialing back in, I rolled right into the system, without logging in.

What I saw was some traffic that made no sense to me, but looked
suspicious, so I reported it to my boss.

About a week later I'm walking in the front door, and the IT guy and
his assistant are being walked out the door, in HANDCUFFS.

Seems they were working a side business on GenRad's computer
facilities.

That was such a joy I damn near wet my pants ;-)
The only thing I've seen close to that was a receptionist who was
running her porn site from behind the security desk. That didn't go over
too well either.

--
Keith
 
"keith" <krw@att.bizzzz> wrote in message
news:pan.2005.04.19.02.19.56.235549@att.bizzzz...

The only thing I've seen close to that was a receptionist who was
running her porn site from behind the security desk. That didn't go over
too well either.
Has she perchance got a phone number - for research purposes ;-)
 
On Mon, 18 Apr 2005 11:52:06 -0700,
Charles Edmondson <edmondson@ieee.org> wrote
in Msg. <426401d7$1@news.cadence.com>

5. A password may not contain any words from any language. Thus,
a password may not contain the letters A, or I, or sequences
such as AT, ME, or TO because these are all words.

Believe it or not, but 1, 2, and 5 are all on the official requirments,
but 1 is modified in that the password must be (deleted to keep out of
trouble with security folks... :cool: )
5 is difficult. It's ANY language, so Spanish rules out the letters Y, E
and O. I'm sure we won't have to look far for a language with the word "U"
in it. So we ruled out all ASCII vowels and therefore pretty much all
ASCII-representable words in any Western language.

--Daniel
 
On Mon, 18 Apr 2005 22:17:46 +0100, Pooh Bear wrote:

Charles Edmondson wrote:

Password history goes back to EVERY password you have ever used. After
6years, that leaves out a lot of letter sequences! I don't know how
the
long timers with 15 years manage to do it!

They don't call the IT staff 'network nazis' for nothing you know.
Hey! Let's not tar all of IT with the same brush - at the company
where I sit, I _am_ the IT department. ;-) It was fun while learning
to properly set up a Linux system, where the docs would say, "Check
with your system administrator". I can't do that! I _AM_ the system
administrator! ;-)

I didn't know how to arrange it so that they'd have the same username/
password on the Samba server, without bringing each one into my office,
or having them tell me their password, so I just created a user "user"
with password "pass", and trained them to use it: "Oh, that's how you
log onto the server." "Oh, uh, OK."

I've been using the same password for about ten years now, except on
paypal and my bank, because those things actually make a difference,
and they're the only things of mine anybody'd be interested in.

Security through obscurity! :)

Cheers!
Rich
 

Welcome to EDABoard.com

Sponsor

Back
Top