Endpoint // Authentication
3/26/2014
02:00 PM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Strong Passwords

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Comenclater
50%
50%
Comenclater,
User Rank: Apprentice
5/21/2014 | 5:51:03 PM
Re: Ah!
I use password manager Sticky Password (http://blogen.stickypassword.com/creating-strong-passwords-with-sticky-password/) . It acilitates my life.
rhartung528
50%
50%
rhartung528,
User Rank: Apprentice
4/8/2014 | 1:08:47 PM
Ah!
So how long can it take to enter your password?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/7/2014 | 12:24:32 PM
Re: Almost too good...
Very funny @BurnsieUK! :-)
BurnsieUK
50%
50%
BurnsieUK,
User Rank: Apprentice
4/7/2014 | 11:37:22 AM
Re: Almost too good...
By the time we need to decode them a computer the size of a planet will be able to do it in an instant.

 
Sara Peters
100%
0%
Sara Peters,
User Rank: Author
3/26/2014 | 8:58:05 PM
Almost too good...
Hahahaaaa. Hilarious. It does make me wonder though... how much of today will be forever lost to history, because wonderful security and/or speedy obsolescence of digital media will render most of life indecipherable?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/26/2014 | 8:54:46 PM
Love the cartoon!
Nice touch. Are those glyphs encrypted?
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0750
Published: 2015-05-22
The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786.

CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.