[Info-vax] password strength (Re: VMS humor)
Phillip Helbig undress to reply
helbig at asclothestro.multivax.de
Fri Jan 1 14:50:35 EST 2021
In article <rsnmjg$q1g$1 at dont-email.me>, Stephen Hoffman
<seaohveh at hoffmanlabs.invalid> writes:
> Attempting to brute-force past 12 characters or so is less than
> feasible on a reasonable timescale with current hardware, outside of
> the lists of the (tens of thousands) most common passwords, and close
> dictionary matches from same. And that brute-forcing with longer
> passwords involves a whole-password mix, and not a partial match.
If I were trying to crack a typically constrained password, I would
replace 1 with l, 0 with o, and if I crack it, in 90 days increment the
number by 1. :-)
More information about the Info-vax
mailing list