[Info-vax] password strength (Re: VMS humor)

Phillip Helbig undress to reply helbig at asclothestro.multivax.de
Fri Jan 1 14:50:35 EST 2021


In article <rsnmjg$q1g$1 at dont-email.me>, Stephen Hoffman
<seaohveh at hoffmanlabs.invalid> writes: 

> Attempting to brute-force past 12 characters or so is less than 
> feasible on a reasonable timescale with current hardware, outside of 
> the lists of the (tens of thousands) most common passwords, and close 
> dictionary matches from same. And that brute-forcing with longer 
> passwords involves a whole-password mix, and not a partial match.

If I were trying to crack a typically constrained password, I would 
replace 1 with l, 0 with o, and if I crack it, in 90 days increment the 
number by 1.  :-)




More information about the Info-vax mailing list