28 Years of the Digest ... founded August 21, 1981

Classified Ads
TD Extra News

Add this Digest to your personal   or  

 
 

The Telecom Digest for April 20, 2010
Volume 29 : Issue 109 : "text" Format

Messages in this Issue:
 Re: Please do not change your password                                    (John Levine)
 Re: Please do not change your password                                         (Steven)
 Re: Please do not change your password                                   (Thad Floryan)
 Re: Please don't change your password                                          (Steven)
 Account lockouts, was: Please don't change your password               (danny burstein)
 Re: Account lockouts, was: Please don't change your password                   (Steven)
 Re: Please do not change your password                                           (Gary)
 Re: Please do not change your password                                  (David Clayton)
 Re: Washington State Approves Sale of VeriZon Exchange Areas to Frontier (Carl Navarro)
 Re: Please do not change your password                                         (Steven)
 Re: Please do not change your password                                 (Wes Leatherock)
 Re: Please do not change your password                                  (David Clayton)
 Apocalypse Man                                                     (Cryderman, Charles)
 Re: Apocalypse Man                                                         (Bill Horne)
 It looks genuine ... next iPhone found in a bar?                        (Monty Solomon)
 Re: Please do not change your password                                  (Robert Bonomi)
 Re: Please do not change your password                                  (Robert Bonomi)
 Re: Please do not change your password                                    (John Levine)
 Re: All-digital cellphone - is this good? Or OK?                    (Tor-Einar Jarnbjo)
 Cyberattack on Google Said to Hit Password System                       (Monty Solomon)


====== 28 years of TELECOM Digest -- Founded August 21, 1981 ====== Telecom and VOIP (Voice over Internet Protocol) Digest for the Internet. All contents here are copyrighted by Patrick Townson and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using -any name or email address- included herein for -any- reason other than responding to an article herein, you agree to pay a hundred dollars to the recipients of the email. =========================== Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome. We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. Geoffrey Welsh =========================== See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: 19 Apr 2010 01:32:19 -0000 From: John Levine <johnl@iecc.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <20100419013219.29152.qmail@joyce.lan> > Given that most (if not all) access systems above basic level only > allow "N" attempts at a password before locking out an account, > there must be a reasonable level of complexity that allows a > relatively easy to use password to still be effective and > practically invulnerable to any brute-force/dictionary attack? I gather that with a reasonable policy like four tries separated by ten seconds, then wait 15 minutes until you can try again, four characters are plenty. The advice to have scrambled passwords is based on a model from ancient Unix systems where hostile people can look at the hashed passwords and do a batch offline attack. As Cormac points out, if the threats are phishing and keyloggers, it doesn't matter whether your password is one character or a thousand. R's, John
Date: Mon, 19 Apr 2010 08:43:55 -0700 From: Steven <diespammers@killspammers.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <hqhtnr$65i$1@news.eternal-september.org> John Levine wrote: >> Given that most (if not all) access systems above basic level only >> allow "N" attempts at a password before locking out an account, >> there must be a reasonable level of complexity that allows a >> relatively easy to use password to still be effective and >> practically invulnerable to any brute-force/dictionary attack? > > I gather that with a reasonable policy like four tries separated by > ten seconds, then wait 15 minutes until you can try again, four > characters are plenty. The advice to have scrambled passwords is > based on a model from ancient Unix systems where hostile people can > look at the hashed passwords and do a batch offline attack. > > As Cormac points out, if the threats are phishing and keyloggers, it > doesn't matter whether your password is one character or a thousand. > > R's, > John > I use letters, numbers, upper and lower case on my passwords. One exception is using the social Security web site, they require the use of numbers only. To me that can cause a security problem. -- The only good spammer is a dead one!! Have you hunted one down today? (c) 2010 I Kill Spammers, Inc., A Rot in Hell. Co.
Date: Mon, 19 Apr 2010 10:09:55 -0700 From: Thad Floryan <thad@thadlabs.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <4BCC8E63.7000702@thadlabs.com> On 4/19/2010 8:43 AM, Steven wrote: > [...] > I use letters, numbers, upper and lower case on my passwords. > One exception is using the social Security web site, they > require the use of numbers only. To me that can cause a > security problem. It's worse than that; here are the specific instructions from the SSA (since I just went through this last month and saved to PDF every page during the benefit application process): " Choose a new 7 digit password. Use 7 numbers that are " meaningful to you to help you remember. " " Helpful hints for choosing a password: " " * Use 7 numbers only. " * Use a number that is meaningful to you so that you will " remember it. " " Do NOT choose a password containing: " " * part of your Social Security number; " * a series of numbers that would be easy to guess: " 1234567 or 7654321; " * a series of the same numbers: 2222222 or 3333333; or " * your temporary Password Request Code (PRC). " " Do NOT use a password others might associate with your: " " * telephone number, " * birthday or your child's birthday, " * license plate number, or " * street address number or zip code. that's it. Real secure, huh? :-)
Date: Mon, 19 Apr 2010 17:18:49 -0700 From: Steven <diespammers@killspammers.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please don't change your password Message-ID: <hqirtd$rsf$1@news.eternal-september.org> Thad Floryan wrote: > On 4/19/2010 8:43 AM, Steven wrote: >>[...] >>I use letters, numbers, upper and lower case on my passwords. >>One exception is using the social Security web site, they >>require the use of numbers only. To me that can cause a >>security problem. > > It's worse than that; here are the specific instructions from > the SSA (since I just went through this last month and saved > to PDF every page during the benefit application process): > > " Choose a new 7 digit password. Use 7 numbers that are > " meaningful to you to help you remember. > " > " Helpful hints for choosing a password: > " > " * Use 7 numbers only. > " * Use a number that is meaningful to you so that you will > " remember it. > " > " Do NOT choose a password containing: > " > " * part of your Social Security number; > " * a series of numbers that would be easy to guess: > " 1234567 or 7654321; > " * a series of the same numbers: 2222222 or 3333333; or > " * your temporary Password Request Code (PRC). > " > " Do NOT use a password others might associate with your: > " > " * telephone number, > " * birthday or your child's birthday, > " * license plate number, or > " * street address number or zip code. > > that's it. Real secure, huh? :-) Thats it. I have talked to some of their IT people and they fell the same thing. I have locked myself out more then once and it requires me to start all over getting a new password. My wife's account locked itself and to this day no one knows why. It is the most users UN FRIENDLY site I have ever used. Medicare is much better. I used the application for Social Security online and found it to be a pain as far as time, but made things much easier in getting it. -- The only good spammer is a dead one!! Have you hunted one down today? (c) 2010 I Kill Spammers, Inc., A Rot in Hell. Co.
Date: Tue, 20 Apr 2010 02:58:05 +0000 (UTC) From: danny burstein <dannyb@panix.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Account lockouts, was: Please don't change your password Message-ID: <hqj57s$o0k$1@reader1.panix.com> In <hqirtd$rsf$1@news.eternal-september.org> Steven <diespammers@killspammers.com> writes: [snip] > Thats it. I have talked to some of their IT people and they fell > the same thing. I have locked myself out more then once and it > requires me to start all over getting a new password. My wife's > account locked itself and to this day no one knows why. That's all too commonly a result of someone trying to break into the account. After, perhaps, four tries, the system will freeze that ID pending human (or a related, more secure and painful computer inquisitory) intervention. - which, btw, is one method of setting up a Denial Of Service attack against people or companies. If you could get, for example, President Washington's username at the Revolutionary Bank and Trust, and then try logging in a half dozen times, you'd cause him lots of annoyance. Similarly, if you couldn't get a specific username, but had access to a "botnet", you could pseudo-randomly try hundreds of thousands of IDs at that bank, and lock out plenty of their users. (designing circuit breaker/security algorithms for these banks is left as an exercise to the student). -- _____________________________________________________ Knowledge may be power, but communications is the key dannyb@panix.com [to foil spammers, my address has been double rot-13 encoded]
Date: Mon, 19 Apr 2010 20:29:33 -0700 From: Steven <diespammers@killspammers.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Account lockouts, was: Please don't change your password Message-ID: <hqj730$qhi$1@news.eternal-september.org> danny burstein wrote: > In <hqirtd$rsf$1@news.eternal-september.org> Steven <diespammers@killspammers.com> writes: > [snip] > >> Thats it. I have talked to some of their IT people and they fell >> the same thing. I have locked myself out more then once and it >> requires me to start all over getting a new password. My wife's >> account locked itself and to this day no one knows why. > > That's all too commonly a result of someone trying to break into the > account. After, perhaps, four tries, the system will freeze that ID > pending human (or a related, more secure and painful computer > inquisitory) intervention. > > - which, btw, is one method of setting up a Denial Of Service > attack against people or companies. If you could get, for example, > President Washington's username at the Revolutionary Bank and Trust, > and then try logging in a half dozen times, you'd cause him lots of > annoyance. > > Similarly, if you couldn't get a specific username, but had access to > a "botnet", you could pseudo-randomly try hundreds of thousands of IDs > at that bank, and lock out plenty of their users. > > (designing circuit breaker/security algorithms for these banks is left > as an exercise to the student). Another problem with the Social Security system is your user name is your SS#. I was told that there are changes the works to change both, but they are months or even years away. The Medicare system is a little better as it lets you make real passwords. My credit union required you to log in using your account number, they have since changed that, but for now if you forget your user name you can still use the account number -- The only good spammer is a dead one!! Have you hunted one down today? (c) 2010 I Kill Spammers, Inc., A Rot in Hell. Co.
Date: Sun, 18 Apr 2010 21:42:22 -0400 From: "Gary" <fake-email-address@bogus.hotmail.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <hqgce0$82t$1@news.eternal-september.org> "David Clayton" <dcstar@myrealbox.com> wrote in message news:pan.2010.04.18.22.11.21.574581@myrealbox.com... > > Most password policies are just way over the top for systems that > (usually) will not allow access after a few attempts - and that > essentially discredits the whole security paradigm. Not to mention the whole "forgot your password" secret questions. I seem to recall an article a year or two back in which researchers were able to utilize social media data to answer supposed secret questions. If you post the name of your first pet on Facebook, there is no reason to have passwords on your bank accounts... On of the many reasons I haven't bothered to enter the Facebook world. -Gary ***** Moderator's Note ***** My first pet's name was Benny. I have never used his name in answer to any "secret" question: I use the name of our unit mascot from Vietnam(1). My computer password at work is a combination of five random characters, the year and the month. It's really not rocket science. Birth-dates are dangerous: they're listed in every online record that's linked from a Google search of my name. Your mother's maiden name is useless: it's in a public record: likewise the street you lived on as a child, your first school, etc. The trick is to pick a memory that only you will have, and keep it to yourself. As for my online banking password, I don't know it. It's in my Password Safe, and that file is encrypted with a password that you couldn't guess unless you know my favorite song, and how many characters to offset from the start of each word of a certain verse, provided that you could get access to the file in the first place. Good luck. Of course, Cormac Herley might say "You've proved my point". My answer is that, once the "system" is set up, it's as secure as I choose to make it, and (provided I keep my mouth shut) it's reasonably safe, meets the security requirements of my employer, and will last for the foreseeable future without undue effort on my part. Yes, keygrabbers and phishing attacks are still a risk, but so are securities fraud and driving a car: I can't do anything about those risks, but that doesn't justify ignoring the ones I can mitigate. 1.If you served in Vietnam, I'll just say "Welcome Home". If you served in Danang Joint Customs (8 MP GP(CI), 18 MP BDE), please call me: my Google Voice number is 339-DOG-TITS.
Date: Mon, 19 Apr 2010 14:57:09 +1000 From: David Clayton <dcstar@myrealbox.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <pan.2010.04.19.04.57.08.752294@myrealbox.com> On Mon, 19 Apr 2010 08:11:24 +1000, David Clayton wrote: ......... > Given that most (if not all) access systems above basic level only allow > "N" attempts at a password before locking out an account, there must be a > reasonable level of complexity that allows a relatively easy to use > password to still be effective and practically invulnerable to any > brute-force/dictionary attack? ......... Whoops, forget that pre 2007 Windows Server systems had one account that could never be locked out and could sit there taking ongoing attempts: the Administrator account! -- Regards, David. David Clayton Melbourne, Victoria, Australia. Knowledge is a measure of how many answers you have, intelligence is a measure of how many questions you have.
Date: Mon, 19 Apr 2010 01:14:24 -0400 From: Carl Navarro <cnavarro@wcnet.org> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Washington State Approves Sale of VeriZon Exchange Areas to Frontier Message-ID: <t7pns5td4g6r7eju0cgkho17fb1ib6nh7q@4ax.com> On Sun, 18 Apr 2010 11:39:35 -0700, Steven <diespammers@killspammers.com> wrote: >Eric Tappert wrote: >> On Sat, 17 Apr 2010 20:04:14 -0400, "Gene S. Berkowitz" >> <first.last@verizon.net> wrote: >> >>> In article <0iris5l5urm6bdnpkdgmole5us4vreeof4@4ax.com>, >>> cnavarro@wcnet.org says... >>>> On Fri, 16 Apr 2010 16:09:48 -0700 (PDT), "Mark J. Cuccia" >>>> <markjcuccia@yahoo.com> wrote: >>>> >>>>> Today, Friday 16-April-2010, the Washington (State) Utilities and >>>>> Transportation Commission has approved (the Washington state portion) >>>>> of the sale of most remaining GTE and Contel still retained by VeriZon >>>>> exchange areas, to Frontier, with numerous conditions applied, see the >>>>> following from the WUTC website: >>>>> >>>>> http://www.wutc.wa.gov/webimage.nsf/0/BD97957114A730D4882577070078F3D2 >>>>> >>>>> I have not yet read through all of this, for all of the >>>>> "numerous conditions applied" details, however. >>>> Take this with a grain of salt, but the receivers of Verizon fortune >>>> have not fared very well >>>> http://district13.cwa-union.org/news/verizon-sale-to-frontier-communications.html >>>> >>>> Carl, wondering what my couple of shares of Idearc are worth now :-) >>> 32 cents, the same as mine! >>> >>> --Gene >> >> >> Hey, that's 32 cents more than mine. The Idearc stock was canceled >> December 31st and is totally worthless. See the Reuters artticle at: >> http://www.reuters.com/article/idUSN0419957620100104 >> >> ET >> >> PS - I did get a little tax break by taking my cost basis as a loss >> last year. Hardly worth the paperwork.... >> >> --- news://freenews.netfront.net/ - complaints: news@netfront.net --- >> >The new stock is trading over $40.00 share. During the spin off from >Verizon we were give shares of Idearc depending on Verizon shares. The >day that t he stock was transfered I converted it back to Verizon. I >have done this each time I was given spin off stock and will continue >to so; though I might take a look at the spin off to Frontier since they >appear to have funds on hand to be able to handle the new operating >areas. I have been doing work in Washington and Oregon in Verizon areas >to be spun off and there is a lot of work being done to bring the latest >systems on line. I remember when I had the GTE stock, the stock was >always high and they had plenty of money saved to cover long slow times, >but since the merger(buyout) that money has been spend, a lot going to >company officers. Well that makes me half hot! I didn't bother to cash out my Idearc because I got only 3-5 shares. I wasn't thinking it mattered until they went under. Who is going to publish the directories? Them, just in bankruptcy protection? They should tar and feather the guys who got big bonuses at the expense of the shareholders. It's almost enough to make me support Obama...where's the compensation Czar when we need hime :-) I'm still holding on to the last 100 shares of my ESOP stocks in Vz converted from GTE. In fact, I think I actually got to keep the GTE paper certificates that I actually held (about 30 shares). I think if I get issued Frontier stock, I'll cash it out. That's like buying stock in the White Star Line. Carl
Date: Mon, 19 Apr 2010 17:04:30 -0700 From: Steven <diespammers@killspammers.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <hqir2f$oak$1@news.eternal-september.org> Carl Navarro wrote: >On Sun, 18 Apr 2010 11:39:35 -0700, Steven <diespammers@killspammers.com> wrote: >> they went under. Who is going to publish the directories? Them, just >> in bankruptcy protection? They should tar and feather the guys who >> got big bonuses at the expense of the shareholders. It's almost >> enough to make me support Obama...where's the compensation Czar when >> we need hime :-) > > I'm still holding on to the last 100 shares of my ESOP stocks in Vz > converted from GTE. In fact, I think I actually got to keep the GTE > paper certificates that I actually held (about 30 shares). > > I think if I get issued Frontier stock, I'll cash it out. That's like > buying stock in the White Star Line. Most of mine is ESOP and several hundred are still highly restricted from sale. Frontier got into trouble years ago, but has been pretty stable in the last few years. An old friend works for Rochester Telephone and I remember that being a test site for Stromberg Carlson. -- The only good spammer is a dead one!! Have you hunted one down today? (c) 2010 I Kill Spammers, Inc., A Rot in Hell. Co.
Date: Mon, 19 Apr 2010 06:35:51 -0700 (PDT) From: Wes Leatherock <wleathus@yahoo.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <418556.49003.qm@web111712.mail.gq1.yahoo.com> Telecom Digest Moderator said: > The problem, as I see it, is that the users don't believe the data > in their computers is worth protecting, and thus feel that security > is an imposition on their already-precious time. > > Bill Horne > Moderator > > P.S. No, that wasn't my password: MY password includes a > punctuation mark. It seems to me that you also have to have a long list of UserNames, or whatever the particular sites call them, because each site has its own rules for constructing usernames, and many of them are different from each other. Some of them are derived from internal sources, such as account numbers, that you cannot guess unless you have an external list. Some of them are random. One particular site has a username of 12 numerals, apparently random, and there is no way to derive them from internal or external sources. Wes Leatherock wesrock@aol.com wleathus@yahoo.com
Date: Tue, 20 Apr 2010 08:00:16 +1000 From: David Clayton <dcstar@myrealbox.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <pan.2010.04.19.22.00.11.960183@myrealbox.com> On Mon, 19 Apr 2010 06:35:51 -0700, Wes Leatherock wrote: ......... > It seems to me that you also have to have a long list of UserNames, or > whatever the particular sites call them, because each site has its own > rules for constructing usernames, and many of them are different from each > other. Some of them are derived from internal sources, such as account > numbers, that you cannot guess unless you have an external list. Some of > them are random. One particular site has a username of 12 numerals, > apparently random, and there is no way to derive them from internal or > external sources. Unless there is a published list of e-mail addresses somewhere, which in some cases match the login user names (or something close). -- Regards, David. David Clayton Melbourne, Victoria, Australia. Knowledge is a measure of how many answers you have, intelligence is a measure of how many questions you have.
Date: Mon, 19 Apr 2010 12:10:25 -0400 From: "Cryderman, Charles" <Charles.Cryderman@globalcrossing.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Apocalypse Man Message-ID: <2A3BCEC6F05B404FA87F92729385837D01CBABC00D@EVS22.ams.gblxint.com> >From our Esteem moderator: "There was an ex-marine who was trying to tell me that the best thin to do after the apocalypse was to start up a generator at a hospital so I can charge a battery to get a diesel car started, and how I could make diesel fuel by boiling fat out of a grease trap and get around in the city by using the sewers." Bill, This guy is billed at the Apocalypse Man and he has/had a show on History about this. Chip Cryderman
Date: Mon, 19 Apr 2010 13:50:00 -0400 From: Bill Horne <bill@horneQRM.net> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Apocalypse Man Chip Cryderman wrote: >From our Esteem moderator: >> There was an ex-marine who was trying to tell me that the best thing >> to do after the apocalypse was to start up a generator at a hospital >> so I can charge a battery to get a diesel car started, and how I >> could make diesel fuel by boiling fat out of a grease trap and get >> around in the city by using the sewers. > Bill, > > This guy is billed as the Apocalypse Man and he has/had a show on > History about this. > > Chip Cryderman Yes, I know that, but I was trying to make a different point: there is an ocean of floating garbage out there, and it's easy to get sucked under. It all vanishes as quickly as a flash of headlights across the window after Midnight, and is about as useful. In case it wasn't obvious, aside from the fact that Cable TV is still showing reruns of Mister Ed the talking horse, anyone can get themselves on TV if they're able to project an image of competence in an area the general public knows nothing about. The fact is that there are reasonable steps we can each take to prepare for the unexpected without going looking for a false sense of security: real-life survival skills can't be learned from a TV show. What little I know about disaster preparedness includes this central truth: that there's always a point where you have to stop preparing and admit you can't be ready for everything. I could put on my old Army boots and my Vietnam fatigues and go running around some downtown area at six AM on a Sunday, pretending that anyone cares who or where I am or that I should broadcast the fact to the world, but all I would accomplish is making a lot of people laugh at me: then again, if History Channel (which is, apparently, now in the business of predicting the future as well as recounting the past) was willing to pay an overweight, middle-aged man to spout nonsense, it might be a nice way to supplant my retirement fund. Here's my "Treatment" of my plan for a History Channel program about a believable plan for surviving the "Apocalypse", an event whose size, scope, and severity I will leave to the viewer's imagination, since fear is a lot easier to generate than electricity: 1. Take a good look in a mirror. What you see is what you have to work with. If it's not as good as a young, well-muscled former Marine, then lower your expectations and plan for what you can accomplish. 2. Get in shape. No, you're never going to be twenty-something again, and you'll never again run a mile in 6:52 with full field pack and boots and holding an M-16A2 at port-arms, but you can enjoy the benefits of a reasonable exercise plan no matter what happens in the future, so this small venture into the world of survivalism is a no-brainer. 3. Grow a garden. You'll never taste better food than what you pick yourself, and knowing how to keep varmints out and birds off and worms confined to the compost pile will all be valuable skills that you can trade with if needed. 4. Go camping, at lease twice a year, summer and winter. You'll find out that you can learn to make a fire without a battery and a steel-wool pad, that you can do without one most of the time, and that you won't die by going without a meal or two. As an added benefit, you'll meet lots of other ordinary people, each with individual skills that would benefit a group, whom are used to doing with less, making their own entertainment, and enjoying their lives without benefit of 24/7 media access. As a side benefit, your children will realize that food and batteries don't grow on supermarket shelves, that it's possible to enjoy playing a guitar even if you're not a rock star, and that conversation is an art form. 5. If possible, join a group that you have a lot in common with. If you're a veteran, the VFW and similar organizations will be good resources, and there are many similar places to go, such as the Masons, the Kiwanis, etc. All are a great place to make the friendships and alliances you'll be helpless without: the Lone Ranger could only survive on a stage, not in the real world. If you're a solitary person, uncomfortable with group membership, then you're going to need a plan that reflects and takes advantage of that fact. 6. Be careful about firearms. While they may be sexy and look good on TV, they're also devilishly hard to use and safeguard, and they'd be so valuable after a cataclysm that you'd be more likely to get killed by someone who wants them than by anything else. If you choose to have one, then get appropriate training, a supply of spare parts, a well-made safe that's big enough to hold them, and lean how to do reloading at home. More important, take up hunting: you'll need to be in the habit of taking life, albeit not human life, before you'll be effective in their use. Trust me on this point: pointing a loaded weapon at another human being isn't as easy as the TV stars make it look. 7. Ask yourself what kind of world you're willing to live in. If your skills are all with things you do behind a desk with a working computer network at your disposal, then you're going to have to decide if having dual citizenship and more than one valid passport is worth the expense and (sometimes) risk: the only believable apocalypses I can think of are all temporary interruptions in the normal flow of food and water to my home, so it's very easy for me to prepare for them, but if I thought there was a realistic chance that I'd be able to rebuild my über-geek lifestyle outside the United States, I would also consider being skilled in other languages and having alternate documents to be essential. If you are willing to prepare for a scenario that deprives your city of electricity, communications, fuel, and usable roads for a sustained length of time, then you'll do well to obtain a seaworthy deep-water capable boat, or to obtain a pilot's license and invest in access to a reliable aircraft: after all, everyone has a car, and they'll all be trying to get away from the site of any disaster at the same time. Seafaring and piloting are both skill sets that you can employ in the current society, as well as in any believable future one. OTOH, if you're determined to live in the wake of a nuclear blast or after the next "planet killer" comet hits Siberia, you're going to need a lot more preparation, money, and training than is reasonable for working-class citizens, and if you try to prepare for such an event, all you'll do is make a few cynical businessmen a little richer and yourself into a neighborhood laughingstock. I guess you get the idea: I'm not saying that you shouldn't keep a parachute hidden in the ceiling tiles if you work in a high-rise building, merely that you must be both physically and psychologically prepared to act out-of-step with your peers if the "Apocalypse" actually comes to pass. It's much more work and time and money than you might think by watching some kid sneak around a back lot on the History Channel. My 2˘. YMMV. Bill Horne Copyright (C) 2010 E. William Horne. All Rights Reserved. (Filter QRM for direct replies)
Date: Mon, 19 Apr 2010 14:58:46 -0400 From: Monty Solomon <monty@roscom.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: It looks genuine ... next iPhone found in a bar? Message-ID: <p06240821c7f258359d61@[10.0.1.4]> http://blog.seattlepi.com/microsoft/archives/202550.asp
Date: Mon, 19 Apr 2010 13:48:14 -0500 From: bonomi@host122.r-bonomi.com (Robert Bonomi) To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <hfidncAdjNPzOFHWnZ2dnUVZ_rylnZ2d@posted.nuvoxcommunications> In article <9KSdnVsbTf1Rh1fWnZ2dnUVZ_qY5AAAA@posted.nuvoxcommunications>, Robert Bonomi <bonomi@host122.r-bonomi.com> wrote: >In article <xPCdnVLvvpCZyl7WnZ2dnUVZ_jSdnZ2d@posted.nuvoxcommunications>, >Robert Bonomi <bonomi@host122.r-bonomi.com> wrote: >> [[.. snecky ..]] >> >>Then there is the classical 'good' password: >> >> MickeyMinniePlutoHueyLouieDeweyDonaldGoofySacramento >> >> >>Purportedly used by a blonde, as in "Helloooo -- they said it had to be >>eight characters and a capital!" >> >> >>***** Moderator's Note ***** >> >>I'm sure that the poster's remark is not made with any malice toward >>any particular person with light colored hair. >> >>Bill Horne > >Oh, no! Bill, you weren't using that for your password, were you? > >Kidding aside, if the system in question uses all the characters in a >password of that length, it's not a bad choice. The length alone is >sufficient to render dictionary-type attacks 'impractical', and the >components are easy enough to remember that one is not likely to 'need' >to 'have it written down' to refer to, every time you need to use it. > [[.. snip ..] > >***** Moderator's Note ***** > >The problem that the Microsoft paper alluded to is that security >researchers and "experts" don't consider the value of the users' time >when making recommendations about password strength, change intervals, >etc. > >The problem, as I see it, is that the users don't believe the data in >their computers is worth protecting, and thus feel that security is an >imposition on their already-precious time. > >Bill Horne >Moderator > >P.S. No, that wasn't my password: MY password includes a punctuation >mark. > Ah. ".....CommaSacremento". <guffaw>
Date: Mon, 19 Apr 2010 14:05:48 -0500 From: bonomi@host122.r-bonomi.com (Robert Bonomi) To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <MI2dnSrpHMwRNFHWnZ2dnUVZ_oCdnZ2d@posted.nuvoxcommunications> In article <pan.2010.04.18.22.11.21.574581@myrealbox.com>, David Clayton <dcstar@myrealbox.com> wrote: >.......... >> ***** Moderator's Note ***** >> >> The problem that the Microsoft paper alluded to is that security >> researchers and "experts" don't consider the value of the users' time when >> making recommendations about password strength, change intervals, etc. >> >> The problem, as I see it, is that the users don't believe the data in >> their computers is worth protecting, and thus feel that security is an >> imposition on their already-precious time. >> >> Bill Horne >> Moderator >> >Given that most (if not all) access systems above basic level only allow >"N" attempts at a password before locking out an account, there must be a >reasonable level of complexity that allows a relatively easy to use >password to still be effective and practically invulnerable to any >brute-force/dictionary attack? > >Most password policies are just way over the top for systems that >(usually) will not allow access after a few attempts - and that >essentially discredits the whole security paradigm. INCORRECT. The encrypted password is often stored in a WORLD-READABLE location. Bad guys are known to copy out the list of encrypted passwords, and run their own implementations of the encryption algorithm on their own hardware. No 'alarms' to the system administrator, no account lock-out, no slow-down after each bad guess, etc. Systems that lock an account out after a 'few' bad guesses are really vulnerable to DOS attacks. Hit every 'system' account with the 'required' number of bad guesses, and 'do something' to force a reboot, and NOBODY can get back into the system. A better (FSVO 'better') way is to increasingly delay responses within a single 'session' (TCP or dial-up) as incorrect answers accumulate. Then when the 'limit' is reached, stop responding on that session -- while keeping the session open. Unfortunately, when the bad guys have bot-nets with machine-counts in the 6 to 7 figure range, they can generate a lot of sessions from a lot of different sources. In "information warfare", like any other form of war, the defenders are always on the 'backside of the curve', and playing catch-up. It just goes with the territory.
Date: 19 Apr 2010 21:41:06 -0000 From: John Levine <johnl@iecc.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: Please do not change your password Message-ID: <20100419214106.55611.qmail@joyce.lan> >INCORRECT. The encrypted password is often stored in a WORLD-READABLE >location. Bad guys are known to copy out the list of encrypted passwords, That was true 20 years ago. It's not true now, even on the Unix systems where this problem originated. >A better (FSVO 'better') way is to increasingly delay responses within a >single 'session' (TCP or dial-up) as incorrect answers accumulate. Then >when the 'limit' is reached, stop responding on that session -- while >keeping the session open. Four tries in a row, then a 15 minute delay seems to work well to deter password guessing while avoiding user lockout. R's, John
Date: Mon, 19 Apr 2010 22:45:38 +0200 From: Tor-Einar Jarnbjo <news@jarnbjo.de> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Re: All-digital cellphone - is this good? Or OK? Message-ID: <833tnmFprpU1@mid.individual.net> > ***** Moderator's Note ***** > > What do satellite phones cost? Is there any scenario where having one > sat phone would be cost-comparible to having a separate cell phone for > every region/country you do business in? Satellite phone charges and hardware costs vary quite a lot between the different network operators. Globalstar is probably at the lower end, but they do not offer true global coverage (roughly, there is no coverage in southern Asia, Africa and across the large oceans). The cheapest phones start at around US$ 400 and call charges are in the range 1-2$/min depending on your tariff plan, location and where you're calling to. In several countries, this is well below what you would pay for international roaming or even international calls through a local land-based cellular operator. Tor
Date: Mon, 19 Apr 2010 21:49:00 -0400 From: Monty Solomon <monty@roscom.com> To: telecomdigestmoderator.remove-this@and-this-too.telecom-digest.org. Subject: Cyberattack on Google Said to Hit Password System Message-ID: <p0624082cc7f2b80ec377@[10.0.1.4]> Cyberattack on Google Said to Hit Password System By JOHN MARKOFF April 19, 2010 Ever since Google disclosed in January that Internet intruders had stolen information from its computers, the exact nature and extent of the theft has been a closely guarded company secret. But a person with direct knowledge of the investigation now says that the losses included one of Google's crown jewels, a password system that controls access by millions of users worldwide to almost all of the company's Web services, including e-mail and business applications. The program, code named Gaia for the Greek goddess of the earth, was attacked in a lightning raid taking less than two days last December, the person said. Described publicly only once at a technical conference four years ago, the software is intended to enable users and employees to sign in with their password just once to operate a range of services. The intruders do not appear to have stolen passwords of Gmail users, and the company quickly started making significant changes to the security of its networks after the intrusions. But the theft leaves open the possibility, however faint, that the intruders may find weaknesses that Google might not even be aware of, independent computer experts said. The new details seem likely to increase the debate about the security and privacy of vast computing systems such as Google's that now centralize the personal information of millions of individuals and businesses. Because vast amounts of digital information are stored in one place, popularly referred to as "cloud" computing, a single breach can lead to disastrous losses. The theft began with an instant message sent to a Google employee in China who was using Microsoft's Messenger program, according to the person with knowledge of the internal inquiry, who spoke on the condition that he not be identified. ... http://www.nytimes.com/2010/04/20/technology/20google.html
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne. Contact information: Bill Horne Telecom Digest 43 Deerfield Road Sharon MA 02067-2301 781-784-7287 bill at horne dot net Subscribe: telecom-request@telecom-digest.org?body=subscribe telecom Unsubscribe: telecom-request@telecom-digest.org?body=unsubscribe telecom This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2009 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.
End of The Telecom Digest (20 messages)

Return to Archives ** Older Issues