• Complain

Kissell - Take Control of Your Passwords

Here you can read online Kissell - Take Control of Your Passwords full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Ithaca;NY, year: 2016;2013, publisher: TidBITS Pubishing Inc, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Take Control of Your Passwords
  • Author:
  • Publisher:
    TidBITS Pubishing Inc
  • Genre:
  • Year:
    2016;2013
  • City:
    Ithaca;NY
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Take Control of Your Passwords: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Take Control of Your Passwords" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Overcome password frustration with Joe Kissells expert advice!

Passwords have become a truly maddening aspect of modern life, but with this book, you can discover how the experts handle all manner of password situations, including multi-factor authentication that can protect you even if a companys password file is stolen and hacked.

The book explains what makes a password secure and helps you create a strategy that includes using a password manager, working with oddball security questions like what is your pets favorite movie?, and making sure your passwords are always available when needed.

Joe helps you choose a password manager (or switch to a better one) in a chapter that discusses desirable features and describes a dozen different apps, with a focus on those that work in OS X, iOS, Windows, and Android. The book also looks at how you can audit your passwords to keep them in tip-top shape, use two-step verification and two-factor...

Kissell: author's other books


Who wrote Take Control of Your Passwords? Find out the surname, the name of the author of the book and a list of all author's works by series.

Take Control of Your Passwords — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Take Control of Your Passwords" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Take Control of Your Passwords 20 Joe Kissell This book is for sale at - photo 1
Take Control of Your Passwords (2.0)
Joe Kissell

This book is for sale at http://leanpub.com/tco-your-passwords

This version was published on 2016-03-25

2013 - 2016 alt concepts inc ISBN for EPUB version - photo 2

* * * * *

* * * * *

2013 - 2016 alt concepts inc.

ISBN for EPUB version: 9781615424696

ISBN for MOBI version: 9781615424696

Read Me First

Welcome to Take Control of Your Passwords, Second Edition, version 2.0, published in March 2016 by TidBITS Publishing Inc. This book was written by Joe Kissell and edited by Kelly Turner.

Passwords are an irritating fact of modern life. Its tricky to create and remember good ones, but dangerous to use simple ones (or reuse a password in multiple places). This book helps you overcome these problems with a sensible, stress-free strategy for password security.

If you want to share this ebook with a friend, we ask that you do so as you would with a physical book: lend it for a quick look, but ask your friend to buy a copy for careful reading or reference. Also, you can .

Copyright 2016, alt concepts inc. All rights reserved.

Updates and More

You can access extras related to this ebook on the Web (use the link in , near the end; its available only to purchasers). On the ebooks Take Control Extras page, you can:

  • Download any available new version of the ebook for free, or buy any subsequent edition at a discount.
  • Download various formats, including PDF, EPUB, and Mobipocket. (Learn about reading on mobile devices on our Device Advice page.)
  • Read the ebooks blog. You may find new tips or information, as well as a link to an author interview.

If you bought this ebook from the Take Control Web site, it has been added to your account, where you can download it in other formats and access any future updates. However, if you bought this ebook elsewhere, you can add it to your account manually; see .

Basics

Be aware of the following:

  • Credentials: I frequently use the term credentials as a compact way of saying the combination of your username and password. In some cases, additional pieces of information, such as your ZIP code or the answers to security questions, may be considered part of your credentialsits whatever a site or service needs to reliably identify you as the authorized user of a given account.
  • Authentication: The act of proving your identity to a computer systemtypically by entering your credentials and having them confirmed as matching the previously stored recordis called authentication. I use that term a number of times in this book, so I want to make sure youre familiar with it.
Whats New in the Second Edition

Version 2.0 of this book is a major new edition, with updated information and advice that reflects the state of technology in early 2016 and adds extensive details about a variety of increasingly popular products and services. Some of the interesting changes are:

  • In that some people hope will eventually supplant todays way of using passwords as a primary means of authentication
  • Updated and significantly improved the accuracy of , which explains the factors determining how likely (or unlikely) a password is to be guessed
  • Greatly expanded the topic
  • Added a sidebar explaining why simple passwords are always a bad idea, even for accounts that dont apparently protect any sensitive data; see
  • Significantly expanded the chapter :
    • In
    • Updated and expanded the discussions of , both of which have changed markedly since the previous edition of this book
    • Added descriptions of ) explaining why I dont cover KeePassX or oneSafe
  • In , added information about Apples new two-factor authentication system and using two-step verification with Dropbox, Facebook, Microsoft, and Twitter accounts
  • Added to help interested readers determine the entropy of passwords they create and understand why such calculations frequently vary
Introduction

Think of a card, any card. Now, keep that card in mind and think of another. Repeat until youve picked twelve cardsbut make sure your selection includes all four suits, at least one ace and one face card, and no two instances of the same card. Remember the whole set, because Im going to ask you again tomorrow

Im joking, of course. But have you ever noticed that when magicians pull someone out of an audience to help with a trick, they never make such complicated requests? Its not reasonable to ask someone to create a meaningless string of numbers and letters, remember it indefinitely, and produce it on demand.

But Web sites, banks, and network administrators make exactly that request of us almost daily. Want to buy something online? Sure, but you need more than a credit cardyou usually need a password too. Sync this data with the cloud, sign up for that free service, manage your utilities or PTA schedule onlineno problem, but you must have a password for that. Make sure its between 10 and 14 characters, contains upper- and lowercase letters, at least one digit, at least one punctuation character, and doesnt have any repeated strings. Oh yeah, and dont even think about using a word that might be found in a dictionary or reusing a password you used anywhere else.

Are you kidding me? This is madness. Coming up with unique, random passwords all the time, remembering them, and producing them reliably is not the sort of task the human brain is cut out for.

Faced with this difficult and increasingly absurd task, people naturally tend to look for shortcuts their brains can handle. They pick easy passwords, like their kids names or patterns of keys on the keyboard. Even if they go to the effort of creating something more complex, they use the same password everywhere, because then they have only one thing to remember instead of hundreds.

Speaking as a fellow human being, I dont blame anyone for taking the easy way out. You might try to come up with clever, random-looking passwords the first few times, but once your list of password-protected accounts grows into the dozens, and then the hundreds, its not plausible to keep following the rules.

However, speaking as a technologist who has spent lots of time researching and thinking about security, Im terrified for people who do this. I know how easy it is to guess, crack, or otherwise uncover someones passwords, because Ive done it myself. And people with far greater skills and resources than mine spend all day, every day doing the same thingnot for legitimate security research but to steal money and secrets, to cause mischief, or to show off.

Every couple of months I read about another high-profile case in which millions of passwords are leaked, hacked, or stolen. And then I look at that list of now-public passwords and shake my head when I see that thousands of folks thought password was a pretty good password! I understand why they did itthey were only trying to manage an unmanageable problembut I feel sorry for them, as their problems didnt end with the site that was hacked. Because these people invariably use the same password on lots of sites, many of them had money and identities stolen, private email messages read, or hate mail sent in their name. Its a big, scary deal.

Back in 2006, I wrote Take Control of Passwords in Mac OS X. In that book, I attempted to explain all the ways passwords are used on a Mac and give advice about managing them. I offered the best guidance I could at the time, based on the available facts. But when I look back at that book now, I get an uneasy feeling because anyone who took my advice then might now be living with a false sense of security. The tools for guessing passwords and breaking encryption have taken massive leaps forward in recent years, with no signs of slowing down. What was safe then may be ridiculously insecure today.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Take Control of Your Passwords»

Look at similar books to Take Control of Your Passwords. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Take Control of Your Passwords»

Discussion, reviews of the book Take Control of Your Passwords and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.