"This sound good to me, I just hope we don't find a password with more than 2 consecutive characters together or per line.". don't try this.
I personnally met two real router passwords.
4gZaY34e -4 appears 2x-
pypkpswD - p apear 3 x-
aXaaYaaaZ can still be a very valid and hard to recover password.
be careful with taken out MNOP. ABCDEF
Removing obvious combination such as WERT FGHJ ZXCVBN should be not recommendable,too.
you shoot yourself in the foot, if you try too hard to "dictate" what people "would" not use such as BAcPOrtA. 987ABC321 is a very nice password to remember, and obvious I read somewhere about art to guessing password by people's lazy behaviour using such key combinations. That is an art, because there are people who realy set it.
Aply too much of these rules and we
1. slow our move
2. running danger to move on to an area finding what password we "think" people would set, but not those which normal human uses, and so we could end up find none of them.
Sorry to be a thorn on your eye. I was surprise this brain storming moves so quickly....Was this morning p3 now to p7 already.... so I think I have to fire a few warning shoots.
these people got it on GPU
http://http.developer.nvidia.com/GPUGems..._ch35.html
" Pattern matching algorithms analyze pieces of the network data stream and compare data patterns (signatures) against a database of known viruses. These signature patterns can be fairly complex, composed of different-size strings, wild characters, range constraints, and sometimes recursive forms....
... over many tens of thousands of signatures. The different signature lengths, wild characters, and range constraints require each input byte to be read and processed many times. In addition, many bytes of state are kept in flight while the matching operation is being done. Figure 35-3 gives an example of comparing the input data against a virus signature
"
the input data against a virus signature
.... hmmm could not see the open source .....
Last but not least I would bring back the idea fighting a dragon by packing its head.
I personnally met two real router passwords.
4gZaY34e -4 appears 2x-
pypkpswD - p apear 3 x-
aXaaYaaaZ can still be a very valid and hard to recover password.
be careful with taken out MNOP. ABCDEF
Removing obvious combination such as WERT FGHJ ZXCVBN should be not recommendable,too.
you shoot yourself in the foot, if you try too hard to "dictate" what people "would" not use such as BAcPOrtA. 987ABC321 is a very nice password to remember, and obvious I read somewhere about art to guessing password by people's lazy behaviour using such key combinations. That is an art, because there are people who realy set it.
Aply too much of these rules and we
1. slow our move
2. running danger to move on to an area finding what password we "think" people would set, but not those which normal human uses, and so we could end up find none of them.
Sorry to be a thorn on your eye. I was surprise this brain storming moves so quickly....Was this morning p3 now to p7 already.... so I think I have to fire a few warning shoots.
these people got it on GPU
http://http.developer.nvidia.com/GPUGems..._ch35.html
" Pattern matching algorithms analyze pieces of the network data stream and compare data patterns (signatures) against a database of known viruses. These signature patterns can be fairly complex, composed of different-size strings, wild characters, range constraints, and sometimes recursive forms....
... over many tens of thousands of signatures. The different signature lengths, wild characters, and range constraints require each input byte to be read and processed many times. In addition, many bytes of state are kept in flight while the matching operation is being done. Figure 35-3 gives an example of comparing the input data against a virus signature
"
the input data against a virus signature
.... hmmm could not see the open source .....
Last but not least I would bring back the idea fighting a dragon by packing its head.