pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

The Ideal Password Length

The issue began on the password length, when there has been an announcement on the eBay administration that the fixed password they would be accepting is 20 characters. There are some speculations due to security defect. So, at this moment, let us dig the deeper cause of needing a lengthy password.

 

Algorithms on Hashing

A good example is the MD5, not so long ago, MD5 is known to be famous on hashing algorithms for web sites; Still, they experience secure algorithm when it comes to space in the following years. As larger companies processing large distributed networks on custom software, it is not that easy to upgrade the whole system to be able to use a new hashing algorithm. It may take months to years when modifying code to several systems.

 

Optimization of Software

When the software is in C language and it has a hash-passwords of variable length, can you know the length of the password? Using the C, the end string is usually defined by byte 0x00 or the null byte, the length of the string is known through an application that will count the string of each byte until it reach the null byte (and this is a slow process). To process these commands quickly, limiting the passwords to a specific length, so all the passwords are just equal or less than the length (with a pre-defined byte). For this, it only needs a fixed buffer length to handle it and will not worry about anything else.

When a software is stored in a database those plain-text passwords, a limit on the length is really needed, so it would be easier to manage and will increase in speed when every field of each row are in fixed-length.

 

Problem on Ape Condition

This situation is all about the 4 apes in a metal cage and banana hanging on a string from the roof. Whenever an ape pulls a banana, it triggers an electricity and shock all the apes. These apes will learn, that touching the banana will electrocute them. When you take one ape out of the cage and put a new ape inside the cage, the new ape will touch the banana and it will result in beating down from the other apes. If you continue to swap the apes, this goes on until none of the apes were there from the start. The result will be a group of apes beating those apes who touches the banana, although no one knows the real reason for it.

In the community of programmers this has the same pattern. Not so long ago, because of the hardware and software limitations, there were several reasons for passwords limitations and less reason to have long passwords. These reasons became unacceptable over time, however, some programming remain to practice the limits, for there are other people who still do it.

 

The Meaning of Alternate Security

There are people who have problem typing long password correctly, and this could happen. The credit card pin has a 4 digit pin, as you know, where many wouldn’t find hard time to type correctly. So if everyone has a limitation of 4 digit pin, there is a small chance of mistyping the security code. This is where the system allows to implement harsh security where 3 failed attempts can lock your account.

Take note that this type of security is carried out to systems that password hash database which have  little chance to be leaked or broken database will not compromise massive accounts.

 

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Communications Tagged With: Password Length

Latest Articles

How to Remove Live Security Platinum

Live Security Platinum is a fake antivirus program.  It's the exact same as several other malware viruses.  We already have a guide on Smart Fortress 2012.  As this is the same virus threat we just point people to use that guide as the removal process is the exact same.  Visit Guide … [Read More...]

Hard Disk Compliment

The next step up in capacity, 500MB to 1GB, is enough to back-up a reasonably large disk partition. Most such devices also offer good enough performance to function as secondary, if slow, hard disks. Magnetic and MO technology again predominates, … [Read More...]

NetBurst – Pentium 4 7th generation x86 CPU microarchitecture

NetBurst is the name Intel gave to the new architecture that succeeded its P6 microarchitecture. The concept behind NetBurst was to improve the throughput, improve the efficiency of the out-of-order execution engine, and to create a processor that can reach much higher frequencies with … [Read More...]

2021 PC Hardware Releases to Bolster Your Gaming

If you are a PC gamer, then chances are you are looking to upgrade your kit over the coming year. However, a lot of money can go into building the … [Read More...]

New Transfer Feature in Dropbox Enable Sharing files with Third Parties

Dropbox has been a popular P2P sharing platform for many years. They don't announce new features as often as other applications, since they have a … [Read More...]

Ransomware Operators Find Data Theft Profitable

How valuable is your data? That’s not a question that organizations or individuals have to ask themselves all that often. You might know the market … [Read More...]

Engineers Encounter the Quantum Challenge with Computers Running a Hundred Million Times Faster

Quantum computers have been a subject of discussion for many years. They have probably been something that philosophers and technology pundits have … [Read More...]

Transferring Image Files from Your Cell Phone Without Cables or Email

You don't have a cable available to transfer the photos from your cell phone to your computer? You don't feel comfortable sending them through your … [Read More...]

Why Drupal Accessibility is Vital for Your Website

Drupal may not be as popular as WordPress, but it is still used in over 1 million websites. The Internet might be more conducive to our needs if more … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

i845 Chipset

The fact that system builders were obliged to use expensive DRDRAM - by virtue of the absence of any Pentium 4 chipsets … [Read More...]

Advanced Windows Backup

Click Start, point to All Programs > Accessories > System Tools, and then click Backup. The Backup or Restore Wizard is … [Read More...]

PastaLeads Adware Removal

The PastaLeads are obviously an adware program which generally comes on bundled together with no-fee programs you can download. The adware program, … [Read More...]

[footer_backtotop]

Copyright © 2021 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors