• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

Secure website passwords

Collapse
X
  •  
  • Filter
  • Time
  • Show
Clear All
new posts

    #11
    I think I'd keep the data in the bottom drawer of a filing cabinet in the basement behind a door with a sign saying "Beware of the Leopard".

    Worked for the local council in HHGTTG.

    Comment


      #12
      I'd use a 20,000 bit public key infrastructure with nuclear bomb proof bunkers on every continent (and the moon) to hold the key authority databases (implemented in Excel). The keys would be hashed using crypt and all the source code would be written in Greek. The 2 SSL accelerators would be located in the Mariana Trench and up Everest. Just to make sure, I wouldn't publish the details on a bulletin board.

      Edit
      Oops!

      Comment


        #13
        Ta for comments esp. silly ones. Suspect best protection against people hacking into my password list will be that nobody will be remotely interested in getting my software for free anyhow.

        Comment


          #14
          What silly ones?



          As a matter of interest, does anyone know how easy would it be to access files protected by apache? Eg the .htaccess file.

          Any file can be protected by apache by putting something like the following into the h t t p d.conf file.

          <Files ~ "^\.ht">
          Order allow,deny
          Deny from all
          Satisfy All
          </Files>

          Comment


            #15
            make the password generated on petr user basis offline. When they install it generates a semi random password depending on machine config, they e-mail you, you e-mail them back.

            That way they never have the full picture so decryption is very diificult. Can't argue with the experts like M$.

            Comment

            Working...
            X