Other issues in this category (67)
Checkmate, Mr. Hacker!
Passwords are devised to protect information. Let's see whether the people behind information security basics actually follow the rules they make.
Somewhere around 2014, I found an /etc/passwd file in some dumps of the BSD 3 source tree. It contained the passwords of all the old timers, such as Dennis Ritchie, Ken Thompson, Brian W. Kernighan, Steve Bourne and Bill Joy.
In the IT world, these names aren't simply well known—they’re legendary. But what passwords were those people using?
From the passwords quoted above, we can’t tell whose password is whose, but none of them strikes us as being particularly complex. Nonetheless, we managed to find our hero:
However, Kens password eluded my cracking endeavour.
Well, we are pleased to offer our readers yet another tip for generating passwords!
It’s a good way to come up with memorable passwords if you like chess.
Just a few moves from an opening:
Although, strictly speaking, passwords like these can be regarded as dictionary words.