<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Protecting Your Passwords and Confidential Information</title>
	<atom:link href="http://www.gfi.com/blog/protecting-passwords-confidential-information/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/protecting-passwords-confidential-information/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-passwords-confidential-information</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/protecting-passwords-confidential-information/comment-page-1/#comment-1051</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Wed, 16 Dec 2009 09:37:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1715#comment-1051</guid>
		<description><![CDATA[Ah I was missing that detail :) didn&#039;t know PPP is a two factor authentication system. Yes in that case it&#039;s pretty robust and quite an elegant solution too!

Glad you&#039;re finding this useful, this is exactly was I hoping for too; that the articles generate discussion and ideas]]></description>
		<content:encoded><![CDATA[<p>Ah I was missing that detail <img src='http://www.gfi.com/blog/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' />  didn&#8217;t know PPP is a two factor authentication system. Yes in that case it&#8217;s pretty robust and quite an elegant solution too!</p>
<p>Glad you&#8217;re finding this useful, this is exactly was I hoping for too; that the articles generate discussion and ideas</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Leandro Amore</title>
		<link>http://www.gfi.com/blog/protecting-passwords-confidential-information/comment-page-1/#comment-1018</link>
		<dc:creator>Leandro Amore</dc:creator>
		<pubDate>Tue, 15 Dec 2009 16:02:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1715#comment-1018</guid>
		<description><![CDATA[The PPP is a two factor authentication, so you need something you know (your everyday password) and something you have (the paper with the second password). So in case that the users lost list list the attacker still needs the password for the account.

It&#039;s great to interact with you guys, it always make me think about new ideas for my every day job :)]]></description>
		<content:encoded><![CDATA[<p>The PPP is a two factor authentication, so you need something you know (your everyday password) and something you have (the paper with the second password). So in case that the users lost list list the attacker still needs the password for the account.</p>
<p>It&#8217;s great to interact with you guys, it always make me think about new ideas for my every day job <img src='http://www.gfi.com/blog/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/protecting-passwords-confidential-information/comment-page-1/#comment-841</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Fri, 11 Dec 2009 09:22:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1715#comment-841</guid>
		<description><![CDATA[Virtual Keyboard is actually a brilliant idea, Thanks Leandro.  Two Factor authentication using tokens is also a good option against key loggers, provided that whatever you do after logging in will not be confidential since a key logger will log anything that one types and not just the password. 

Correct me if I am wrong but the perfect paper passwords is an implementation of the One Time Password  (OTP) concept right? Where you have a number of passwords printed out and you use them sequentially? While it&#039;s great against key loggers it might be a small security risk if someone gets access to that list. Maybe a more secure way to do it could be by simply phoning the administrator for a One Time Password whenever one needs to log on from an Internet cafe or other unsecured terminals. Still I guess if the user takes adequate precautions such as ensuring that no one is shoulder surfing him/her or that s/he is not being watched by some camera, it should be safe enough.

Again thanks for the Virtual Keyboard option, it&#039;s actually a great idea!]]></description>
		<content:encoded><![CDATA[<p>Virtual Keyboard is actually a brilliant idea, Thanks Leandro.  Two Factor authentication using tokens is also a good option against key loggers, provided that whatever you do after logging in will not be confidential since a key logger will log anything that one types and not just the password. </p>
<p>Correct me if I am wrong but the perfect paper passwords is an implementation of the One Time Password  (OTP) concept right? Where you have a number of passwords printed out and you use them sequentially? While it&#8217;s great against key loggers it might be a small security risk if someone gets access to that list. Maybe a more secure way to do it could be by simply phoning the administrator for a One Time Password whenever one needs to log on from an Internet cafe or other unsecured terminals. Still I guess if the user takes adequate precautions such as ensuring that no one is shoulder surfing him/her or that s/he is not being watched by some camera, it should be safe enough.</p>
<p>Again thanks for the Virtual Keyboard option, it&#8217;s actually a great idea!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Leandro Amore</title>
		<link>http://www.gfi.com/blog/protecting-passwords-confidential-information/comment-page-1/#comment-833</link>
		<dc:creator>Leandro Amore</dc:creator>
		<pubDate>Thu, 10 Dec 2009 22:47:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1715#comment-833</guid>
		<description><![CDATA[I totally agree with you guys, some ideas to sum up to your thoughts. It&#039;s always best to use secure connections as HTTPS and virtual keyboards when the application allows them (to prevent key logging). 
If you can choose the auth method for your application there is always a good idea to use a 2 factor authentication like RSA or Tokens. There is an excellent method by Steve Wibson called PPP (Perfect Paper Passwords) which is completely free and as secure as many of the commercial solutions.

Best regards

Leandro]]></description>
		<content:encoded><![CDATA[<p>I totally agree with you guys, some ideas to sum up to your thoughts. It&#8217;s always best to use secure connections as HTTPS and virtual keyboards when the application allows them (to prevent key logging).<br />
If you can choose the auth method for your application there is always a good idea to use a 2 factor authentication like RSA or Tokens. There is an excellent method by Steve Wibson called PPP (Perfect Paper Passwords) which is completely free and as secure as many of the commercial solutions.</p>
<p>Best regards</p>
<p>Leandro</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/protecting-passwords-confidential-information/comment-page-1/#comment-811</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Thu, 10 Dec 2009 10:40:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1715#comment-811</guid>
		<description><![CDATA[I completely agree with John, VPN Tunnel is a great way to mitigate the risks when connecting through a wireless connection from your own laptop while at the airport or at a hotel or any other place really. However you still need to ensure that there are no key loggers, although using your own hardware, if it&#039;s adequately protected, the risk should be minimal.]]></description>
		<content:encoded><![CDATA[<p>I completely agree with John, VPN Tunnel is a great way to mitigate the risks when connecting through a wireless connection from your own laptop while at the airport or at a hotel or any other place really. However you still need to ensure that there are no key loggers, although using your own hardware, if it&#8217;s adequately protected, the risk should be minimal.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: John Mello</title>
		<link>http://www.gfi.com/blog/protecting-passwords-confidential-information/comment-page-1/#comment-711</link>
		<dc:creator>John Mello</dc:creator>
		<pubDate>Mon, 07 Dec 2009 15:57:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1715#comment-711</guid>
		<description><![CDATA[Users concerned with security away from the home and office might want to consider using a VPN service to protect their information, including their passwords. These services offer a secure Internet connection from wherever they&#039;re used. Encryption in VPN tunnel can vary from as low as 128 bits to as high as 2048 bits. Users should understand, though, that the higher the bit rate, the slower the connection will behave. Since these services open up the entire Internet to its clients, network administrators should carefully review any service chosen to insure that employees won&#039;t use it to circumvent corporate policies governing Internet usage. For example, blocked sites will no longer be blocked using these services. In addition, some services offer USB thumb drive versions of their wares, which may allow some travelers to leave their laptops at home where they may be less likely to be stolen. Pricing for the services varies from $100 a year to $15 a month to $4 or $5 for shorter periods of time. Of course, if a computer is infected with keyboard logger or other such pest, not even a VPN is going to keep a user&#039;s passwords safe.]]></description>
		<content:encoded><![CDATA[<p>Users concerned with security away from the home and office might want to consider using a VPN service to protect their information, including their passwords. These services offer a secure Internet connection from wherever they&#8217;re used. Encryption in VPN tunnel can vary from as low as 128 bits to as high as 2048 bits. Users should understand, though, that the higher the bit rate, the slower the connection will behave. Since these services open up the entire Internet to its clients, network administrators should carefully review any service chosen to insure that employees won&#8217;t use it to circumvent corporate policies governing Internet usage. For example, blocked sites will no longer be blocked using these services. In addition, some services offer USB thumb drive versions of their wares, which may allow some travelers to leave their laptops at home where they may be less likely to be stolen. Pricing for the services varies from $100 a year to $15 a month to $4 or $5 for shorter periods of time. Of course, if a computer is infected with keyboard logger or other such pest, not even a VPN is going to keep a user&#8217;s passwords safe.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 06:37:35 by W3 Total Cache --