In this open series, you can contribute shows that are on the topic of Privacy and Security
Today, the most common way of providing security in giving access to data or systems is through the use of passwords. Practically every online site now expects you to create an account with a password, which will let you post comments, order products, conduct business, or just post to social media. The implication is that insisting on passwords provides some level of security. Now, following on our last tutorial we should ask a few questions about just how effective this measure is, since someone posting in your name to Twitter is significantly different from someone accessing your bank account. And since the assets being protected are very different, it would be reasonable to approach the problem of security somewhat differently in these cases. But given the ubiquity of passwords as the authentication for online accounts, we need to look at the security involved. Note that I am approaching this from the standpoint of the owner of the site in question for this tutorial, and will follow up with a look at your own role in this. For more go to https://www.zwilnik.com/?page_id=640
Comment #1 posted on 2014-09-18 07:34:22 by gigasphere
Thanks Ahuka, I found this episode really useful in assisting my understanding of the subject particularly when talking about the salted hash and which hashing algorithms are the minimum standard now.
Comment #2 posted on 2014-09-21 00:03:01 by Kevin O'Brien
Thank you for the comment
Thank you gigasphere for the comment. It is nice to know I'm giving useful information. We have more to come.
Note to Verbose Commenters
If you can't fit everything you want to say in the comment below then you really should record a response show instead.
Note to Spammers
All comments are moderated. All links are checked by humans. We strip out all html. Feel free to record a show about yourself, or your industry, or any other topic we may find interesting. We also check shows for spam :).