Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Monday, 17 February 2014
On 06:47 by Unknown in Cyber, Cyber security, Geographical passwords, Hack, Hack-proof, Hackers, Hacking, Internet, password, Passwords, Security No comments
Researcher have found something which could give us a sign of relief. Yes, it's all about passwords. They have invented or discover such type of passwords that are hack proof. Let's have a look at it. What it's all about, Keep reading.
Researchers claim to have developed 'hack-proof' geographical passwords
Computer scientists are developing a new system of 'hack-proof' and easy-to-remember geographical passwords.
Ziyad Al-Salloum of ZSS-Research in Ras Al Khaimah, UAE, has devised geographical passwords as a simple yet practical approach to access credentials that could provide secure access to different entities.
The new "geo" approach exploits people's remarkable ability to recall with relative ease a favourite or visited place and to use that place's specific location as the access credentials.
The prototype system, developed at ZSS-Research, has proven itself capable of protecting a system against known password threats, researchers said.
"Proposing an effective replacement of conventional passwords could reduce 76 percent of data breaches, based on an analysis of more than 47,000 reported security incidents," Al-Salloum said.
The geographical password system utilises the geographical information derived from a specific memorable location around which the user has logged a drawn boundary - longitude, latitude, altitude, area of the boundary, its perimeter, sides, angles, radius and other features form the geographical password.
For instance, the user might draw a six-side polygon around a geographical feature such as the Eiffel Tower, Uluru (also known as Ayer's Rock), a particular promontory on the Grand Canyon, a local church, a particular tree in the woodland where they walk their dog or any other geographical feature.
Once created, the password is then "salted" by adding a string of hidden random characters that are user-specific and the geographical password and the salt are "hashed" together.
Thus, even if two users pick the same place as their geographical password the behind-the-scenes password settings are unique to them.
The research was published in the International Journal of Security and Networks.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Hello folks, How are you all. Today I'm here to bring you on of the most amazing hacking news or trick you can say. So let's begin ...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Have you checked our previous tutorial on Cisco's three tier network model. If you haven't, you must check it. Go to previous tu...
-
OPEN MS-DOS Source Code Early tech fans might remember the good 'ol days of Microsoft MS-DOS, the company's first operating s...
-
Hello folks, this is my first post. M gonna explain about Pat and will give configuration for it with an example below. Port Address...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and soc...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and soc...
Categories
ACL
APPS AND SOFTWARE
Account Hacking
Adobe Flash Player
Android
BREAKING NEWS
Basic Networking
Bluetooth Hacking
Bus Tupology
CCNA
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
FTP
FTP Server
GOOGLE GLASS
Google Hacking
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
algorithms
ccna discovery
ccna exploration
facebook
hacking tool
internet and network security
packet tracer tutorial
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment