Password strength

Results: 809



#Item
461Crime prevention / National security / Computing / Password / Phishing / Security awareness / Email / Password policy / Password strength / Security / Computer security / Public safety

Hardening The HumanOS Executive Summary Computers store, process and transfer data that is valuable to your organization. As a result, they have been the primary target for cyber attackers. Years ago, exploiting computer

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-06-20 07:36:29
462Security / Identity management systems / Computer security / Federated identity / Password policy / Password strength / Password / Patient portal / Health

AADE7 System User FAQs I forgot my username and/or password. How can I reset it? If you forget your username or password, click the Forgot Username or Password link on the log-in screen. This will take you to a page on

Add to Reading List

Source URL: www.diabeteseducator.org

Language: English - Date: 2012-10-23 08:36:55
463Computing / Technology / Youth Violence and Juvenile Justice / Password / Email / Internet

Share Our Strength Grants Portal Instructions Welcome No Kid Hungry Grantees! After reading through these instructions, please return to the No Kid Hungry landing page you downloaded these instructions from about grants

Add to Reading List

Source URL: ar.nokidhungry.org

Language: English - Date: 2013-08-12 21:26:21
464Computer security / Identity management systems / Identity management / Password strength / Password synchronization / Security / Password / Access control

Microsoft Word - SeGov Passwords.doc

Add to Reading List

Source URL: matp.pa.gov

Language: English - Date: 2011-03-24 10:36:04
465Computer security / Password manager / Password strength / Password / Security / Default password

EDR Physicians Manual[removed]

Add to Reading List

Source URL: dhhs.ne.gov

Language: English - Date: 2014-08-14 12:52:21
466Cryptography / Password / Usability / Password strength / OTPW / Security / Identity management / Computer security

Exploring Usability Effects of Increasing Security in Click-based Graphical Passwords Elizabeth Stobert, Alain Forget, Sonia Chiasson, Paul van Oorschot, Robert Biddle Carleton University, Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-05 16:35:01
467Cryptography / Cryptographic software / Password strength / Password policy / Password / Security / Computer security

Microsoft Word - Forget_HCI2008DC.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-02-10 11:41:37
468Voice-mail / Business telephone system / Northwestel / Password strength / Unified voicemail / Telephony / Password / Electronic engineering

Microsoft Word - PBX-Toll Fraud.doc

Add to Reading List

Source URL: www.nwtel.ca

Language: English - Date: 2013-02-26 17:26:01
469Password / John the Ripper / Password manager / Password fatigue / Security / Computer security / Cryptography

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:59:17
470Internet privacy / Cryptography / Cryptographic software / Password strength / Password policy / Security / Password / Computer security

Microsoft Word - WIND14-01 privacy issues-1.doc

Add to Reading List

Source URL: www.scwind.com

Language: English - Date: 2014-02-17 11:34:38
UPDATE