0%

Book Description

Passwords have become a truly maddening aspect of modern life, but with this book, you can discover how the experts handle all manner of password situations, including multi-factor authentication that can protect you even if your password is hacked or stolen.

The book explains what makes a password secure and helps you create a strategy that includes using a password manager, working with oddball security questions like "What is your pet’s favorite movie?", and making sure your passwords are always available when needed.

Joe helps you choose a password manager (or switch to a better one) in a chapter that discusses desirable features and describes a dozen different apps, with a focus on those that work in macOS, iOS, Windows, and Android. The book also looks at how you can audit your passwords to keep them in tip-top shape, use two-step verification and two-factor authentication, and deal with situations where a password manager can’t help.

The book closes with an appendix on helping a relative set up a reasonable password strategy for those whose relatives have distressing password strategies, and an extended explanation of password entropy for those who want to consider the math behind passwords.

This book shows you exactly why:

  • 9-character passwords with upper- and lowercase letters, digits, and punctuation are not strong enough.

  • You cannot turn a so-so password into a great one by tacking a punctuation character and number on the end.

  • It is not safe to use the same password everywhere, even if it’s a great password.

  • A password is not immune to automated cracking because there’s a delay between login attempts.

  • Even if you’re an ordinary person without valuable data, your account may still be hacked, causing you problems.

  • You cannot manually devise “random” passwords that will defeat potential attackers.

  • Just because a password doesn’t appear in a dictionary, that does not necessarily mean that it’s adequate.

  • It is not a smart idea to change your passwords every month.

  • Truthfully answering security questions like “What is your mother’s maiden name?” does not keep your data more secure.

  • Adding a character to a 10-character password does not make it 10% stronger.

  • Easy-to-remember passwords like “correct horse battery staple” will not solve all your password problems.

  • All password managers are not pretty much the same.

  • Your passwords will not be safest if you never write them down and keep them only in your head.

But don’t worry, the book also teaches you a straightforward strategy for handling your passwords that will keep your data safe without driving you batty.

Table of Contents

  1. Read Me First
    1. Updates and More
    2. Basics
    3. What’s New in Version 3.1
    4. What Was New in the Third Edition
  2. Introduction
  3. Passwords Quick Start
  4. Understand the Problems with Passwords
    1. Simple for You, Simple for Them
    2. The One and the Many
    3. The Major Threats
    4. Timeworn Tricks
    5. Usernames and Passwords: an Outdated Model
  5. Learn About Password Security
    1. What Makes a Good Password?
    2. All About Entropy
    3. Why a Great Password Isn’t Enough
    4. Understanding Security Questions and Reset Procedures
    5. Multi-Factor Authentication
    6. Authenticating with Another Site’s Credentials
  6. Apply Joe’s Password Strategy
    1. Figure Out Which Passwords You Must Memorize
    2. Create Strong but Memorable Passwords
    3. Use a Password Manager for Everything Else
    4. Handle Security Questions
    5. Manage Email Options
    6. Deal with Exceptions and Surprises
  7. Pick a Password Manager
    1. Features to Look For
    2. Example Password Managers
    3. Joe’s Recommendations
  8. Keep Your Passwords Secure
    1. Avoid the “Weakest Link” Problem
    2. Use Wireless Networks Safely
    3. Back Up Your Passwords
    4. Prepare an Emergency Password Plan
  9. Audit Your Passwords
    1. Understand the Overall Process
    2. Look for Weak Passwords
    3. Triage Your Passwords
    4. Update a Password
    5. Check for Compromised and Vulnerable Passwords
  10. Appendix A: Use Two-Factor Authentication
    1. Two-Step Verification Basics
    2. Use Apple’s Enhanced Security Options
    3. Use Dropbox’s Two-Step Verification
    4. Use Facebook’s Two-Step Verification
    5. Use Google’s Two-Step Verification
    6. Use Microsoft’s Two-Step Verification
    7. Use Twitter’s Two-Step Verification
  11. Appendix B: Help Your Uncle with His Passwords
    1. Password Manager Compromises
    2. Password Reuse Compromises
    3. Password Complexity Compromises
  12. Appendix C: Calculate Password Strength
    1. The Entropy Formula
    2. An Aside: Doing Math with Google
    3. Why That Entropy Formula Is Wrong
    4. Back to zxcvbn
    5. Password Strength Summary
    6. For Further Reading
  13. About This Book
    1. Ebook Extras
    2. About the Author and Publisher
    3. Credits
  14. Also by Joe Kissell
  15. Copyright and Fine Print
18.119.118.99