Passwords

Since WikiLeaks recently released thousands of hacked documents from Sony Entertainment Pictures, IT security professionals have been scouring the searchable database of 30,287 documents and 173,132 emails. Besides incriminating celebrity gossip, they found poor password practices that would make even your tech-illiterate grandparents cringe. Security analyst Graham Cluley points out several examples of these practices…

+ read more

GeoffWebb
By: GeoffWebb
Jun 16, 2015
7:33 am
Reads:
471
Score:
Unrated

The rise of mobility in the workplace is prompting government agencies to investigate using multi-factor authentication for access to applications while maintaining compliance to Homeland Security Presidential Directive 12 (HSPD 12). Issued in 2004, this directive mandates common identification standards for federal employees and contractors. Among other security measures, HSPD 12 resulted in the use…

+ read more

David Shephard
Jun 11, 2015
7:13 am
Reads:
182
Score:
5

The idea of driverless cars has fascinated pop culture for many years. From Herbie the Love Bug to KITT from Knight Rider, visions of cars that drive themselves continue to capture our imaginations. Unfortunately, as is the case of driverless cars, we can get ahead of ourselves when trying to develop and use certain technology….

+ read more

Travis Greene
May 26, 2015
3:26 pm
Reads:
527
Score:
Unrated

This document provides an example web script to assist one in enhancing the security and automation of internal or external web sites. This script was written for Google’s Gmail, but can be used as a baseline to get started for other sites.

Jan 7, 2015
11:39 am
Reads:
1,269
Score:
Unrated

This tutorial will explain how to configure GroupWise WebAccess as an AppMark for NetIQ CloudAccess/MobileAccess.  This feature is particularly useful for BYOD situations, such as when an employee wishes to access GroupWise, but does not wish to have corporate restrictions or store their corporate password on their personal device.  This tutorial has three main components:…

+ read more

Matthew Ehle
Feb 6, 2014
2:09 pm
Reads:
1,904
Score:
3

Sometimes, especially in IDM large deployments we can see scenarios where another provider installs the Remote Loader on their servers and obviously we do not have access to it. As we know, both the Remote Loader and App passwords, lives and are determined on the remote server. If you do not have access to that…

+ read more

debianized
Sep 11, 2013
5:08 pm
Reads:
2,385
Score:
5

Passwords are the bane of any security administrator’s life. While the theoretical ideal would be to permit access to systems using two-factor authentication, real-world implementation is rarely simple and often expensive. What’s more, without the right incentives and consumer buy-in, end users may find the additional procedures complex and inconvenient. So why do we care…

+ read more

David Shephard
Jul 22, 2013
9:01 am
Reads:
1,538
Score:
Unrated

This article explains how you can use the NMAS HOTP login method together with the YubiKey hardware token from Yubico.

Jul 9, 2013
4:40 pm
Reads:
2,343
Score:
4.67

The Report shows a password age report and calculates the number of days since the password was reset.

jacksonse
By: jacksonse
Jun 29, 2013
8:54 am
Reads:
1,149
Score:
Unrated

Are you tired of intruder lockouts because someone didn’t change their password in time? If you have NetIQ SecureLogin, your solution is hours away.

Are you using Smart Cards, Windows 7, Novell Client, and also maintaining NDS passwords? What are you doing to maintain the NDS passwords? Ever considered Self Service Password Reset and NetIQ SecureLogin?

Jun 12, 2013
4:06 pm
Reads:
2,640
Score:
Unrated