Thursday, May 30, 2013

Create a Strong Password

So to begin with, here are some poor decisions to make with your passwords:

DON'T write your password down on a sticky note and put it on your monitor, your pullout writing board or write it on your white board.

DON'T  say the letters and numbers in your password as you type them in.

DON'T use your child's name, your spouses name, your pet's name, your maiden name, or your parent's name.  I'll tell you how you can "sort of" do this later in this post.

And

DON'T tell all your friends, coworkers, or family your passwords.  The only exception to this is to tell your spouse/significant other the real important ones so they can get to money accounts or life insurance sites if you should pass away.

OK, Now let's build a strong password that the internet won't tell you is weak.

Start by reading the 3 appendices I have included.  I promise I am going to use information in those, so if you don't want to get lost, read them first:

Creating a Strong Password-Appendix-1 - Rules
Create a Strong Password Appendix 2 - Ciphers
Create a Strong Password Appendix 3 - Special Characters

Make sure you do at least 3 of the following steps to ensure the password you end up with is strong enough.

Step #1  Choose something you can remember
This is ok to choose a word that means something to you, a name, a thing, a building, a date, a former address (some of these are pretty strong all by themselves), anything that means something to you and that you can remember.

For an example for all these steps, I am going to use the word ANTELOPE

Step #2 write the word backwards (reverse cipher)

  ANTELOPE backwards is   EPOLETNA              (getting stronger already)

Step #3  Use a substitution cipher

I am going to use the following key for this step:

ABCDEFGHIJKLM
TUVWXYZNOPQRS 

so, substituting the letters from the word  
          EPOLETNA
from the key above, we get
           XJIRXAHT

(Remember, you can create your own cipher key to make it unique to you)

Step #4 Focus on repeating letters and substitute a number or special character in its/their place.
in our result from the last step   XJIRXAHT,    the letter X appears twice.

So I am going to substitute a + sign in place of the 2nd X so we get:
           XJIR+AHT

Step #5 Use both Upper and Lower Case Letters

           XjiR+aHt     Simple enough?

Step #6  Replace either a number or special character in your results

We want both numbers and special characters in there to keep the rule makers happy, so I am going to  replace the letter i with the number 1

           Xj1R+aHt


Step #7 Choose a letter to put one last special character substitution to finish it off.

That letter H is calling out to me, so I am going to replace it with 2 square braces [  ]  and a hyphen -  like this:

           Xj1R+a]-[t

And there it is!!               Xj1R+a]-[t          This is my new strong password.

with those special characters, the length turned out to be 10 characters long.  The longer the password, the more secure it becomes.

If I put this in a few password strength testers I get the following results:

http://www.passwordmeter.com/





https://howsecureismypassword.net/



I'd love to hear any of your own methods of building a stronger password.

Creating a Strong Password Appendix 1 - Rules

Most Sites/Security Systems agree on a basic set of rules to help make sure your password is sufficiently strong.  I will discuss the basic list.

Length

I just read an article about how 6 is NOT enough characters in your password.

They recommend 11 to 15 or more characters.    That's a lot to remember.

I used some of my tricks to  create a  password (13 characters long) and one of the password strength testers said it would take a desktop PC 51 million years to break!  That's pretty secure!


Don't Use Real Words

Most services and systems recommend NOT using a word you can find in a dictionary.

But what about words from a language that is not your native tongue?  How about from a dead language that is no longer spoken?

That might work.


Do Use Numbers

One way to use numbers is to substitute numbers for letters.   This is a BAD example, but what if you spelled the word PASSWORD like this?    P455w0rd   ?  Again that was a bad example.

Here are some number/letter substitutes:

L=1
Z=2
E=3
A=4
S=5
G=6
B=8
O=0


Do Use Special Characters

They recommend you use any of the followings Special Characters in your password:

~ ! @ # $ % ^ & *  ) _ + - = [ ] \ { } | : ; < > ? / \

for more info on that see:  Creating a Strong Password Appendix 3 - Special Characters


Do Use Both Upper and Lower Case Letters

This is a simple thing to do.  Just simply capitalize a random letter (or letters) in your password.

Example:   pasSworD


Reduce Repeating Characters

This is not only double letters:  paSSword, bOOKKEEper, or chEEse,

but a number, letter or special character that is used more than once in the password, like:

rHytHm, lEvEl, chEEsE, 18614,  or $tuise$


Avoid patterns

Patterns exist in numbers and letters.  Avoid anything like the following:

QWERTY    (Top row of Letters on Keyboard)
ASDFGHJKL   (2nd row of Letters on Keyboard)
ABABABABA  (
!@#$%^&  (Special Characters in order on very top row of keyboard)

13579  (Odd Numbers)
246810  (Even Numbers)

11235813  (Fibinachi Sequence)
3.14159  (Pi)
E=Mc2 (Einstein's Theory of Relativity)


Avoid Sequential lists

Avoid anything like the following:

ABCDEF
12345
ZYXWVUTS
5678XYZ

Create a Strong Password Appendix 2 - Ciphers

Ciphers

The password strength checkers all say NOT to use real words.  So one method of beating that system is to convert a real word using a cipher.

There are many types of Ciphers, They can be used in any combination to create a strong password.  I'll discuss several here.

Backwards Cipher:

PASSWORD = DROWSSAP
Simply spell your word(s) backward.  This is pretty good, but common words can be broken quite easily.     Never use MadamImAdam in a backwards cipher  (hint it is the same both ways).

Alternating Cipher

In an alternating cipher, you take 2 words and write them using a letter from every other word, like this  (I'll spell the 2nd word in all caps to help you see):

the words lettuce purple would convert to   lPeUtRtPuLcEe

To make this more tricky, you could spell the 2nd word backwards. like this (again, 2nd word is in all caps)

the words Lettuce Purple would convert to  lEeLtPtRuUcPe


Substitution Ciphers.

The can be created in any combination.  For Instance:

Simple Substitution Cipher:

ABCDEFGHIJKLM
NOPQRSTUVWXYZ

Simply substitute the letter above or below it.  For Instance:

If I substitute the letters in the word   password, I get cnffjbeq  p=c, a=n, s=f, etc.

That's all there is to a substitute cipher. but what if we want to get trickier?  Let's mix it up a little

ABCDEFGHIJKLM
ZYXWVUTSRQPON


This is just the same except the letters are arranged a bit differently; the second half of the alphabet is backwards.

If I convert the word password using this I get kzhhdliw.   Hey that's just as mixed up as before, but this time the cipher key is not as obvious.

Let's take it one step further:

ABCDEFGHIJKLM
TUVWXYZNOPQRS

in this case, I broke the bottom line at the letter T.  I added all the letters from T-Z and then ran out, so I started with N again to finish out the bottom line and ended with S.

Definitely NOT as easy to break the cipher key.

Again, these ciphers can be used in any combination to create a strong password.

I would keep a copy of the cipher in your shoe (just kidding) wallet or purse to help you in the event you forget the password you created with it.

Create a Strong Password Appendix 3 - Special Characters

These are potential substitutions for letters in your password.  The normal letter is at the left and its substitution follow each.  This is NOT a complete list.  Make up your own, use your imagination.

A   /\ (Forward and Back Slash)  OR /-\ OR 4
B   |3 OR |} OR !3 OR !}
C   ( OR <  OR [
D   |] OR |)
E   {  OR 3
F   |= OR !=
G   [- OR C- OR C, OR (;
H   |-| OR !-! OR ]-[
I   ][ OR | OR ! OR 1
J   _| OR ,| OR .| OR _! OR ,! OR .!
K   |< OR JUST <
L   |_ OR !_ OR 1
M   |v| OR !V! OR nn OR |\/| OR !\/!
N   |\| or !\!
O   0 (zero) OR [] OR {} OR ()
P   |> OR |^ OR !^ OR !* OR |*
Q   @ OR O_ OR O, OR O~ OR (repeat all these with a 0 (zero) instead of Captial o )
R   |? OR !? (couldn't find a good one, make up one that you can remember)
S   $ OR (/) OR 5
T   -|- OR -!- OR ^|^ etc
U   |_| OR !_! OR [_]
V   \/ (Back and Forward Slash) OR ^
W   vv OR VV OR \/\/
X   * OR +
Y   ^/ OR `/ Z   (\) OR /|/  OR %


The following are the names and locations of the harder to find special characters:
~ (tilda) to the left of the number 1 near letter Q (Shifted)
[ (Left Square Bracket) near letter P
] (Right Square Bracket) near letter P
{ (Left Curly Brace) near Letter P  (Shifted)
} (Right Curly Brace) near Letter P  (Shifted)
\ (Back Slash) above Enter Key
| (Piper Symbol) above Enter Key (Shifted Back Slash)
/ (Forward Slash) same key as Question mark ?  (Not Shifted)

Tuesday, May 14, 2013

Fake it until you become it !!

Over the years I have attended many professional development classes that have helped me a lot!  At one point I was attending a conference called COMMON for IBM Sys/36, Sys/38 and AS/400 (they were called mini computers at the time). These machines are now called the I-Series line (until they change the name again).

Anyway, we would learn all about specific software, the OS/36/38/400 operating systems, RPG/400, Security, Customer Support, etc.

Certainly I attended the classes I was sent to attend, but I always caught several sessions from the Professional Development track.

These sessions called to my soul, they helped me believe in myself when I needed it. They are designed to help me be a better, more professional employee/consultant.  I still think back to things I learned then and other similar classes I have taken since then.

So here is the first installment of a category that I am going to also call Professional Development.

This is a wonderful message from TED Talks/2012.  It was published to YouTube in Oct 2012.

Amy Cuddy brings to light a great idea to chew on.  Fake it until you become it.  If we only present ourselves as we currently are, we would never grow, nor make any progress in our careers.  

I have seen this in many instances in business, where someone is promoted from within to a management position.  This person's peers say "That is just Sam (or Sally) how can they lead us?"

So I watch Sam/Sally step up to the plate and act the way they have seen other managers present themselves.  Are they true managers yet?  Probably not.  But they persist and eventually they BECOME a manager.

This reminds me of the movie Remember the Titans.  The lead quarterback is injured and they had a backup QB, but he had never really acted as the leader on the field.  They put him in and tried to give him advice on how to lead and he says, "I've got this taken care of."

Then he runs out there are tells everybody to buck up and lets get serious, it's time to work!  And off they go.  I think he had some leadership skills, but no one on the team had seen them before, so he just went out and "faked it."

But enough about that,  Listen to Amy Cuddy.  She shows simple everyday ways to bring out our best self.  I'll include more on Body Language in upcoming posts.


Please leave a comment and let me know if this is beneficial and if you'd like to see more content of this type.

Thanks, 

Talk to you soon!

Wednesday, April 10, 2013

Adjust White Balance

 

Adobe Photoshop

 First Image
 Figure 1: Image with Poor White Balance
 
Have you ever been disappointed by a batch of photos that you thought were great when you took them, but later, they look only so, so? Even a little drab or dreary?

Maybe your white balance wasn't set correctly.

This article is to help you after the fact. I will post another that will help you set the camera up correctly

Cute Little Word Tricks Part 1


Microsoft Word


First Image
Trick #1 The Change Case Option


There are several reasons that this trick may come in handy.
  • You accidentally have the [Caps Lock] turned on.

Select Columns From Another Sheet With VBA

Microsoft Excel

 

First Image
(Figure 1) Control Sheet with Command Button and Yes/No Criteria
Problem:

You want to use VBA (Visual Basic for Applications) in Microsoft Excel to hide columns in a different sheet than the one with the controls.

Solution:

This example works with Excel 2003 or 2007. It uses a workbook with three worksheets named Control, Labor, and Report. (See Figure 1)

MS Access Record Navigation Keys

Microsoft Access

Record Navigation Keys

This is a basic topic, but I have found many people that are unaware of this feature.

When using a form in MS Access (any version: 1997 or later) a navigation toolbar is displayed by default at the bottom of the form, as seen in Figure 1.

These buttons are quite self evident, but here we go starting from the left:

Second Image
Figure 1: The Record Navigation Bar


First Record Button: This moves the record pointer to the first record in the table and the data is displayed. (In some versions of MS Access) If you are already positioned on the first record, this is

Compact and Repair Your Database


Microsoft Access

This came up again, so I thought I would share it with you.

As an Access database is used and records are both added and deleted, the datbase grows. BUT, the allocated space (on disk) for any deleted records is not actually removed.

For example: You have a table with 5000 records and you go through and clean up any outdated or obsolete records. This seems like it should help make the database as a whole perform faster and more efficiently.

However, if you look at the total size on disk before

Number Field Loses Decimals

Microsoft Access


Problem:
A field created in Access (2007) is specified as a number with two decimal places (non currency). When data is entered, it rounds to the nearest whole number. This may still occur with the decimals showing as .00

Solution:
This is not a difficult problem, but can be really frustrating if you do not know the correct combination of field properties. The problem is in the definition of the field. The example below is for a field to hold the

Gone Phishing



A Phishing Scam is an email message sent by unknown persons that are looking for valid email addresses to sell to spammers.

The way they do this is to send you a message that looks too good to be true.

The message will ask you to go one of several things, any of which tells the 'Phishers' that your email address is valid.

  • call a phone number, they will ask for your email address.
  • click a link within the message (this promises something that is rarely delivered)
  • open an attachment
  • go to a certain website and enter your email address
  • etc.


This situation can result in:

Thursday, April 4, 2013

Vista Wireless Connection, Local Only: SOLVED


First Image
Figure 1: Connected to Router only
Works in Safe mode or normal mode

In my PC Cleanup/Virus removal/Performance tuning work I have seen several PCs and Laptops that don't/won't connect to the Internet with the System Tray message:

The Windows Registry and Registry Cleaners

The windows registry is a vital system file that is basically a large list of every program or data file/document that was ever installed using the standard windows installation program (msi).

Think of the windows registry like a big phone book. It lists programs and settings for anything you install or create on your PC.

Most uninstall utilities leave fragments behind in the registry. When something is not completely and cleanly

Speed up your Computer - USE Extreme Caution !!

Caution !! Caution !! Caution !! Caution !! Caution !! Caution !! Caution !!

DISCLAIMER !!


This is a set of steps I copied from techpirates . com
Here is the exact link:

TechPirates Posting

Don't use most of those listed on their link if you don't want to totally mess up your Windows installation.....

I have included (and Renumbered) only those that are easier to do and less harmful if you don't/can't follow

Protect your PC part 2

Forwarded Email Messages

There are some very funny, cute or shocking emails passed across the Internet everyday.

There are also some very dangerous viruses passed across the Internet everyday.

A lot of the time they are linked together.

Protect your PC part 1

This post will discuss the evils of viruses and malware that can come from social networking sites.

As you know I clean individual and corporate PCs that get bogged down, locked up or incapacitated from viruses, spyware and other malware.

I try to get as much history of the problem as I can before I begin. Too many times the

Welcome to...SPAMmmalot


First Image
Figure 1: Never heard of Chris Newton..


Ok, just for fun... Here is a link to a youtube video of a legomation version of Monty Python's Holy Graile Camelot musical number: "Welcome to Camelot!" Hence the name of this blog. (video opens a new window)

Back to the topic at hand.

Our Files Are Back!

Hey Stuart,

Our computer is running great! Thanks for all you did and for getting the files back! We are really enjoying having our computer back up and running.

Sincerely,

DCH

Idaho Falls, ID

Young people will love this

The cups and water visual aid was wonderful! That was one of the best object lessons I have ever seen.
That explained your point so well. Anyone can easily understand what you were teaching. Very good!

HJB

Idaho Falls, ID

Wow, That Was Great

My Father had Taught me some of these same financial topics, but several things you taught today became very clear.

You are very good at explaining things.

M.B.

Idaho Falls, ID

Always a Pleasure to Sit in a Class with Stuart

After I left I realized I had a recording device in my pocket.
I sure wish I had used it!

T.S.
Idaho Falls, ID

That Was Awesome

Thanks, Stuart.
That was a very amazing presentation.

R.S.
Idaho Falls, ID

His Work Was Exceptional!


July 9, 2009
"To Whom It May Concern:

Earlier this year my office contracted with Stuart Purser of Purser Consulting Services, Inc. to complete some database work for us. He had to manipulate a very complex database to produce a merged letter for 2000 students. This letter was composed of information derived from many of the tables in the database.

I was so very pleased with Mr. Purser`s work. He was fun to work with, yet very professional. His database knowledge was

You Made My Day

"I was very put out... the Internet connection for my PC had suddenly stopped. My wife`s laptop could connect just fine..

I called Stuart at Purser Consulting Services and he came over later that same day.

Not only did he quickly fix the Internet connection, but Stuart solved 5 other problems I was having all in one and a half hours...

You made my day!"
M.C. Idaho Falls

Thanks So Much

"Stuart is the most awesome teacher! He is patient, knowledgeable and just a super guy. Thanks for all your help."
Anonymous - Eastern Idaho