YubiKey Review: Next Generation Authentication
In the 1960?s, when the early generation of mainframe computers began popping up at places like MIT, it quickly became obvious that users needed a way to identify themselves on the machine they were logging into.
|
|
In the 1960?s, when the early generation of mainframe computers began popping up at places like MIT, it quickly became obvious that users needed a way to identify themselves on the machine they were logging into. The solution was simple, and as old as the Romans: you would have to provide the system with your unique name and a secret word only you and the computer knew. The computer password was born.
Now, over 50 years later, that simple scheme is still the way the vast majority of users log into their personal computers or web services. With all of the advancements modern technology has made, we are still left struggling to create and maintain strong passwords day in and day out. Far too many users take the easy way out, and either choose a poor password or write it down in some easily spotted place. The effect is the same, poor password practices lower security and negate the whole point of the password in the first place. Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.