PASSWORD RULES. (from THE MANUSCRIPT) by Michael Stephen Fuchs. Good afternoon, Mr. Luther, said the crewcut man behind the desk.

Similar documents
5 R1 The one green in the same place so either of these could be green.

Transcriber(s): Aboelnaga, Eman Verifier(s): Yedman, Madeline Date Transcribed: Fall 2010 Page: 1 of 9

A Dangerous Game By ReadWorks

Spam. Time: five years from now Place: England

Amber Weyland: [to cameraman] Just hold it there so we can see Mollie.

Combinatorics Prof. Dr. L. Sunil Chandran Department of Computer Science and Automation Indian Institute of Science, Bangalore

6 Stephanie Well. It s six, because there s six towers.

9 R1 Get another piece of paper. We re going to have fun keeping track of (inaudible). Um How much time do you have? Are you getting tired?

The Picture of Dorian Gray

Introduction to Scratch

This is the story of Santa s Enchanted Mailbox

Management General Presents

MITOCW watch?v=0jljzrnhwoi

Fractions and their Equivalent Forms

A simple problem that has a solution that is far deeper than expected!

BBC Learning English Face up to Phrasals Bob & Jackie's Chemistry Project

MITOCW ocw f99-lec07_300k

MITOCW watch?v=se4p7ivcune

For the authors, *****************************************

Fractions and their Equivalent Forms

The Problem, the Solution and the End FinalPart

Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi.

Properties and Definitions

Chapter One. I m Sorry Gramps

Build Your Own Textures for Precious Vol. 1. Greetings!

Instructor (Mehran Sahami):

Henry looks at Edith and smiles, with some embarrassment. It s alright, I m not going to criticise. You are using a Private Use Area characters in

Why you should never ask favors from a graphic designer:

PROFESSOR: Last time, we took a look at an explicit control evaluator for Lisp, and that bridged the gap between

Hello, and welcome to another episode of. Getting the Most Out of IBM U2. This is Kenny Brunel, and

In today s video I'm going show you how you can set up your own online business using marketing and affiliate marketing.

ESSENTIAL EXCEL TIPS. Tips All New Users Must Know. CONQUER THE FEAR OF EXCEL

Fractions and their Equivalent Forms

MITOCW watch?v=w_-sx4vr53m

Explain how computers can communicate binary 1s and 0s using electricity. List the components of popular LAN cables and connectors

Hard Drive and Memory Upgrade Instructions

Songwords for HBCD103 Singalong Sticker Fun

Memory Addressing, Binary, and Hexadecimal Review

Finding the Volume of Solids

Module 6. Campaign Layering

MR Shaders Dielectric Materials Rendering Glass and Simple Caustics

Transcript: A Day in the Life of a K12 Seventh Grade Teacher

CHAPTER 13 ILLUSTRATION

Repetition is not just naturally consistent; it comes from intentional effort to unify all parts of a design.

Post Experiment Interview Questions

Design Principles. The Four Basic Principles That Underlie Good Page Design

Direct Variations DIRECT AND INVERSE VARIATIONS 19. Name

BBC Learning English 6 Minute English Work s

INCOGNITO TOOLKIT: TOOLS, APPS, AND CREATIVE METHODS FOR REMAINING ANONYMOUS, PRIVATE, AND SECURE WHILE COMMUNICATING, PUBLISHING, BUYING,

MAKING OF BY BRUNO HAMZAGIC SOFTWARE USED: MAYA AND ZBRUSH

Project Scan-a-Tron By Allen C. Haid January, 2007

6502 Emulator, Binary, And Hexadecimal

Processing Assignment Write- Ups

1 R1 Right. I mean to keep track. Um. I know that uh do you remember a few years ago um Dr. Davis was in and you were dealing with the Tower of Hanoi?

LEARNING BINARY AND HEXADECIMAL

From video conversation 2. This is a gap fill exercise and can be used as either a quiz/test of

Top 10+ Ways to Annoy People with . AHS Computing

HOW ONE I.T. DIRECTOR DISCOVERS THAT THE THINKPAD P50s IS UNLIKE OTHER MOBILE WORKSTATIONS

How to Use Passive Infrared Sensor Cameras

Team : Let s Do This CS147 Assignment 7 (Low-fi Prototype) Report

Instructor (Mehran Sahami):

Text 1 Cell Phones Raise Security Concerns at School

I started off with a quick nmap scan, which showed both port 80 and 443 open.

FrameForge Previz Studio Usage Case Study. David Evans Emmy nominated Director

MITOCW watch?v=yarwp7tntl4

Lesson 8 Transcript: Database Security

The name of our class will be Yo. Type that in where it says Class Name. Don t hit the OK button yet.

Animation. Animation. Animation. Animation. Animation

Permissions Tutorial: Add a Read-Only User

Photoshop Tutorial: Basic Selections

4. Write sets of directions for how to check for direct variation. How to check for direct variation by analyzing the graph :

GENERAL MATH FOR PASSING

Learn Ninja-Like Spreadsheet Skills with LESSON 9. Math, Step by Step

Outpatient Quality Reporting Program

DIRECTV Message Board

How to Improve Your Campaign Conversion Rates

ACTIVITY 2: Reflection of Light

Screenshots: A preview of Microsoft Windows 10 Microsoft Windows 10 Desktop

THE PERILS OF SEXTING. Written by. Rhonnie Fordham

(Refer Slide Time: 02.06)

CS3 Midterm 1 Fall 2007 Standards and solutions

Theo. Miles. Olivia. Joseph. Nina. Kishan. The Richard Pate School, Cheltenham

MISGUIDED GUIDE SPECS What Specifiers Want and Need

Autodesk University Automotive component lightweight design by advanced material and Moldflow Insight, Helius and Abaqus Co-Simulation

Fractions and their Equivalent Forms

Brand Guidelines FEBRUARY 2018

MANAGING LOCAL AUTHENTICATION IN WINDOWS

In our first lecture on sets and set theory, we introduced a bunch of new symbols and terminology.

Objective: Use multiplication to calculate volume.

mismatch between what is maybe possible today and what is going on in many of today's IDEs.

Bridges K 2 Competencies & Experiences page 1 of 6

Module 10A Lecture - 20 What is a function? Why use functions Example: power (base, n)

C13: Current Threats and Countermeasures 2010 Lou Spahn, Accuvant, Inc.

Subscribe To The Blog Program in itunes Click Here

It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek

Hello World! Computer Programming for Kids and Other Beginners. Chapter 1. by Warren Sande and Carter Sande. Copyright 2009 Manning Publications

Senior Design: Project Alfred The Building Master

10 Strategies for Effective Marketing Campaigns

MITOCW mit-6-00-f08-lec16_300k

Blix the Programmer. An Introduction to Programming. 1.1 We program time. 1.2 First we need a tool

Transcription:

PASSWORD RULES (from THE MANUSCRIPT) by Michael Stephen Fuchs Good afternoon, Mr. Luther, said the crewcut man behind the desk. Stanley Luther flashed an ID absently as he strode to the single door in the room, set in the back wall. It clicked faintly, and he gave it a solid yank. Beyond the embrasure lay a ten-foot hallway and another, identical door, which emitted another click. In the small room beyond sat an additional receptionist, a door with biometric access controls (a configurable combination of voice, thumbprint, retinal, and skin current), and two unblinking black-clad twenty-two year old men with submachine guns standing behind a pane of glass. This last a fabulously bizarre perversion of the notion of the display case gave Stanley the howling fantods every single time he passed it. He couldn t bring himself to meet the matching, disapproving gazes of the lethal mannequins inside. Today the biometrics combo was thumbprint and skin, a quick and complementary pair; he was in the complex in a few seconds. Hate this fucking place, he thought, as he often did, regardless of the vicissitudes of the access control mechanisms. He thought about contract work. But then cut himself off quickly he did not even want to bring that forbidden thought into this sacrosanct and terrible place. Sensibly enough, he worried that wandering thoughts could precipitate a verbal slip-up. But another part of him feared that his thoughts might literally be read out of his head in some way a level of paranoia to

PASSWORD RULES 2 which he had not previously subscribed. However, as he had now actually taken on some contract side work (utterly forbidden, under pain of he cared not to think what), no level of anxiety or caution could really be considered excessive. He nodded at a few familiar colleagues, ignored the rest. He came on-site only rarely. He ducked into his uncluttered and sterile cube. The building kept dust out of the air, or there would be plenty on his terminal. He logged in. There would be an assignment waiting for him. He settled down to read it, not missing the days when he had to speak with a supervisor for routine gigs. Login incorrect Fuck. Password has aged. Please enter a new password: Old password: ************* ************** This password can be guessed, it is too similar to your old password. Please enter a new password. Goddamnit. New password (last prompt): ******** This password can be guessed, it is based on your logon id. Please enter a new password. ********** This password can be guessed, it is part of a known computer word list. Please enter a new password.

PASSWORD RULES 3 Fuck. "What the fuck...?" New password.**** This password is too short, passwords must contain at least 12 characters. Please enter a new password. "Sonofabitch! Fuck you!" An annoyed cough floated over the cube wall. It was very quiet in the complex. Stanley clenched his teeth. New password (last prompt): ********** Password can be guessed, it does not contain enough different characters. Please enter a new password. Stanley looked from left to right around the cramped cube, contemplating the destructive potential of various heavy objects therein. He bit his tongue, imagining a scene of blissful violence. New password (last prompt): He could take that desk clock, brain the coughing bastard in the next cube, then march down the hall and ram the bloody hunk of chrome and glass straight up the tokus of that punk sysadmin who managed his account. He knew where he sat. He knew the guy had been doing "security auditing" of their systems including the password rules, and a whole bunch of other worthless crap that no one

PASSWORD RULES 4 Logout... Console Login: "You piece of fucking shit!" "What is it with you, Luther? Can you let a guy get some work done?" His coughing neighbor had made so bold as to march into Stanley's cube, in a thin mist of self-righteous annoyance. Stanley's face chin on his left shoulder, his eyes twisted into the corners of their sockets turned a rich crimson hue, with knuckles accented in white. He paused six full heartbeats, smiled sheepishly, and said, "Sorry, Bob. Computer's gettin' under my collar again." Bob served up an indulgent grin. "That's okay, Stan. Darned thing gets to me, too." He put his elbow on the cube wall. "Nice to see you in the office." "Yeah. I've been in the field, one thing after another." "Anything interesting?" "Oh, no." Stanley's teeth had already begun bulling in on his grin. "Gotta get this thing going. Got an assignment. You know." "Okay." Bob nodded. "Take it easy!" Password has aged. Please enter a new password: Old password: ************* ***************************** This password is too long, passwords must contain no more than 14 characters. Please enter a new password.

PASSWORD RULES 5 characters?! What? Between twelve and fourteen characters? Twelve, thirteen, or fourteen Contract work. ************* Password must contain at least three non-alphanumeric characters (no letters or numbers--use special characters, such as!,@, or #). Please enter new password. Contract work. Contract work. ************ This password can be guessed, a reversed part of it is part of a known computer word list. Please enter a new password. Contract work. Contract work. Contract work. Contract work. "Hey." Bob again. Stanley was beyond caring. "You know, there's a password generator program." At Bob's direction, Stanley ran it. It produced "ABlgr@@xmy!!wk", which he promptly scribbled on a 1-inch Post-It note and stuck to the front of his monitor. Then he read his assignment.