{"id":1116,"date":"2008-07-14T09:41:48","date_gmt":"2008-07-14T09:41:48","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm"},"modified":"2008-07-14T09:45:23","modified_gmt":"2008-07-14T09:45:23","slug":"generating-secure-passwords","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm","title":{"rendered":"Generating secure passwords"},"content":{"rendered":"<p><a href=\"http:\/\/viewfromthebunker.com\/2008\/07\/11\/and-your-password-is-password\/\">One corporate blogger at Symantec recently wrote about the useless passwords that people use<\/a> (with various lists placing &#8220;password&#8221;) at or close to the top of the list.  <a href=\"http:\/\/www.davidnaylor.co.uk\/top-10-passwords-2008.html\">His source contained some dubious claims<\/a> (e.g. it claimed that one of the top passwords across Europe is &#8220;monkey&#8221;&#8230; maybe that is the case for English speaking Europeans but it&#8217;s unlikely to be the case in French, German, Spanish, Italian, Portugese, Greek, etc., etc.) but his point is valid &#8211; systems that require a password require one for a reason &#8211; usually to protect either the data contained in the system, or the reputation\/identity of the person to which access is being granted or the company who operates the system.<\/p>\n<p>As a concept, the idea of a username and accompanying password is flawed &#8211; ideally we would be using another form of identification and authentication &#8211; and that should use <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/multiple-factor-security.htm\">multiple factors<\/a> (something I have\/know\/am) but in amongst the nearly 2 hours of drivel that was <a href=\"http:\/\/www.twit.tv\/mbw97\">last week&#8217;s MacBreak Weekly podcast<\/a> (note to self: drop this subscription from iTunes) was a little gem about generating new secure passwords.  The panel was advocating the use of a utility such as <a href=\"http:\/\/www.speedapps.com\/onepass.htm\">OnePass<\/a> to generate and manage passwords when one of them said he does something similar from the command line: Unix\/Linux and Mac users can type <code>openssl rand -base64 6<\/code> to generate a secure 8 character password (the number on the end of the command needs to be multiplied by 4 thirds to get the length of password &#8211; <a href=\"http:\/\/www.tech-recipes.com\/openssl_tips1264.html\">more details of using OpenSSL to generate secure passwords are available at the tech-recipes website<\/a>).<\/p>\n<p>One man who knows an awful lot about security, Steve Gibson, has produced a <a href=\"https:\/\/www.grc.com\/passwords.htm\">secure online password generator<\/a> but the 64-character passwords it generates are a bit extreme for most purposes &#8211; and &#8220;secure&#8221; passwords of any length create their own problem &#8211; they are totally unmemorable, so most users will resort to using some form of password safe (either online or offline), reducing the security considerably.<\/p>\n<p>Then there&#8217;s the issue of password policy &#8211; some sites will limit the length of a password whilst others will require the use of special characters.<\/p>\n<p>At work, I use a variety of corporate systems, some of which respect my Active Directory logon, and others (timesheeting, more timesheeting, mobile phone billing, self-service HR portal) which do not &#8211; each with it&#8217;s own password policy for password length, complexity, re-use and expiry.  Then there are the hundreds of websites that I use and which require registration.  It&#8217;s a usability nightmare &#8211; and many people will use the same passwords repeatedly &#8211; an identity thief&#8217;s dream.<\/p>\n<p>I prefer to use a memorable passphrase, which is typically longer than a password and although it may include dictionary words they do not make up the entire password.  For example, if my password needs to be changed and something is happening at that time that might be memorable I could use that &#8211; &#8220;2008HolidayinFrance&#8221; is memorable, easy to type and whilst it includes dictionary words it&#8217;s also 19 characters long so spotting the dictionary word placement might take a while for a password cracker.<\/p>\n<p>Of course, there is no one answer &#8211; what works for me might not work for you.  What I&#8217;m pretty certain of though is that &#8220;password&#8221; is not a good password and that re-using the same password (or variations on it) is not a good idea either.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One corporate blogger at Symantec recently wrote about the useless passwords that people use (with various lists placing &#8220;password&#8221;) at or close to the top of the list. His source contained some dubious claims (e.g. it claimed that one of the top passwords across Europe is &#8220;monkey&#8221;&#8230; maybe that is the case for English speaking &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Generating secure passwords<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[43],"class_list":["post-1116","post","type-post","status-publish","format-standard","hentry","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Generating secure passwords - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Generating secure passwords - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"One corporate blogger at Symantec recently wrote about the useless passwords that people use (with various lists placing &#8220;password&#8221;) at or close to the top of the list. His source contained some dubious claims (e.g. it claimed that one of the top passwords across Europe is &#8220;monkey&#8221;&#8230; maybe that is the case for English speaking &hellip; Continue reading Generating secure passwords\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2008-07-14T09:41:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2008-07-14T09:45:23+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/07\\\/generating-secure-passwords.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/07\\\/generating-secure-passwords.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Generating secure passwords\",\"datePublished\":\"2008-07-14T09:41:48+00:00\",\"dateModified\":\"2008-07-14T09:45:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/07\\\/generating-secure-passwords.htm\"},\"wordCount\":581,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/07\\\/generating-secure-passwords.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/07\\\/generating-secure-passwords.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/07\\\/generating-secure-passwords.htm\",\"name\":\"Generating secure passwords - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2008-07-14T09:41:48+00:00\",\"dateModified\":\"2008-07-14T09:45:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/07\\\/generating-secure-passwords.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/07\\\/generating-secure-passwords.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/07\\\/generating-secure-passwords.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Generating secure passwords\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Generating secure passwords - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm","og_locale":"en_GB","og_type":"article","og_title":"Generating secure passwords - markwilson.it","og_description":"One corporate blogger at Symantec recently wrote about the useless passwords that people use (with various lists placing &#8220;password&#8221;) at or close to the top of the list. His source contained some dubious claims (e.g. it claimed that one of the top passwords across Europe is &#8220;monkey&#8221;&#8230; maybe that is the case for English speaking &hellip; Continue reading Generating secure passwords","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm","og_site_name":"markwilson.it","article_published_time":"2008-07-14T09:41:48+00:00","article_modified_time":"2008-07-14T09:45:23+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Generating secure passwords","datePublished":"2008-07-14T09:41:48+00:00","dateModified":"2008-07-14T09:45:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm"},"wordCount":581,"commentCount":5,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm","name":"Generating secure passwords - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2008-07-14T09:41:48+00:00","dateModified":"2008-07-14T09:45:23+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Generating secure passwords"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":832,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/07\/quick-tip-for-mac-users-to-recover-a-forgotten-password.htm","url_meta":{"origin":1116,"position":0},"title":"Quick tip for Mac users to recover a forgotten password","author":"Mark Wilson","date":"Saturday 7 July 2007","format":false,"excerpt":"If you're anything like me, then you have hundreds of security credentials to use at many websites. Best practice dictates that you should use a different password at each one but sometimes that's just not practical - and, unless you write it down, sometimes you just forget what the password\u2026","rel":"","context":"In \"Apple Mac OS X\"","block_context":{"text":"Apple Mac OS X","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/mac-os-x"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":966,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/12\/migrating-passwords-with-the-active-directory-migration-tool.htm","url_meta":{"origin":1116,"position":1},"title":"Migrating passwords with the Active Directory Migration Tool","author":"Mark Wilson","date":"Friday 21 December 2007","format":false,"excerpt":"I've spent most of this month working with a customer who is consolidating various Active Directory forests into a single domain. We didn't use any third party tools - just the standard Microsoft utilities, i.e. Active Directory Migration Tool (ADMT) v3 and Exchange Migration Wizard (one of the Exchange Server\u2026","rel":"","context":"In \"Microsoft Active Directory\"","block_context":{"text":"Microsoft Active Directory","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/active-directory"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6101,"url":"https:\/\/www.markwilson.co.uk\/blog\/2015\/10\/office-365-password-reminder-displayed-on-account-with-password-expiry-disabled.htm","url_meta":{"origin":1116,"position":2},"title":"Office 365 password reminder displayed on account with password expiry disabled","author":"Mark Wilson","date":"Thursday 1 October 2015","format":false,"excerpt":"In common with most platforms, Office 365 has a mechanism\u00a0of password policies to set intervals after which a password must be changed; however there are cases\u00a0where it may not be desirable to force password\u00a0changes. In those cases, it's possible to disable password expiry. I came across an issue recently though\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":540,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/introduction-to-password-cracking.htm","url_meta":{"origin":1116,"position":3},"title":"Introduction to password cracking","author":"Mark Wilson","date":"Tuesday 29 November 2005","format":false,"excerpt":"I just read a very interesting article on password cracking techniques on the IBM website. It doesn't contain any information that isn't already well known, but it's still a useful summary of some of the issues which an administrator should be prepared for and how to prevent them.","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":866,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/07\/fine-grained-password-policies-for-windows-server-2008-active-directory-domain-services.htm","url_meta":{"origin":1116,"position":4},"title":"Fine grained password policies for Windows Server 2008 Active Directory Domain Services","author":"Mark Wilson","date":"Tuesday 31 July 2007","format":false,"excerpt":"Another new feature in Windows Server 2008 Active Directory Domain Services is that (at long last) it's now possible to apply multiple password policies within a single domain using a new feature called fine grained password policies. Now PINs can be used for mobile device access and complex passwords for\u2026","rel":"","context":"In \"Microsoft Active Directory\"","block_context":{"text":"Microsoft Active Directory","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/active-directory"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6642,"url":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm","url_meta":{"origin":1116,"position":5},"title":"Short takes: a password generator; cybercrime 101 and an HTML table generator","author":"Mark Wilson","date":"Friday 4 November 2016","format":false,"excerpt":"Some more browser tabs turned into mini-snippets of blog post... Password generator and cybercrime advice The Random number service (random.org) has a useful password generator (though I tend to let LastPass generate mine, this is useful when creating passwords in customer implementations). And, whilst on the subject of security -\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1116"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1116\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}