Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Passwords Can Sit on Hard Disks for Years 449

CygnusXII writes ""As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some obvious safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security." "
This discussion has been archived. No new comments can be posted.

Passwords Can Sit on Hard Disks for Years

Comments Filter:
  • P2P (Score:5, Insightful)

    by Anonymous Coward on Tuesday June 08, 2004 @10:08AM (#9365430)
    It's amazing how easy it is to find people's password files shared on P2P apps like DirectConnect, Gnutella, etc. There's everything - Total Commander (FTP), WS FTP, mail clients, you just have to search for the proper file name.
  • by ciroknight ( 601098 ) on Tuesday June 08, 2004 @10:09AM (#9365437)
    I've still got a three year old password on a postit note on the side of my monitor. It just goes to show you that passwords can sit anywhere.

    The real question is, if a password's that old, what use SHOULD it still have? Hopefully, people adopt policies where they update passwords every month, or few months, especially if it's dealing with anything financial/uber personal (doctor's records.. etc).

    Get real, stop trying to scare us with your security warnings; just educate people to change their passwords.
  • by Ironstud ( 134877 ) on Tuesday June 08, 2004 @10:09AM (#9365439)
    Passwords have been on hard drives for many many years. No matter if you are using M$ operating system or a linux there are passwords on the machine. If people don't know how to protect their computers than many they should just give their ATM card password to the public domain.
  • by rickthewizkid ( 536429 ) on Tuesday June 08, 2004 @10:10AM (#9365460)
    ... and nobody's figured it out yet. I actually use several passwords, depending on the level of security. The "lowest" password, "password", is used for signing up to things like mailing lists, etc where there's little chance of me returning. The mid-level password, a pair of words with numbers in them, is used for mid-level security, such as my email, etc. The highest level password, a random collection of numbers, letters, and symbols, is used for the most secure information, such as my bank account, slashdot login and my pr0n encryption key.

    Now if I could only remember the combination to my safe.....

    Just my 46fctfj6&*23's worth....
    -Rick the WizKid
    (oooops...)
  • by LBArrettAnderson ( 655246 ) on Tuesday June 08, 2004 @10:11AM (#9365476)
    There's no way to be 100% secure with passwords and the likes, but there are some things everyone should do. 1.) don't have the same password for everything! The website admins to every site you use a password for have access to it (and no one can trust a slashdot editor!). 2.) change your password often. The more often the better. This won't always work since most people, when they get a password, will do their damage immediately... but you never know. Another advantage here is OLD websites that you visitted a long time ago may change and new administrators will have access to your password.

    pretty redundant stuff, but good advice that most people are too lazy to follow.
  • whats new (Score:1, Insightful)

    by Anonymous Coward on Tuesday June 08, 2004 @10:11AM (#9365477)
    This is as old as de first computer with a password.
    The security of youre personal information (credit card number, password etc...) lies with the companies storing them.

    We all know that hackers aquire passwords by hacking company's data bases. Until company's use stingent privacy and security procedures and implementnations the world wide web remain's a wild west show.

    Greetings,
    Lord Flashheart.
  • Stupid (Score:2, Insightful)

    by barcodez ( 580516 ) on Tuesday June 08, 2004 @10:16AM (#9365538)
    I've always found it stupid that you can log on to a windows domain without being connected to the network assuming you have sucessfully logged onto the domain with that machine.

    I'm assuming that a windows machine keeps a copy of every username and a passord hash (NTLM?) used to log in to any domain locally somewhere on the harddrive.

    That is scary news really especially in hotdesk/shared desktop environments.

    Isn't there something along the lines of "Client side security is no security at all" in Microsofts security axioms. Can't even follow their own standards.
  • by arevos ( 659374 ) on Tuesday June 08, 2004 @10:23AM (#9365638) Homepage
    Correct me if I'm wrong, but if an attacker has the permissions to trawl through the swap, then couldn't they just insert a keylogger, instead? That seems to be considerably simpler, to me.

    I suppose there's an argument about someone getting the passwords off old machines that have been thrown out. But even then, surely any respectable business will use some software to scrub out all the last traces of sensitive data on any hard drives they're dumping.

    An encrypted hard drive wouldn't protect against a key logger. It would protect sensitive data against physical theft, I suppose. But I wouldn't call that "hacking".
  • by andy55 ( 743992 ) * on Tuesday June 08, 2004 @10:29AM (#9365712) Homepage
    ...must...not...feed....the trolls.....

    ...breaking down....

    There is still a security risk. What if someone gets you Pasotr password. Then they can have them all.

    You must be new here. You can *always* use that argument. Someone can *always* install a key recorder or watch you type in your password. Security is about raising barriers, not about thinking/searching for somthing that will solve the impossible.
  • Holy Crap! (Score:2, Insightful)

    by uncledrax ( 112438 ) on Tuesday June 08, 2004 @10:32AM (#9365746) Homepage
    ["Operating systems such as Windows and Linux have no facility for stopping data being written to the hard drive."]
    In fact.. such operating systems are DESIGNED to write to the hard disk..
    (like someone said above.. someone just discovered the swap/page file)

    I think the author needed to be alittle more articulate with the wording.
  • by laigle ( 614390 ) on Tuesday June 08, 2004 @10:36AM (#9365799)
    That a hacker will necromance your password off the hard drive, or that you'll get a keylogging spyware installation? To avoid the first you need to never store your password, to avoid the second you need to always store it. Sure, we could all go to scratch pads couple with retinal scans, but nobody's going to pay for that infrastructure.

    Bottom line, patch your software, get a firewall, be carfeul about opening email, don't use IE or Outlook, and do virus/spyware scans regularly. You'll be safe from all but the most determined hackers, and they don't care about your password.
  • Re:Hehe (Score:5, Insightful)

    by Mortoc ( 786452 ) on Tuesday June 08, 2004 @11:18AM (#9366393)
    The fact that a password can sit on a hard drive is really irrevelent. If someone has access to your hard drive, they might as well just set up a keylogger and wait till you access a bank account or something, that would be much easier than wading through hundreds of megabytes of swap. This security hole is almost completely irrevelent, the only time that I would worry about something like that is when throwing away a a computer (which should be recycled anyway). Someone interested enough could go through your trash, removed an old hard drive and start snooping around.
  • Re:Repairs (Score:3, Insightful)

    by Reziac ( 43301 ) on Tuesday June 08, 2004 @11:21AM (#9366437) Homepage Journal
    I've had people ask me what I do about the fact that I can see all my clients' sensitive data (and in some cases have their backup archives stored on one of my everyday work machines):

    Even tho in the course of sorting out a mess, I may need to use your passwords and look through your files, the *content* goes in one eyeball and out the other. I just don't CARE what's on your hard disk. Your personal life isn't that interesting. I have a million files and passwords and accounts of my own; I don't need to be burdened with yours.

    And I think you'll find that's the attitude any mature tech has. It's pimply kids still at the "overly curious" phase of life (or people who never matured beyond the snoopy stage) who will root through your data just because they CAN.

    Trouble is, you don't always have control over who works on your machine. And no amount of privacy laws or industry guarantees can stop some kid from snooping when no one is looking.

  • by at_kernel_99 ( 659988 ) on Tuesday June 08, 2004 @11:50AM (#9366775) Homepage
    There is still a risk. The whole point of the article was that when memory is cached on disk, it is accessable from disk for an indeterminate period of time - possibly years before its overwritten. So when your Pastor program un-obfuscates your data, where is it? In RAM? In cleartext? Maybe Mac's don't have this problem (though I doubt it).
  • Re:Rubbish! (Score:4, Insightful)

    by julesh ( 229690 ) on Tuesday June 08, 2004 @11:58AM (#9366899)
    Operating systems such as Windows and Linux have no facility for stopping data being written to the hard drive.

    That's a flat out lie.

    $ man mlock

    MLOCK(2) Linux Programmer's Manual MLOCK(2)

    NAME

    mlock - disable paging for some parts of memory


    Indeed, and under Windows (quoted from msdn.microsoft.com):

    The VirtualLock function enables a process to lock one or more pages of committed memory into physical memory (RAM), preventing the system from swapping the pages out to the paging file.
  • Re:Hehe (Score:3, Insightful)

    by Gr8Apes ( 679165 ) on Tuesday June 08, 2004 @12:00PM (#9366933)

    Flamebait? Give me a break. Obviously a MS Fanboy.

    Don't assume incompetence. Sometimes, portions of the registry just become unrecoverable and unrepairable, through no fault of anyone other than MS. Yes, I'm aware that there's a way to completely back them up and replace them, but sometimes, that's moot when the initial backup is already corrupted. With a good initial hardware/software setup and proper precautions, I too can run a system for years and years, and never have it degrade. (Ran a datacenter for about 4 years) Still, this doesn't address the fragility of MS OSes. Oh, and I have a 95 system that's been up since 96. Big deal.

  • by LookSharp ( 3864 ) on Tuesday June 08, 2004 @01:04PM (#9367720)
    Of course, you could always use Knoppix or something similar whenever buying on-line. This would also solve the problem for the truly paranoid.

    Of course, because everyone knows that retailers all use crackerjack security and are completely impenetrable by malicious forces. :)

    (Everyone always forgets that these are two-party-- or more-- transactions.)
  • by Quelain ( 256623 ) on Wednesday June 09, 2004 @07:17AM (#9375429)
    There was an Amiga virus which could survive in RAM for a few minutes with power off. I forget what it was called, but on power on it would laugh at you and refuse to let you boot anything else :)

    Even if your standard RAM didn't have any chance of storing recoverable data, I'd bet any spooks worth their salt would do it anyway. There always the chance someone could have substituted in some flash-ram backed 'custom' jobbies.

If all else fails, lower your standards.

Working...