Username and password pattern evaluation, measuring security password strength via CSDN leaked passwords
Inducement of this issue:
" On 21st, December, 2011, Username and passwords for more than 6 millions users of network Chinese Software program Developer Network (CSDN. net) has reportedly been leaked out online. Sector sources today added that account information is leaked to get 8 large numbers and twenty millions users, respectively, in the 7k7k and 178. com gaming websites. CSDN offers confirmed good news, saying the leaked info is via a 2009 backup of the site's data source, although the precise cause for the leak has yet being determined. Online sources say that the leakages were planned and users of Oriental SNS sites Renren and Kaixin001, the Tianya community and dating sites Jiayuan. com and Baihe. com will be the next targets (these website are merely involved in rumors now, simply no password package from them will be leaked) ". (on 25th, Dec, 2011, the info from Tianya online community having already being leaked and i also have downloaded the bundle also make sure that username-password are effective most --from author)
Text-based passwords is still and can remain the most significant authentication method in an expected long time pertaining to computer systems, particularly the social network devices (SNS) are keeping their usernames and passwords in the database. The most up-to-date example of data breaches involving large numbers of hashed passwords took place in China is the CSDN Password-Scandal, that involves more after that 6 hundreds of thousands users' accounts being released. This threat is so true that when these security passwords have been cracked, they can be used to gain get not only to the first site, nevertheless also to other accounts where users have used again their security passwords. This is a crucial consideration since studies indicate that security password reuse (exactly and with minor variations) is a common and growing practice as users acquire more online accounts....
References:  Marbridge Consulting. Murmullo: Online Community CSDN. net Endures Data Breach, Techweb. http://www.marbridgeconsulting.com/marbridgedaily/2011-12-22/article/52430/rumor_online_co mmunity_csdnnet_suffers_data_breach Dec, 2011  GAW, H., ANDFELTEN, At the. W. Pass word management approaches for online accounts. In Proceedings in the second seminar on Functional privacy and security (New York, NEW YORK, USA, 2006), SOUPS '06, ACM, pp. 44вЂ“55.  SHAY, R., KOMANDURI, H., KELLEY, G., LEON, G., MAZUREK, Meters., BAUER, D., CHRISTIN, In., ANDCRA-NOR, D. Encountering better password requirements: user thinking and actions. In Proc. SOUPS'10(2010).  KUO, C., ROMANOSKY, H., ANDCRANOR, M. F. Individual selection of mnemonic phrase-based accounts. In Seminar on Workable Privacy and Security(2006), pp. 67вЂ“78.  PROCTOR, Ur. W., LOAN, M. -C., VU, T. -P. D., SCHULTZ, E. E., ANDSALVENDY, G. Increasing computer security for authentication of users: Effect of positive password constraints. Behavior Ers. Methods, Musical instruments, & Personal computers 34, a couple of (2002), 163вЂ“169.  VU, K. -P. L., PROCTOR, R. W., BHARGAV-SPANTZEL, A., TAI, N. -L. M., ANDCOOK, M. Improving password security and memorability to protect personal and organizational information. Int. T. of Human-Comp. Studies sixty five, 8 (2007), 744вЂ“757.  SHANNON, C. E. A mathematical theory of interaction. Bell Syst. Tech. T. 27(1949), 379вЂ“423, 623вЂ“656.  SHANNON, C. E. A mathematical theory of communication. Bell Syst. Tech. M. 27(1949), 379вЂ“423, 623вЂ“656.