05.01.2013 Views

Mac OS X Leopard - ARCAism

Mac OS X Leopard - ARCAism

Mac OS X Leopard - ARCAism

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 8 LEOPARD SECURITY 147<br />

Figure 8-4. The Access Control tab controls how the information in the item can be accessed.<br />

Creating Your Own Keychains and Keychain Items<br />

While the keychain feature is designed to mostly run in the background to seamlessly manage<br />

passwords, keys, and certificates, it will also allow you to store your own information inside of<br />

it. You could store your own passwords and notes, and even keep track of serial numbers for registered<br />

applications.<br />

NOTE Besides using the keychain, there are other ways to securely store password and application<br />

data provided by third parties. Some interesting applications include Pastor<br />

(www.mehlau.net/pastor/) and info.xhead (www.xheadsoftware.com/info_xhead.asp), which are<br />

both nice stand-alone applications for securely storing password and registration data.<br />

To add a keychain item, you click the little + button at the bottom of the keychain window,<br />

and a sheet will open so you can enter your information. By default, the sheet will be geared<br />

toward passwords. If you a want to create a note, select the Note group in the left column, and<br />

then click the + button. This will open up a sheet for entering your note. Alternately, you can<br />

select File ➤ New Password Item or File ➤ New Secure Note Item directly from the menu bar.<br />

The password sheet (Figure 8-5) is fairly straightforward; you enter a name for your item,<br />

the account name, and your password. There are some interesting points here, though. For one,<br />

the keychain item name determines what the type of item will be. If you enter a URL, the item<br />

will be created as an Internet password; otherwise the item will be created as an application password.<br />

Finally, the bar at the bottom will extend to the right and change from red to green as you<br />

enter your password to indicate its strength.<br />

The strength of a password is determined by common means that a malicious user may use<br />

to attempt to crack it. This determination consists of many variables, including the length of the<br />

password, uniqueness, and the type of characters used. Common names and words found in dictionaries<br />

are very weak, as a modern computer can run through a dictionary list of common<br />

words and passwords in a few minutes. Beyond that, short passwords take a relatively short<br />

amount of time to crack using brute force methods (which basically means using every possible<br />

combination of every letter, number, and symbol for each space). The difficulty of brute-force<br />

cracking increases dramatically with each additional character. It’s good practice to attempt to<br />

mix uppercase and lowercase letters, numbers, and if possible, symbols, into your passwords.<br />

Additionally, passwords should be at least eight characters long.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!