Wednesday, June 8, 2011

Five Features of a Good Password Manager When You Select One

Password managers, like any type of software, are not all created same. What are the key security features that you should consider when selecting a password manager? In the previous article I have introduced a powerful RoboForm Pro password manager. This article I am going to share with you the five important features for you select a suitable password manager to safe guard your personal computer.
Supplied the number of different teams of sign in credentials we need, specifically online, managing strong password policy for ones whole computing life may go through like an impossible challenge. Unfortunately, many people are unaware of the importance of using strong passwords that are unique in each context where a password is needed.  Such as they just create the one same password for every login account. Even if they are aware of these measures to protect their private data and login credentials, many of themjust easily lost or frogot their password accidentally. That is why so many people work with their personal PC everyday, but they are still forgot Windows pasword, lost RAR password and even lost their database doxument password frequently. Yes, these problems happened everyday for every people. More and more people will get this kind of questions repeatedly.
So select a suitable password manager is a very nice idea to secure your compter. Many people do not consciously think through all the implications of the design and feature set of a given password manager when they select it, beyond the basics of ensuring that it encrypts stored passwords.
A number of key characteristics of a password manager are very important for securely managing passwords:
  • Encryption: Stored login credentials should always be stored in an encrypted form, using peer reviewed, heavily tested, strong encryption, so that even if the device used to store the passwords is stolen the thief is unlikely to be able to recover passwords.
  • Secure resource usage: A number of possible vulnerabilities involving unsecured resource usage are possible. For instance, using secure memory that will not be written to a pagefile or swap partition on disk guards against the danger of a decrypted password being dumped onto the disk where it can be recovered later by a malicious security cracker.
  • Self-contained functionality: A lot of software is not written with absolute data security in mind, and it often should not be written that way if the intended functionality of the application presents no need for such security. This does mean, however, that any password management software should not trust the security of outside applications. What good is using secure memory if the decrypted passwords will just be passed directly through another application that stores everything in tempfiles that may never be explicitly deleted?
  • Usability: Quick, simple, and easy use of the day-to-day functionality of the password manager is important for ensuring that the password manager actually gets used regularly. If it is not at least nearly as easy to use for all of a user’s common password needs, it may get neglected in favor of less secure options.
  • Verifiable design: Just as encryption that does not trust the user is not trustworthy, the same is true of software that handles any part of one’s secure data management needs. This is especially true of something like a password manager, which manages the data used to access other applications that also need to manage data securely. To ensure that the software is trustworthy, it should be verifiable — which means that the source code is not only available for scrutiny, but verifiably the same as the source code used to produce the actual executable program itself.
These five criteria tend to be a fairly universal value for a general purpose password manager, and should apt to beregarded as by everyone designing a password manager or selecting one for individual use. More features may also be desirable, many of which entail suitability for a particular user’s workflow, and the specific uses to which a password manager may be put, as contrasted with the specific uses to which another person might put a password manager. For your particular needs, this short list of considerations will surely not be the only things worth considering, but it should offer a good start. Hope you will not to worry about password lost or forgot password problems anymore, especially for Windows password recovery. Good luck.

No comments:

Post a Comment