Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
139
hpr_transcripts/hpr2727.txt
Normal file
139
hpr_transcripts/hpr2727.txt
Normal file
@@ -0,0 +1,139 @@
|
||||
Episode: 2727
|
||||
Title: HPR2727: Passwords
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr2727/hpr2727.mp3
|
||||
Transcribed: 2025-10-19 15:45:25
|
||||
|
||||
---
|
||||
|
||||
This in HPR episode 2,727 entitled Passwords and in part on the series Privacy and Security,
|
||||
it is hosted by Edward Miro and in about 8 minutes long and Karima Clean Flag, the summary
|
||||
is how to do Passwords better.
|
||||
This episode of HPR is brought to you by an honesthost.com.
|
||||
Get 15% discount on all shared hosting with the offer code HPR15, that's HPR15.
|
||||
Get your web hosting that's honest and fair at An Honesthost.com.
|
||||
Hello and welcome to Hacker Public Radio, I'm Edward Miro and for this episode I decided
|
||||
to record an episode on the importance of good passwords.
|
||||
This will be part 1 in a series of podcasts I'm going to call Information Security for
|
||||
everyone.
|
||||
As with most of the content I create in the world of InfoSec, my goal is to present the
|
||||
information in a way that a majority of people can get value from it and anyone can play
|
||||
this for a friend, colleague or family member and make it easy for the non-hackers in our
|
||||
lives to understand.
|
||||
So here we go, Passwords.
|
||||
One of the first things most people think about when it comes to online safety is their
|
||||
password.
|
||||
We all know that passwords are to our online accounts, what keys are for our locks.
|
||||
Would you use the same key for your house, your car, your office and your safety deposit
|
||||
box?
|
||||
Of course not.
|
||||
And if you did, what would happen if a bad guy could get a copy of just that one key?
|
||||
They'd have access to everything.
|
||||
With so much of our personal, confidential, financial and medical information accessible
|
||||
from our various accounts online, what can we do to make things as safe as possible?
|
||||
For me personally, I employ and advise a three-faceted approach.
|
||||
One, complex passwords, two, unique passwords, three, two-factor authentication were available.
|
||||
Clearly the solution is to use a unique password for each account and make them complicated
|
||||
enough that an attacker couldn't guess it or crack it in an amount of time that would
|
||||
be actionable.
|
||||
One problem this presents to general users is the inconvenience and difficulty in remembering
|
||||
these passwords or storing them in a secure way.
|
||||
This leads into my first bit of advice, password managers.
|
||||
My recommendation is to use a password manager.
|
||||
I'm going to make references to managers such as LastPass because that's the one I've
|
||||
always used, but I'm not saying it's the best or would be the best for you.
|
||||
There are many great options and I would rather people use the one that works best for them
|
||||
and not merely the one I like best.
|
||||
Anyways.
|
||||
Once like LastPass, give you the ability to store all your passwords in an encrypted
|
||||
vault and then request them to your browser, add-ons, or standalone applications.
|
||||
They also have built-in features that allow you to generate secure passwords at any length
|
||||
or complexity.
|
||||
When using a password manager, all you have to do is remember one master password.
|
||||
When you sign in, the manager can then decrypt all your safe passwords and let's use them.
|
||||
When I sign up for a website, I always use LastPass to generate the longest and most
|
||||
complex password supported by the site and it gets stored automatically in my vault safely
|
||||
for later use.
|
||||
There are various options online to choose from and I suggest you do some research and
|
||||
try a few different ones to see what is comfortable for you.
|
||||
One thing to consider when using a password manager is that the master password is your
|
||||
single point of failure and it should be a long and complex password that you don't use
|
||||
anywhere else.
|
||||
If you're wondering how to come up with a secure password that you can remember, there
|
||||
are various strategies online but I follow in iteration of the following.
|
||||
Take a poem, song lyrics, or phrase that is easy for you to remember.
|
||||
For this example, I'll use the phrase, the stars at night are big and bright, deep in
|
||||
the heart of Texas.
|
||||
And then I take the first letter to each word and that gives me capital T, S-A-N-A-B-A-B-D-I-T-H-O
|
||||
capital T.
|
||||
Then I swap out the vowels for some numbers or special characters and that gives me capital
|
||||
T, five at N, at B, at B-D-1-T-H-0-T.
|
||||
I checked that password on Dashlane's password strength checker and got the following results.
|
||||
It would take a computer about 204 million years to crack your password.
|
||||
And that's just an example of a very secure password that I thought up in just a few seconds
|
||||
that I probably won't ever be able to forget.
|
||||
Next section, 2FA or 2 Factor Authentication.
|
||||
Another very important recommendation I want to touch on in this episode is using 2
|
||||
step authentication.
|
||||
I use it for all accounts that offer it and it's very easy to set up and use.
|
||||
It works in tandem with an application on my mobile device called Google Authenticator
|
||||
though there are others and like last pass this is just the one I use.
|
||||
And it's available for Android and iOS.
|
||||
After you install the app, you access security settings for the account you want to protect
|
||||
and register it with your device.
|
||||
What it does is provide a second password when logging in that is only used one time
|
||||
ever.
|
||||
When you log in, the site will prompt for the 2 step authentication code.
|
||||
You then open the Google Authenticator app and the code for the session will be listed.
|
||||
The codes are only available for a short time and are constantly changing.
|
||||
This makes someone gaining unauthorized access to your account very difficult.
|
||||
A few closing thoughts.
|
||||
Some information security professionals see a password manager as insecure due to it being
|
||||
a single point of failure.
|
||||
And I can understand this and would respond that although this might be true, having a complex
|
||||
master password and using the manager in conjunction with 2 step authentication makes
|
||||
it a pretty safe and solid system for most people.
|
||||
And even if there is a breach, none of my passwords are the same and changing them is incredibly
|
||||
fast and easy with a manager.
|
||||
Also I don't usually recommend keeping hard copies of passwords, but if you can guarantee
|
||||
the physical security of your password list, this in my opinion is preferable to using
|
||||
the same insecure password for all your accounts.
|
||||
Please remember, if you're like most people on the internet and using easy to crack password
|
||||
or the same password on all your sites, all it takes is one compromised account to give
|
||||
bad guys access to everything.
|
||||
I'm also including a list of links in the bottom of the show notes to everything I mentioned
|
||||
and also a link to the site have I been poned.
|
||||
This is a service that collects accounts that have been involved in hacks and lets anyone
|
||||
search for their email address and see if their information is already compromised.
|
||||
If it is, do this right now.
|
||||
One, set up a password manager with a strong master password.
|
||||
Two, change all your passwords using the built in password generator and your password
|
||||
manager and save them in your vault as you go.
|
||||
Three, in the future when breaches happen it's incredibly easy to change your password
|
||||
and you'll also rest easy knowing that the password obtained can't get them into anything
|
||||
else.
|
||||
I know this will take a long time, but it's worth it, then you only have to remember
|
||||
one master password and you'll be exponentially safer online.
|
||||
I also linked splash data as the top 100 worst passwords of 2018.
|
||||
Give this a look just so you can see what most people are using which is shocking and
|
||||
please don't ever use anything on this list.
|
||||
Well thank you for taking the time to listen to my basic introduction to passwords.
|
||||
I hope this will help any non-hackers in your life and like I say in all my podcasts,
|
||||
I don't claim to know all there is to know and love feedback and any opportunities to
|
||||
learn more or collaborate with others in the field.
|
||||
As with most of the research and articles I've written in the past, these are geared
|
||||
towards standard users in a business setting and are meant to be a jumping up point for
|
||||
further research and to be a foundation for cyber security 101 level training classes.
|
||||
If you like what I do and want to have me come speak to your team or just want to chat,
|
||||
feel free to email me.
|
||||
Thank you and have a safe 2019.
|
||||
You've been listening to Hacker Public Radio at Hacker Public Radio dot org.
|
||||
We are a community podcast network that releases shows every weekday Monday through Friday.
|
||||
Today's show, like all our shows, was contributed by an HBR listener like yourself.
|
||||
If you ever thought of recording a podcast, then click on our contribute link to find
|
||||
out how easy it really is.
|
||||
Hacker Public Radio was founded by the digital dog pound and the infonomicum computer club
|
||||
and is part of the binary revolution at binrev.com.
|
||||
If you have comments on today's show, please email the host directly, leave a comment on
|
||||
the website or record a follow-up episode yourself.
|
||||
Unless otherwise stated, today's show is released on the create of comments, attribution,
|
||||
share a like, 3.0 license.
|
||||
Reference in New Issue
Block a user