Anda di halaman 1dari 8

How to reset Password after Creating New Login ID: 1.

ITS Creates Unix Login Id and Password for new users to use Al Yousuf Business Applications. 2. ITS Creates Password same like Login Id ( Ex : login : abcdefgh , Password : abcdefgh ) 3. You can find one Icon in your Desktop ( Telnet or user1 ) double click the Icon. 4. You will get below login prompt Screen.
SunOS 5.9 login: password: Here enter your Login id Here enter password same like Login Id(Password will not be visible to you.)

The first 6 characters of the new password must contain at least two alphabetic characters and at least one numeric or special character. ( While Creating Login Id ITS set your password, you have to change your own password, that is the reason we are forcing to change your Password ) Choose a new password. New Password: Choose your own Password Re-Enter New Password : Reenter the same password for confirm. ----------------------------------------------------------------------------------------------------

You will get next Screen Enter Database Password : Here either you can use same password or can choose different password .

After that you can see the application Main Menu to use the applications. Application User Manual is available in Intranet Web Site : www.alyousuf.net ( Key board hold Ctrl Key and Click Mouse from web site link ,this will take you to Main Page and Select Al Yousuf Application Documentation )

Menu Keys: Once you login using login_id and password you will get Main Menu. Pressing Pressing Up Arrow and Right Arrow and Down arrow Keys and Press Enter key to Choose Application Left Arrow to Choose and Press Enter to get Data Entry Forms / Query Forms / Reports.

Form Keys: Below keys can use query forms as well as data entry forms F1 F3 F4 F10 F12 Enter : For the List of Values of the Current Field. : To bring the cursor to the Previous Block. (Block Navigation) : To bring the cursor to the Next Block (Block Navigation) : To Exit without Saving. : To Save or to Commit the instruction. : Cursor will move next Field : Up Arrow and Down Arrow keys for Scrolling Records up and down

Basic System Password Requirements

1. 2. 3. 4. 5.

The password shall contain both upper and lowercase characters The password shall contain at least one non-alphanumeric character The password shall be a minimum of eight (8) characters in length The password shall be changed every 180 days The password shall remain restricted from public viewing at all times

6. 7. 8. 9.

All personal passwords shall not be shared with any other person The password policy applies to individual users and/or system administrators Do not re-use a password The password shall not be a word in any language (English, German, etc.), slang, or jargon

Selecting a good password


Choosing a good password is critical for personal security requiring password crackers to take additional time and resources to get access to your personal information and computer credentials. A poor password creates a false sense of security, and may endanger your personal information, access to computer resources, or even allow another individual to spawn attacks and viruses using your personal credentials.

Password Construction
Password crackers have many tools at their disposal to cut down the amount of time it takes to crack your password. Selecting a secure password will help to ensure that the password cracker must take as much time as possible to guess or otherwise identify your password. No password is ultimately secure, but if it takes the password cracker longer to crack the password than it takes for the password to become useless, you will have succeeded in thwarting the cracker's attack.

Insecure methods

Passwords should not be created using personal information about yourself or your family. A password cracker with incentive to break your personal password will use this information first, making these passwords the least secure passwords. Examples of bad passwords of this type are: your name, birthplace, nickname, family name, names of pets, street address, parents names, names of siblings and the like. Passwords should not be formed of words out of any dictionary or book. Longer words do not generally add much protection. Using known words in any language allows the password cracker to take shortcuts in his password cracking schemes, allowing him to guess

your password in a very small fraction of the time it would take otherwise. Examples of bad passwords of this type are: dragon, secret, cheese, god, love, and similar words. Passwords should not be composed of proper nouns of places, ideas, or people. These words are commonly found in password cracker databases. Examples are: Jehovah, edutainment, Coolio, beesknees, transformers. Passwords should not be simple variations of words. Although these passwords don't appear in a book or dictionary, it is a simple matter to generate a replacement word list automatically. These passwords are more secure than the above two examples, but not significantly more secure. Examples of passwords of this type are drowssap, l0ve, s3cr3t, dr@gon, and similar word-like terms. Passwords should not be a concatenation of two words commonly following each other in a sentence. These passwords are more secure than the above password concepts, but still fall far short for password security Examples of these kinds of passwords are: whatfor, divineright, ilove, farfetched, catspajamas. Do not reuse recently employed passwords again. If you find it difficult to pick a new password, you should wait until you changed you password at least 5 times before reusing an old password, or 12 months if password changes are common.

Secure methods

Always change your password immediately if you feel that your password has been compromised. Always do this directly. Never follow links sent to you in email, through an instant messenger client. instant messenger client, or from a phone call you received. Ask for administrative assistance if you have trouble changing your password. Do not write your password down where others may find it. If you must write it down, ensure it is in a locked location that is only accessible to you. Hiding your password in places you feel it is unlikely to be found is not helpful. Password crackers have a criminal mind, and generally know where to look. It is important that you change your password on a regular schedule, at least every six months. This assists you by throwing off any cracking efforts that might be in progress, but have not yet been completed. It also helps you if somehow you have compromised your password in some other way without knowing it. Select passwords that use a mixture of capital letters, numbers, and special characters. Take heed however, some systems do not allow you to use some or any special characters. Make sure you check the password criteria for the system you are using ahead of time, if possible. Use substitution of numbers for letters and letters for numbers in your passwords. Although this is not a primary method of securing your password, it will add another layer of security on top of a good password, and will prevent the accidental guess of your password due to circumstances.

Where it is not possible to use many characters in your password (less than 14), it is advisable to create a password by creating a passphrase, and selecting letters in a specific position in each word. An example of this is "jJjshnImn2". As you notice, it's unlikely that any cracker would guess this password; however, it is easy to remember when you note the passphrase "John Jacob Jingleheimer Schmidt, his name is my name too". Notice the use of number substitution and capitalization in the password. The best passwords are complete phrases if the system will allow them. They are sometimes called "passphrases" in reflection of this. For example, a good passphrase might be "I clean my Glock in the dishwasher." You can also use number and letter substitution on passphrases as well. Longer passphrases generally mean better password security.

Anda mungkin juga menyukai