Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!linus!genrad!decvax!harpo!seismo!hao!kpno!arizona!budd From: budd@arizona.UUCP Newsgroups: net.unix-wizards Subject: Re: a thought about UNIX login security Message-ID: <2617@arizona.UUCP> Date: Thu, 16-Jun-83 15:49:49 EDT Article-I.D.: arizona.2617 Posted: Thu Jun 16 15:49:49 1983 Date-Received: Fri, 17-Jun-83 08:49:43 EDT Lines: 6 for a long time i have used geometric passwords. These are formed by taking some pattern, such as three keys from one row followed by three keys from the row below, or a square, or an L shape, or some such pattern on the keyboard. This makes "word searches" much more difficult, although if someone knows this is what you are doing and they wsee your fingers typing in the passoword they may be able to deduce the pattern.