Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!linus!genrad!decvax!harpo!seismo!hao!kpno!arizona!budd
From: budd@arizona.UUCP
Newsgroups: net.unix-wizards
Subject: Re: a thought about UNIX login security
Message-ID: <2617@arizona.UUCP>
Date: Thu, 16-Jun-83 15:49:49 EDT
Article-I.D.: arizona.2617
Posted: Thu Jun 16 15:49:49 1983
Date-Received: Fri, 17-Jun-83 08:49:43 EDT
Lines: 6

for a long time i have used geometric passwords.  These are formed by
taking some pattern, such as three keys from one row followed by three
keys from the row below, or a square, or an L shape, or some such pattern
on the keyboard.  This makes "word searches" much more difficult, although
if someone knows this is what you are doing and they wsee your fingers
typing in the passoword they may be able to deduce the pattern.