View Single Post
Old 02-20-2008, 10:02 AM   #5
6502programmer
Thumbs Must Hurt
 
Join Date: Aug 2005
Model: 9000
OS: 4.6.0.266
Carrier: AT&T Wireless
Posts: 69
Default

Quote:
Originally Posted by VirexInc View Post
In a nutshell, with only 10 chances to get the password the chances of brute force attack are NANO SLIM! So basically your info is safe enough that it meets DOD requirements for secure data storage
I will put on my CISSP hat and add ONE small caveat. If the device itself is not password protected, this isn't entirely accurate. Assuming the device is not password-protected, it would be possible to make a backup, try ten times, restore from backup, try ten more times, lather rinse and repeat.

It's good practice anyway to use a device password, reasonably short timeout, and lock on holstering. Combined with the security layered in with the ability to limit the number of password attempts in password manager down to ONE, it's quite secure.
__________________
957 => 5820 => 7280 => 7290 (UL) => 8820 (UL) => 9000 (UL/DB) => 9800
Offline   Reply With Quote