Many approaches to password protection

By Tracey Capen

Of the many debates about personal-computing security, password protection is a perennial favorite.

Password schemes range from the what-me-worry, “I’ll just use my dog’s name,” to computer-generated ciphers that defy memorization and end up on sticky notes next to the PC.

In a post that’s had over 6000 views and more than its share of opinions, James Viner’s seemingly simple question about Firefox and stored passwords has generated a wealth of interesting perspectives. First posted this past August, it’s still getting new comments. More»

The following links are this week’s most interesting Lounge threads, including several new questions that you may be able to provide responses to:


☼ starred posts — particularly useful

If you’re not already a Lounge member, use the quick registration form to sign up for free. The ability to post comments and take advantage of other Lounge features is available only to registered members.

This article is part of our premium content. Join Now.

Already a paid subscriber? Click here to login.



= Paid content

All Windows Secrets articles posted on 2010-12-09:

Tracey Capen

About Tracey Capen

Editor in chief Tracey Capen was the executive editor of reviews at PC World magazine for 10 years, from 1995 to 2005. He was InfoWorld's managing editor of reviews from 1993 to 1995 and worked in the magazine's test center and as networking editor from 1989 to 1992. Between his stints at InfoWorld, he was senior labs editor at Corporate Computing magazine.