Hinweis
Für den Zugriff auf diese Seite ist eine Autorisierung erforderlich. Sie können versuchen, sich anzumelden oder das Verzeichnis zu wechseln.
Für den Zugriff auf diese Seite ist eine Autorisierung erforderlich. Sie können versuchen, das Verzeichnis zu wechseln.
5/10/2007
If your run-time image includes support for multiple users, use strong passwords. Weak passwords are a potential security vulnerability and can allow hackers access to your system.
When you implement a user account strategy, consider the following strong password rules:
- Strong passwords must be at least seven characters long. Because of the way passwords are encrypted, the most secure passwords are seven or 14 characters long.
- Strong passwords should contain characters from each of the following three groups:
- Letters (A, B, C)
- Numerals (0, 1, 2)
- Symbols (~, !, @)
- Strong passwords should include at least one symbol character in the second through sixth positions.
- Strong passwords must be significantly different from prior passwords.
- Strong passwords must not contain your name or user name.
- Strong passwords must not be a common word or name.
See Also
Other Resources
Best Practices for Security
Network Security Considerations
Local Security Considerations