<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_11_10_2045258</id>
	<title>Best Tool For Remembering Passwords?</title>
	<author>kdawson</author>
	<datestamp>1257859800000</datestamp>
	<htmltext>StonyCreekBare writes <i>"Lately I've been rethinking my personal security practices. Should my laptop be stolen, having Firefox 'fill in' passwords automatically for me when I go to my bank's site seems sub-optimal. Keeping passwords for all the varied sites on the computer in a plain-text file seems unwise as well. Keeping them in my brain is a prescription for disaster, as my brain is increasingly leaky. A paper notepad likewise has its disadvantages. I have looked at a number of password managers, password 'vaults' and so on. The number of tools out there is a bit overwhelming. Magic Password Generator add-in for Firefox seems competent, but it's tied to Firefox, and I have other places and applications where I want passwords. And I might be accessing my sites from other computers that don't have it installed. The ideal tool in my mind should be something that is independent of any application, browser, or computer; something that is easily carried, but which if lost poses no risk of compromise. What does the Slashdot crowd like in password tools?"</i></htmltext>
<tokenext>StonyCreekBare writes " Lately I 've been rethinking my personal security practices .
Should my laptop be stolen , having Firefox 'fill in ' passwords automatically for me when I go to my bank 's site seems sub-optimal .
Keeping passwords for all the varied sites on the computer in a plain-text file seems unwise as well .
Keeping them in my brain is a prescription for disaster , as my brain is increasingly leaky .
A paper notepad likewise has its disadvantages .
I have looked at a number of password managers , password 'vaults ' and so on .
The number of tools out there is a bit overwhelming .
Magic Password Generator add-in for Firefox seems competent , but it 's tied to Firefox , and I have other places and applications where I want passwords .
And I might be accessing my sites from other computers that do n't have it installed .
The ideal tool in my mind should be something that is independent of any application , browser , or computer ; something that is easily carried , but which if lost poses no risk of compromise .
What does the Slashdot crowd like in password tools ?
"</tokentext>
<sentencetext>StonyCreekBare writes "Lately I've been rethinking my personal security practices.
Should my laptop be stolen, having Firefox 'fill in' passwords automatically for me when I go to my bank's site seems sub-optimal.
Keeping passwords for all the varied sites on the computer in a plain-text file seems unwise as well.
Keeping them in my brain is a prescription for disaster, as my brain is increasingly leaky.
A paper notepad likewise has its disadvantages.
I have looked at a number of password managers, password 'vaults' and so on.
The number of tools out there is a bit overwhelming.
Magic Password Generator add-in for Firefox seems competent, but it's tied to Firefox, and I have other places and applications where I want passwords.
And I might be accessing my sites from other computers that don't have it installed.
The ideal tool in my mind should be something that is independent of any application, browser, or computer; something that is easily carried, but which if lost poses no risk of compromise.
What does the Slashdot crowd like in password tools?
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30107480</id>
	<title>Re:Hashing Works</title>
	<author>Anonymous</author>
	<datestamp>1258314720000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><a href="http://passwordmaker.sourceforge.net/" title="sourceforge.net" rel="nofollow">http://passwordmaker.sourceforge.net/</a> [sourceforge.net]</p></htmltext>
<tokenext>http : //passwordmaker.sourceforge.net/ [ sourceforge.net ]</tokentext>
<sentencetext>http://passwordmaker.sourceforge.net/ [sourceforge.net]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055452</id>
	<title>Re:Simple</title>
	<author>PPH</author>
	<datestamp>1257868680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Its not your luggage anymore! Bwah, hah, hah, hah!</p></htmltext>
<tokenext>Its not your luggage anymore !
Bwah , hah , hah , hah !</tokentext>
<sentencetext>Its not your luggage anymore!
Bwah, hah, hah, hah!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057994</id>
	<title>Write them down somewhere safe...</title>
	<author>The Grassy Knoll</author>
	<datestamp>1257073800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I have hundreds of books on shelves in my house. In one of them, on a particular page, all my user ids and passwords are written down.<br>And I know what you're thinking - but if my house burns down, finding my passwords will be the least of my worries...</p></htmltext>
<tokenext>I have hundreds of books on shelves in my house .
In one of them , on a particular page , all my user ids and passwords are written down.And I know what you 're thinking - but if my house burns down , finding my passwords will be the least of my worries.. .</tokentext>
<sentencetext>I have hundreds of books on shelves in my house.
In one of them, on a particular page, all my user ids and passwords are written down.And I know what you're thinking - but if my house burns down, finding my passwords will be the least of my worries...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056322</id>
	<title>LastPass.com</title>
	<author>Anonymous</author>
	<datestamp>1257875520000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>LastPass.com</p></htmltext>
<tokenext>LastPass.com</tokentext>
<sentencetext>LastPass.com</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056348</id>
	<title>Re:PasswordSafe</title>
	<author>Anonymous</author>
	<datestamp>1257875700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Another "me too" to vouch for PWSafe. I've used it for years. As with other programs it can be installed on a thumb drive, and has good features. Check it out to compare.</p><p>Ironically, I don't have it with me at the moment, or I wouldn't be AC right now....</p></htmltext>
<tokenext>Another " me too " to vouch for PWSafe .
I 've used it for years .
As with other programs it can be installed on a thumb drive , and has good features .
Check it out to compare.Ironically , I do n't have it with me at the moment , or I would n't be AC right now... .</tokentext>
<sentencetext>Another "me too" to vouch for PWSafe.
I've used it for years.
As with other programs it can be installed on a thumb drive, and has good features.
Check it out to compare.Ironically, I don't have it with me at the moment, or I wouldn't be AC right now....</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054710</id>
	<title>How I remember passes</title>
	<author>ya really</author>
	<datestamp>1257864420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I make my passwords something totally ridiculous that would probably be offensive to most people or certain groups I dont care for, haha. Something like macFanb0ysRghey&amp;. Sure, I remember it, but if there's ever a chance you have to share that password with someone else, you either have to change it or see the person's face look like O.o</htmltext>
<tokenext>I make my passwords something totally ridiculous that would probably be offensive to most people or certain groups I dont care for , haha .
Something like macFanb0ysRghey&amp; .
Sure , I remember it , but if there 's ever a chance you have to share that password with someone else , you either have to change it or see the person 's face look like O.o</tokentext>
<sentencetext>I make my passwords something totally ridiculous that would probably be offensive to most people or certain groups I dont care for, haha.
Something like macFanb0ysRghey&amp;.
Sure, I remember it, but if there's ever a chance you have to share that password with someone else, you either have to change it or see the person's face look like O.o</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055058</id>
	<title>vim -x</title>
	<author>ilmdba</author>
	<datestamp>1257866340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>vim -x somefile</p></htmltext>
<tokenext>vim -x somefile</tokentext>
<sentencetext>vim -x somefile</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057316</id>
	<title>In Plain sight</title>
	<author>Anonymous</author>
	<datestamp>1257108360000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I'm a fan of stuff right in plain sight, but within other information.</p><p>For example, I might have a password or pin reminder in my wallet, but it will be written down in only a form that I would readily associate in order to come up with the pass. I might do it in the form of a fake business card or phone directory, using mnemonics and certain patterns that I'd know immediately but others wouldn't. When I can make up my own secret question, I make it in the form of an obscure (to others) riddle but provokes an easy mental association for myself.</p><p>Even if my account type, user name, and password lists are found, it would be extremely tough for someone to put all 3 together to come up with the right answers, even if they were to recognize them for what they were in the first place.</p></htmltext>
<tokenext>I 'm a fan of stuff right in plain sight , but within other information.For example , I might have a password or pin reminder in my wallet , but it will be written down in only a form that I would readily associate in order to come up with the pass .
I might do it in the form of a fake business card or phone directory , using mnemonics and certain patterns that I 'd know immediately but others would n't .
When I can make up my own secret question , I make it in the form of an obscure ( to others ) riddle but provokes an easy mental association for myself.Even if my account type , user name , and password lists are found , it would be extremely tough for someone to put all 3 together to come up with the right answers , even if they were to recognize them for what they were in the first place .</tokentext>
<sentencetext>I'm a fan of stuff right in plain sight, but within other information.For example, I might have a password or pin reminder in my wallet, but it will be written down in only a form that I would readily associate in order to come up with the pass.
I might do it in the form of a fake business card or phone directory, using mnemonics and certain patterns that I'd know immediately but others wouldn't.
When I can make up my own secret question, I make it in the form of an obscure (to others) riddle but provokes an easy mental association for myself.Even if my account type, user name, and password lists are found, it would be extremely tough for someone to put all 3 together to come up with the right answers, even if they were to recognize them for what they were in the first place.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054988</id>
	<title>SplashID</title>
	<author>vanyel</author>
	<datestamp>1257865920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://www.splashdata.com/splashid/index.asp" title="splashdata.com">http://www.splashdata.com/splashid/index.asp</a> [splashdata.com]</p><p>It's the most important and most used app on my treo (including as use as a phone)</p></htmltext>
<tokenext>http : //www.splashdata.com/splashid/index.asp [ splashdata.com ] It 's the most important and most used app on my treo ( including as use as a phone )</tokentext>
<sentencetext>http://www.splashdata.com/splashid/index.asp [splashdata.com]It's the most important and most used app on my treo (including as use as a phone)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057886</id>
	<title>Re:Never store your passwords!</title>
	<author>u38cg</author>
	<datestamp>1257072540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Do you frequently permit unauthorised third parties access to your wallet?  Personally speaking, if it's good enough for Scheier, it's good enough for me<nobr> <wbr></nobr>;)</htmltext>
<tokenext>Do you frequently permit unauthorised third parties access to your wallet ?
Personally speaking , if it 's good enough for Scheier , it 's good enough for me ; )</tokentext>
<sentencetext>Do you frequently permit unauthorised third parties access to your wallet?
Personally speaking, if it's good enough for Scheier, it's good enough for me ;)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055438</id>
	<title>It's not perfect (vipass)</title>
	<author>Anonymous</author>
	<datestamp>1257868500000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>...but it works for me.  Use vim's pgp/gpg capabilities and a wrapper script to check out/check in my encrypted password files to a remote<br>SVN repository (which is backed up to several other servers).  Just have to be cognizant of tmp files.  Allows me to<br>have ridiculous usernames as well as passwds and be fairly resistant to catastrophic disk failures.  I have been caught a<br>couple times in third world countries when I had no ability to SSH to one of my servers, but it's few and far between.</p></htmltext>
<tokenext>...but it works for me .
Use vim 's pgp/gpg capabilities and a wrapper script to check out/check in my encrypted password files to a remoteSVN repository ( which is backed up to several other servers ) .
Just have to be cognizant of tmp files .
Allows me tohave ridiculous usernames as well as passwds and be fairly resistant to catastrophic disk failures .
I have been caught acouple times in third world countries when I had no ability to SSH to one of my servers , but it 's few and far between .</tokentext>
<sentencetext>...but it works for me.
Use vim's pgp/gpg capabilities and a wrapper script to check out/check in my encrypted password files to a remoteSVN repository (which is backed up to several other servers).
Just have to be cognizant of tmp files.
Allows me tohave ridiculous usernames as well as passwds and be fairly resistant to catastrophic disk failures.
I have been caught acouple times in third world countries when I had no ability to SSH to one of my servers, but it's few and far between.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054488</id>
	<title>Xmarks, KeePass and Encrypted Zip combination</title>
	<author>Anonymous</author>
	<datestamp>1257863520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I recommend this three step method:<br>
Step 1) Memorize one very long complex password. Take your time and pick something out that is long enough that someone could watch you type it a dozen times and have absolutely no hope of getting close to it. Use this password to encrypt a zip file, 256 bit AES, with separate text files for each system where you need a password. Never type this password on a computer you can't trust implicitly and save the archive somewhere safe online and on a thumb drive. Update this password list several times a year. Practice mentally regularly.<br>
Step 2) Use the Xmarks plugin with Firefox to gain portable bookmarks and passwords with a fairly complex master password. <br>
Step 3) Pick a password manager that works well for you where you will use it most often. I like KeePass personally. (Much of my work is done from a Windows workstation, so this is a convenience choice.)</p><p>The master password file is your personal master backup, in case of a severe event in your life that would let your memory of your other passwords become lost or obsolete. It is what you refer to if you need to decrypt something or recall a password that you haven't used in years. The encryption is expected to remain solid for a long time and it is cross-platform. Xmarks will let you keep your passwords online encrypted and shared between systems and cover your most common needs. KeePass, or similar, will fill in the void for all the other times when you want to keep track of your passwords.</p></htmltext>
<tokenext>I recommend this three step method : Step 1 ) Memorize one very long complex password .
Take your time and pick something out that is long enough that someone could watch you type it a dozen times and have absolutely no hope of getting close to it .
Use this password to encrypt a zip file , 256 bit AES , with separate text files for each system where you need a password .
Never type this password on a computer you ca n't trust implicitly and save the archive somewhere safe online and on a thumb drive .
Update this password list several times a year .
Practice mentally regularly .
Step 2 ) Use the Xmarks plugin with Firefox to gain portable bookmarks and passwords with a fairly complex master password .
Step 3 ) Pick a password manager that works well for you where you will use it most often .
I like KeePass personally .
( Much of my work is done from a Windows workstation , so this is a convenience choice .
) The master password file is your personal master backup , in case of a severe event in your life that would let your memory of your other passwords become lost or obsolete .
It is what you refer to if you need to decrypt something or recall a password that you have n't used in years .
The encryption is expected to remain solid for a long time and it is cross-platform .
Xmarks will let you keep your passwords online encrypted and shared between systems and cover your most common needs .
KeePass , or similar , will fill in the void for all the other times when you want to keep track of your passwords .</tokentext>
<sentencetext>I recommend this three step method:
Step 1) Memorize one very long complex password.
Take your time and pick something out that is long enough that someone could watch you type it a dozen times and have absolutely no hope of getting close to it.
Use this password to encrypt a zip file, 256 bit AES, with separate text files for each system where you need a password.
Never type this password on a computer you can't trust implicitly and save the archive somewhere safe online and on a thumb drive.
Update this password list several times a year.
Practice mentally regularly.
Step 2) Use the Xmarks plugin with Firefox to gain portable bookmarks and passwords with a fairly complex master password.
Step 3) Pick a password manager that works well for you where you will use it most often.
I like KeePass personally.
(Much of my work is done from a Windows workstation, so this is a convenience choice.
)The master password file is your personal master backup, in case of a severe event in your life that would let your memory of your other passwords become lost or obsolete.
It is what you refer to if you need to decrypt something or recall a password that you haven't used in years.
The encryption is expected to remain solid for a long time and it is cross-platform.
Xmarks will let you keep your passwords online encrypted and shared between systems and cover your most common needs.
KeePass, or similar, will fill in the void for all the other times when you want to keep track of your passwords.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057208</id>
	<title>Re:Keepass</title>
	<author>Anonymous</author>
	<datestamp>1257107040000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>The only true answer.</p></htmltext>
<tokenext>The only true answer .</tokentext>
<sentencetext>The only true answer.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055016</id>
	<title>OBZVault: runs on Linux, Mac OS X, and Windows</title>
	<author>duncan bayne</author>
	<datestamp>1257866040000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>I recommend <a href="http://www.offbyzero.com/obzvault" title="offbyzero.com">OBZVault</a> [offbyzero.com].  OBZVault is a cross-platform encrypted text editor; with it you can secure sensitive information like passwords, quotes and messages, and access them from any operating system.</p><p>We use OBZVault in-house to store all our important company secrets (passwords, PINs, etc.) in a single file that gets checked into our source control system.  Using OBZVault we can access that file on any of the operating systems we use (Linux, Mac OS X, and MS Windows).</p><p>It's licensed per physical machine, not per operating system, so e.g. a dual-boot Mac OS X and Ubuntu machine will only need one licence.</p><p>(Disclaimer: I co-founded <a href="http://www.offbyzero.com/" title="offbyzero.com">OffByZero</a> [offbyzero.com], the company that produces OBZVault.)</p></htmltext>
<tokenext>I recommend OBZVault [ offbyzero.com ] .
OBZVault is a cross-platform encrypted text editor ; with it you can secure sensitive information like passwords , quotes and messages , and access them from any operating system.We use OBZVault in-house to store all our important company secrets ( passwords , PINs , etc .
) in a single file that gets checked into our source control system .
Using OBZVault we can access that file on any of the operating systems we use ( Linux , Mac OS X , and MS Windows ) .It 's licensed per physical machine , not per operating system , so e.g .
a dual-boot Mac OS X and Ubuntu machine will only need one licence .
( Disclaimer : I co-founded OffByZero [ offbyzero.com ] , the company that produces OBZVault .
)</tokentext>
<sentencetext>I recommend OBZVault [offbyzero.com].
OBZVault is a cross-platform encrypted text editor; with it you can secure sensitive information like passwords, quotes and messages, and access them from any operating system.We use OBZVault in-house to store all our important company secrets (passwords, PINs, etc.
) in a single file that gets checked into our source control system.
Using OBZVault we can access that file on any of the operating systems we use (Linux, Mac OS X, and MS Windows).It's licensed per physical machine, not per operating system, so e.g.
a dual-boot Mac OS X and Ubuntu machine will only need one licence.
(Disclaimer: I co-founded OffByZero [offbyzero.com], the company that produces OBZVault.
)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055040</id>
	<title>Open Source, Platform Agnostic Alternative!</title>
	<author>Anonymous</author>
	<datestamp>1257866220000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>PasswordMaker.org has a solution that allows you to create passwords using a number of options and hashing algorithms. You use one (or a few) main passwords and then hash those with something specific about the program/application/website you are creating the unique and strong password for. The hash is a repeatable process so long as you can remember the options and password you used to generate it.</p><p>There are executables, web applications and embedded source code at their site and it is an open source solution. You are not tied to any particular device or program and can create the hashes from any machine in the world.</p></htmltext>
<tokenext>PasswordMaker.org has a solution that allows you to create passwords using a number of options and hashing algorithms .
You use one ( or a few ) main passwords and then hash those with something specific about the program/application/website you are creating the unique and strong password for .
The hash is a repeatable process so long as you can remember the options and password you used to generate it.There are executables , web applications and embedded source code at their site and it is an open source solution .
You are not tied to any particular device or program and can create the hashes from any machine in the world .</tokentext>
<sentencetext>PasswordMaker.org has a solution that allows you to create passwords using a number of options and hashing algorithms.
You use one (or a few) main passwords and then hash those with something specific about the program/application/website you are creating the unique and strong password for.
The hash is a repeatable process so long as you can remember the options and password you used to generate it.There are executables, web applications and embedded source code at their site and it is an open source solution.
You are not tied to any particular device or program and can create the hashes from any machine in the world.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055848</id>
	<title>Re:KeePass - fantastic software.</title>
	<author>Anonymous</author>
	<datestamp>1257871260000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Firefox can encrypt your passwords. In security preferences, check "Use a master password".</p></htmltext>
<tokenext>Firefox can encrypt your passwords .
In security preferences , check " Use a master password " .</tokentext>
<sentencetext>Firefox can encrypt your passwords.
In security preferences, check "Use a master password".</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059234</id>
	<title>Why not use vim?</title>
	<author>Anonymous</author>
	<datestamp>1257086220000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>A lot of people don't realize that vim actually has support for encryption (the -x option).</p><p>Combined with text-folding, it works well as a password holding mechanism, and bonus, it is pretty much cross platform as there is a version of vim on mostly any platform you would care to use.</p></htmltext>
<tokenext>A lot of people do n't realize that vim actually has support for encryption ( the -x option ) .Combined with text-folding , it works well as a password holding mechanism , and bonus , it is pretty much cross platform as there is a version of vim on mostly any platform you would care to use .</tokentext>
<sentencetext>A lot of people don't realize that vim actually has support for encryption (the -x option).Combined with text-folding, it works well as a password holding mechanism, and bonus, it is pretty much cross platform as there is a version of vim on mostly any platform you would care to use.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30071314</id>
	<title>Keepass Password Safe</title>
	<author>Radiobread</author>
	<datestamp>1258034040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>..mm.. I've been using Keepass for a couple of years,http://keepass.info/<nobr> <wbr></nobr>..mm.. it's a small standalone program that'll run as a Portable App <a href="http://portableapps.com/" title="portableapps.com" rel="nofollow">http://portableapps.com/</a> [portableapps.com] on a Flash/USB stick drive or on your hard drive it's Password protected and Free to use.. I find the database easy and useful and you only have to remember 1 password to let you in - all your passwords in one place..

No doubt there are some clever hackers out there who would delight in trying to crack the opening password.. but I'm not Paranoid..are you?</htmltext>
<tokenext>..mm.. I 've been using Keepass for a couple of years,http : //keepass.info/ ..mm.. it 's a small standalone program that 'll run as a Portable App http : //portableapps.com/ [ portableapps.com ] on a Flash/USB stick drive or on your hard drive it 's Password protected and Free to use.. I find the database easy and useful and you only have to remember 1 password to let you in - all your passwords in one place. . No doubt there are some clever hackers out there who would delight in trying to crack the opening password.. but I 'm not Paranoid..are you ?</tokentext>
<sentencetext>..mm.. I've been using Keepass for a couple of years,http://keepass.info/ ..mm.. it's a small standalone program that'll run as a Portable App http://portableapps.com/ [portableapps.com] on a Flash/USB stick drive or on your hard drive it's Password protected and Free to use.. I find the database easy and useful and you only have to remember 1 password to let you in - all your passwords in one place..

No doubt there are some clever hackers out there who would delight in trying to crack the opening password.. but I'm not Paranoid..are you?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058568</id>
	<title>Generate a hash</title>
	<author>AC-x</author>
	<datestamp>1257080280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've been using something like this for a while</p><p><a href="http://www.angel.net/~nic/passwd.html" title="angel.net">http://www.angel.net/~nic/passwd.html</a> [angel.net]</p><p>basically it's md5(websiteUrl + masterPassword) which creates a nice random string to use as a password. If one of those sites gets hacked or one of the passwords gets found out it's no biggie because each site has a unique password (if your master password gets found out then people might be able to guess at some of your logins tho)</p><p>I still let Firefox store my passwords but I keep them protected with a master password. Sure someone could brute force it but I don't save my bank passwords with it.</p></htmltext>
<tokenext>I 've been using something like this for a whilehttp : //www.angel.net/ ~ nic/passwd.html [ angel.net ] basically it 's md5 ( websiteUrl + masterPassword ) which creates a nice random string to use as a password .
If one of those sites gets hacked or one of the passwords gets found out it 's no biggie because each site has a unique password ( if your master password gets found out then people might be able to guess at some of your logins tho ) I still let Firefox store my passwords but I keep them protected with a master password .
Sure someone could brute force it but I do n't save my bank passwords with it .</tokentext>
<sentencetext>I've been using something like this for a whilehttp://www.angel.net/~nic/passwd.html [angel.net]basically it's md5(websiteUrl + masterPassword) which creates a nice random string to use as a password.
If one of those sites gets hacked or one of the passwords gets found out it's no biggie because each site has a unique password (if your master password gets found out then people might be able to guess at some of your logins tho)I still let Firefox store my passwords but I keep them protected with a master password.
Sure someone could brute force it but I don't save my bank passwords with it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30071856</id>
	<title>LastPass.com</title>
	<author>Anonymous</author>
	<datestamp>1258037820000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>LastPass works for me.</p></htmltext>
<tokenext>LastPass works for me .</tokentext>
<sentencetext>LastPass works for me.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055690</id>
	<title>encrypted file</title>
	<author>Anonymous</author>
	<datestamp>1257870360000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Put everything in a notepad file, and encrypt it using free software to compress and encrypt the file. Just remember the password to the encrypted file<nobr> <wbr></nobr>:)</p></htmltext>
<tokenext>Put everything in a notepad file , and encrypt it using free software to compress and encrypt the file .
Just remember the password to the encrypted file : )</tokentext>
<sentencetext>Put everything in a notepad file, and encrypt it using free software to compress and encrypt the file.
Just remember the password to the encrypted file :)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056510</id>
	<title>Firefox and Weave</title>
	<author>chrisvdb</author>
	<datestamp>1257877500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Combination of Firefox with master passport (for password encryption) and Weave (for passport syncing/backup) works for me...</p><p>http://mozillalabs.com/weave/</p></htmltext>
<tokenext>Combination of Firefox with master passport ( for password encryption ) and Weave ( for passport syncing/backup ) works for me...http : //mozillalabs.com/weave/</tokentext>
<sentencetext>Combination of Firefox with master passport (for password encryption) and Weave (for passport syncing/backup) works for me...http://mozillalabs.com/weave/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055512</id>
	<title>post-it it</title>
	<author>Anonymous</author>
	<datestamp>1257868980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>http://www.f-secure.com/weblog/archives/00001784.html</p><p>Think up a 3 or 4 or 5 character "pin".</p><p>write down your passwords on a post-it and stick to your monitor.</p><p>Actual password is whatever is on post-it + your pin preceding of following it.</p><p>In order to loose a password you have to forget your (short) pin or loose your monitor. For somebody else to get your password (barring keylogers etc) they need physical access to your computer / postit, and a gun pointed to your head for your pin.</p></htmltext>
<tokenext>http : //www.f-secure.com/weblog/archives/00001784.htmlThink up a 3 or 4 or 5 character " pin " .write down your passwords on a post-it and stick to your monitor.Actual password is whatever is on post-it + your pin preceding of following it.In order to loose a password you have to forget your ( short ) pin or loose your monitor .
For somebody else to get your password ( barring keylogers etc ) they need physical access to your computer / postit , and a gun pointed to your head for your pin .</tokentext>
<sentencetext>http://www.f-secure.com/weblog/archives/00001784.htmlThink up a 3 or 4 or 5 character "pin".write down your passwords on a post-it and stick to your monitor.Actual password is whatever is on post-it + your pin preceding of following it.In order to loose a password you have to forget your (short) pin or loose your monitor.
For somebody else to get your password (barring keylogers etc) they need physical access to your computer / postit, and a gun pointed to your head for your pin.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055560</id>
	<title>gpg...</title>
	<author>Tmack</author>
	<datestamp>1257869340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Its kinda what the system was designed to do: encrypt info, allow only designated users access. Its also GNU. In your case, the simple command line gpg -c PASWORD.PLAINTEXTFILE would work, and gpg -d on the<nobr> <wbr></nobr>.gpg file to get them back. Just be sure to nuke the original plaintext file when done. IIRC there are ways to edit and save the file without decrypting it to disk, though unless you have other people on your system with access to read your files while you edit things, this shouldnt be a problem.
<p>
GPG is wide spread enough that you should be able to find front-ends to it for many mobile platforms, otherwise at the least you can use cygwin to get it running. On a more complex level, gpg lets you add/revoke permission to read the file and also does integrity checking via PKI signatures and signed keys (ie: gpg creates an encryption key pair, then signs it with a users own public key so they can decrypt it. any additional user can be added by adding another signed key using that users public key to decrypt the original encryption key)</p><p>-tm</p></htmltext>
<tokenext>Its kinda what the system was designed to do : encrypt info , allow only designated users access .
Its also GNU .
In your case , the simple command line gpg -c PASWORD.PLAINTEXTFILE would work , and gpg -d on the .gpg file to get them back .
Just be sure to nuke the original plaintext file when done .
IIRC there are ways to edit and save the file without decrypting it to disk , though unless you have other people on your system with access to read your files while you edit things , this shouldnt be a problem .
GPG is wide spread enough that you should be able to find front-ends to it for many mobile platforms , otherwise at the least you can use cygwin to get it running .
On a more complex level , gpg lets you add/revoke permission to read the file and also does integrity checking via PKI signatures and signed keys ( ie : gpg creates an encryption key pair , then signs it with a users own public key so they can decrypt it .
any additional user can be added by adding another signed key using that users public key to decrypt the original encryption key ) -tm</tokentext>
<sentencetext>Its kinda what the system was designed to do: encrypt info, allow only designated users access.
Its also GNU.
In your case, the simple command line gpg -c PASWORD.PLAINTEXTFILE would work, and gpg -d on the .gpg file to get them back.
Just be sure to nuke the original plaintext file when done.
IIRC there are ways to edit and save the file without decrypting it to disk, though unless you have other people on your system with access to read your files while you edit things, this shouldnt be a problem.
GPG is wide spread enough that you should be able to find front-ends to it for many mobile platforms, otherwise at the least you can use cygwin to get it running.
On a more complex level, gpg lets you add/revoke permission to read the file and also does integrity checking via PKI signatures and signed keys (ie: gpg creates an encryption key pair, then signs it with a users own public key so they can decrypt it.
any additional user can be added by adding another signed key using that users public key to decrypt the original encryption key)-tm</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057810</id>
	<title>Supergenpass</title>
	<author>Anonymous</author>
	<datestamp>1257071280000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use supergenpass (http://supergenpass.com/). A very handy bookmarklet. You type in your master password into the password field of the web form and click the bookmark. The bookmarklet code picks your password up from the form, concatenates it with the site's domain name, takes a hash, and fills first 10 or so hex digits of the hash back into the form. It's a one-click operation. You only need to remember one master password  and you still get a unique password for each site. Works on 95\% of all pages that need a password and don't do anything fancy. You can use it in manual mode for the remaining 5\% pages. Your master password should be quite strong, though, to prevent someone from brute-force guessing your master password from the hash.</p></htmltext>
<tokenext>I use supergenpass ( http : //supergenpass.com/ ) .
A very handy bookmarklet .
You type in your master password into the password field of the web form and click the bookmark .
The bookmarklet code picks your password up from the form , concatenates it with the site 's domain name , takes a hash , and fills first 10 or so hex digits of the hash back into the form .
It 's a one-click operation .
You only need to remember one master password and you still get a unique password for each site .
Works on 95 \ % of all pages that need a password and do n't do anything fancy .
You can use it in manual mode for the remaining 5 \ % pages .
Your master password should be quite strong , though , to prevent someone from brute-force guessing your master password from the hash .</tokentext>
<sentencetext>I use supergenpass (http://supergenpass.com/).
A very handy bookmarklet.
You type in your master password into the password field of the web form and click the bookmark.
The bookmarklet code picks your password up from the form, concatenates it with the site's domain name, takes a hash, and fills first 10 or so hex digits of the hash back into the form.
It's a one-click operation.
You only need to remember one master password  and you still get a unique password for each site.
Works on 95\% of all pages that need a password and don't do anything fancy.
You can use it in manual mode for the remaining 5\% pages.
Your master password should be quite strong, though, to prevent someone from brute-force guessing your master password from the hash.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055140</id>
	<title>Notecard In Wallet For Life</title>
	<author>Enti</author>
	<datestamp>1257866700000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext>While you initially discount paper, a folded notecard in my wallet has been the most reliable method thus far
Honestly, when is the last time you've lost your wallet?  For me this was eight years ago.
Just as you cancel your credit/debit cards when losing a wallet, significant passwords can also be changed.  Consider it a security feature

Besides, the slight inconvenience of taking out your wallet for a forgotten password encourages you to remember it (I have a straight-terrible memory, and this has worked)</htmltext>
<tokenext>While you initially discount paper , a folded notecard in my wallet has been the most reliable method thus far Honestly , when is the last time you 've lost your wallet ?
For me this was eight years ago .
Just as you cancel your credit/debit cards when losing a wallet , significant passwords can also be changed .
Consider it a security feature Besides , the slight inconvenience of taking out your wallet for a forgotten password encourages you to remember it ( I have a straight-terrible memory , and this has worked )</tokentext>
<sentencetext>While you initially discount paper, a folded notecard in my wallet has been the most reliable method thus far
Honestly, when is the last time you've lost your wallet?
For me this was eight years ago.
Just as you cancel your credit/debit cards when losing a wallet, significant passwords can also be changed.
Consider it a security feature

Besides, the slight inconvenience of taking out your wallet for a forgotten password encourages you to remember it (I have a straight-terrible memory, and this has worked)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059440</id>
	<title>Re:Hashing Works</title>
	<author>fulldecent</author>
	<datestamp>1257087600000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>everyone uses this method but nobody want to reply and agree with you because then someone could find that person, reverse engineer their hash and then own them.</p><p>shit!</p></htmltext>
<tokenext>everyone uses this method but nobody want to reply and agree with you because then someone could find that person , reverse engineer their hash and then own them.shit !</tokentext>
<sentencetext>everyone uses this method but nobody want to reply and agree with you because then someone could find that person, reverse engineer their hash and then own them.shit!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054728</id>
	<title>Re:Simple</title>
	<author>Anonymous</author>
	<datestamp>1257864480000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext>sorry, the password was 12345 if you're trying to be funny and quote spaceballs.</div>
	</htmltext>
<tokenext>sorry , the password was 12345 if you 're trying to be funny and quote spaceballs .</tokentext>
<sentencetext>sorry, the password was 12345 if you're trying to be funny and quote spaceballs.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055948</id>
	<title>That's easy</title>
	<author>nsayer</author>
	<datestamp>1257871920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Just use the <a href="http://en.wikipedia.org/wiki/Keychain\_(Mac\_OS)" title="wikipedia.org">keychain</a> [wikipedia.org].</p><p>Oh, you don't have a mac? I'm sorry.</p></htmltext>
<tokenext>Just use the keychain [ wikipedia.org ] .Oh , you do n't have a mac ?
I 'm sorry .</tokentext>
<sentencetext>Just use the keychain [wikipedia.org].Oh, you don't have a mac?
I'm sorry.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054948</id>
	<title>Re:Keepass</title>
	<author>Anonymous</author>
	<datestamp>1257865680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I second or third this recommendation.  Works WONDERFULLY on a stick and it's easy to backup the encrypted db.</p></htmltext>
<tokenext>I second or third this recommendation .
Works WONDERFULLY on a stick and it 's easy to backup the encrypted db .</tokentext>
<sentencetext>I second or third this recommendation.
Works WONDERFULLY on a stick and it's easy to backup the encrypted db.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060534</id>
	<title>Re:supergenpass ?</title>
	<author>jridley</author>
	<datestamp>1257092460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I used to use Password Safe, but have switched completely to supergenpass.</p><p>I don't think it works (as a bookmarklet) in Chrome, fwiw.</p><p>I have a separate copy up on my personal website in case I have to log in somewhere from someone else's machine where I don't have the bookmarklet installed.  It's a little bit of a pain, but it's much less so than having to carry a thumb drive around with a portable copy of Password Safe and my PS file, plus having to keep the thumb drive, work machine and home machine copies of my PS files updated all the time.</p></htmltext>
<tokenext>I used to use Password Safe , but have switched completely to supergenpass.I do n't think it works ( as a bookmarklet ) in Chrome , fwiw.I have a separate copy up on my personal website in case I have to log in somewhere from someone else 's machine where I do n't have the bookmarklet installed .
It 's a little bit of a pain , but it 's much less so than having to carry a thumb drive around with a portable copy of Password Safe and my PS file , plus having to keep the thumb drive , work machine and home machine copies of my PS files updated all the time .</tokentext>
<sentencetext>I used to use Password Safe, but have switched completely to supergenpass.I don't think it works (as a bookmarklet) in Chrome, fwiw.I have a separate copy up on my personal website in case I have to log in somewhere from someone else's machine where I don't have the bookmarklet installed.
It's a little bit of a pain, but it's much less so than having to carry a thumb drive around with a portable copy of Password Safe and my PS file, plus having to keep the thumb drive, work machine and home machine copies of my PS files updated all the time.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054646</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056848</id>
	<title>Re:Password Safe</title>
	<author>Tarlus</author>
	<datestamp>1257880500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Seconded. I have used Password Safe for a couple of years and it has proven to be an indispensable tool. Easy and safe to back up, as well.</p></htmltext>
<tokenext>Seconded .
I have used Password Safe for a couple of years and it has proven to be an indispensable tool .
Easy and safe to back up , as well .</tokentext>
<sentencetext>Seconded.
I have used Password Safe for a couple of years and it has proven to be an indispensable tool.
Easy and safe to back up, as well.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054660</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056872</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>shentino</author>
	<datestamp>1257880740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>slashdot has 6 letters?</p></htmltext>
<tokenext>slashdot has 6 letters ?</tokentext>
<sentencetext>slashdot has 6 letters?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059770</id>
	<title>KeePass open source</title>
	<author>Anonymous</author>
	<datestamp>1257088980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Free and it can be portable. http://keepass.info/</p></htmltext>
<tokenext>Free and it can be portable .
http : //keepass.info/</tokentext>
<sentencetext>Free and it can be portable.
http://keepass.info/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058944</id>
	<title>Open source OnlinePasswords</title>
	<author>Anonymous</author>
	<datestamp>1257083820000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use http://onlinepasswords.sourceforge.net/</p><p>It is a web based and uses "PHP + flat file" for easy retrieval. All passwords stored are encrypted and the master (key) password is never saved. Even the user-id (for both master and individual access) are all encrypted. So you can put his on a hosted website if you like!</p><p>Demo is also available at: http://onlinepasswords.sourceforge.net/demo/login.php</p></htmltext>
<tokenext>I use http : //onlinepasswords.sourceforge.net/It is a web based and uses " PHP + flat file " for easy retrieval .
All passwords stored are encrypted and the master ( key ) password is never saved .
Even the user-id ( for both master and individual access ) are all encrypted .
So you can put his on a hosted website if you like ! Demo is also available at : http : //onlinepasswords.sourceforge.net/demo/login.php</tokentext>
<sentencetext>I use http://onlinepasswords.sourceforge.net/It is a web based and uses "PHP + flat file" for easy retrieval.
All passwords stored are encrypted and the master (key) password is never saved.
Even the user-id (for both master and individual access) are all encrypted.
So you can put his on a hosted website if you like!Demo is also available at: http://onlinepasswords.sourceforge.net/demo/login.php</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057428</id>
	<title>Re:KeePass - fantastic software.</title>
	<author>Thanatos81</author>
	<datestamp>1257066420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Got to agree with you on this tool. Have been using it since s.th. about two years now. What I'd like to add, because it is one of the most outstanding features in my opinion, is that there are clients for nearly everything. Linux, Windows, Android, WinMo, Blackberry, iPhone, MacOS X even Solaris iirc. That way I got one encrypted file with my password I can use on any of my devices.</htmltext>
<tokenext>Got to agree with you on this tool .
Have been using it since s.th .
about two years now .
What I 'd like to add , because it is one of the most outstanding features in my opinion , is that there are clients for nearly everything .
Linux , Windows , Android , WinMo , Blackberry , iPhone , MacOS X even Solaris iirc .
That way I got one encrypted file with my password I can use on any of my devices .</tokentext>
<sentencetext>Got to agree with you on this tool.
Have been using it since s.th.
about two years now.
What I'd like to add, because it is one of the most outstanding features in my opinion, is that there are clients for nearly everything.
Linux, Windows, Android, WinMo, Blackberry, iPhone, MacOS X even Solaris iirc.
That way I got one encrypted file with my password I can use on any of my devices.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067006</id>
	<title>Re:Passphrases from books</title>
	<author>turkeydance</author>
	<datestamp>1257076440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>well, i use my license plate as a "base" password.
ex: WTY-667
if sites don't allow "-", then leave it out.
if sites require more characters, i add state/country.
WTY-667MAUS...or USA, depending. for each individual
site i add two letters. for SlashDot, it would be:
WTY-667SD, for eBay: WTY667EB (old school),
for My Porn Not Yours: WTY-667MAUSAMPNY.
porn is getting to be too much like work.</htmltext>
<tokenext>well , i use my license plate as a " base " password .
ex : WTY-667 if sites do n't allow " - " , then leave it out .
if sites require more characters , i add state/country .
WTY-667MAUS...or USA , depending .
for each individual site i add two letters .
for SlashDot , it would be : WTY-667SD , for eBay : WTY667EB ( old school ) , for My Porn Not Yours : WTY-667MAUSAMPNY .
porn is getting to be too much like work .</tokentext>
<sentencetext>well, i use my license plate as a "base" password.
ex: WTY-667
if sites don't allow "-", then leave it out.
if sites require more characters, i add state/country.
WTY-667MAUS...or USA, depending.
for each individual
site i add two letters.
for SlashDot, it would be:
WTY-667SD, for eBay: WTY667EB (old school),
for My Porn Not Yours: WTY-667MAUSAMPNY.
porn is getting to be too much like work.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055466</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061848</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>Anonymous</author>
	<datestamp>1257097560000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>That's still predictable.</p><p>I prefer to use localized slang (in my case spanish "jerga") relative to my favorite activity for the website and them apply similar rules as yours.</p><p>e.g., for slashdot.org the spanish "jerga" will be: barrapunteandome<br>later with rules similar as your it will be something like: |34Rr4|)uNt4</p></htmltext>
<tokenext>That 's still predictable.I prefer to use localized slang ( in my case spanish " jerga " ) relative to my favorite activity for the website and them apply similar rules as yours.e.g. , for slashdot.org the spanish " jerga " will be : barrapunteandomelater with rules similar as your it will be something like : | 34Rr4 | ) uNt4</tokentext>
<sentencetext>That's still predictable.I prefer to use localized slang (in my case spanish "jerga") relative to my favorite activity for the website and them apply similar rules as yours.e.g., for slashdot.org the spanish "jerga" will be: barrapunteandomelater with rules similar as your it will be something like: |34Rr4|)uNt4</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057542</id>
	<title>Keyser Soze method</title>
	<author>Junior J. Junior III</author>
	<datestamp>1257067920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Look around your office and read random words off of random things in plain view.  Incorporate these into your password.  If you forget a password, just look around the room and you'll have mnemonics built into the decor.  Just don't get lazy and type literally exactly what you see.  Use it as the basis for your passwords, only.</p></htmltext>
<tokenext>Look around your office and read random words off of random things in plain view .
Incorporate these into your password .
If you forget a password , just look around the room and you 'll have mnemonics built into the decor .
Just do n't get lazy and type literally exactly what you see .
Use it as the basis for your passwords , only .</tokentext>
<sentencetext>Look around your office and read random words off of random things in plain view.
Incorporate these into your password.
If you forget a password, just look around the room and you'll have mnemonics built into the decor.
Just don't get lazy and type literally exactly what you see.
Use it as the basis for your passwords, only.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30069780</id>
	<title>http://supergenpass.com/</title>
	<author>Thunder Rabbit</author>
	<datestamp>1257101520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="http://supergenpass.com/" title="supergenpass.com" rel="nofollow">http://supergenpass.com/</a> [supergenpass.com]

From the site:

Instead of storing your passwords on your hard disk or online&mdash;where they are vulnerable to theft and data loss&mdash;SuperGenPass uses a hash algorithm to transform a master password into unique, complex passwords for the Web sites you visit. There&rsquo;s no software to install.</htmltext>
<tokenext>http : //supergenpass.com/ [ supergenpass.com ] From the site : Instead of storing your passwords on your hard disk or online    where they are vulnerable to theft and data loss    SuperGenPass uses a hash algorithm to transform a master password into unique , complex passwords for the Web sites you visit .
There    s no software to install .</tokentext>
<sentencetext>http://supergenpass.com/ [supergenpass.com]

From the site:

Instead of storing your passwords on your hard disk or online—where they are vulnerable to theft and data loss—SuperGenPass uses a hash algorithm to transform a master password into unique, complex passwords for the Web sites you visit.
There’s no software to install.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063660</id>
	<title>OI Password Safe, on Android</title>
	<author>dmp2</author>
	<datestamp>1257105000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It encrypts all of them with a master password, and I've always got it with me.  Easy to backup the db to the sd card, and easy to export a plain text file of all passwords, for storage in our safe deposit box, in case I get hit by the proverbial truck.</p><p>http://www.openintents.org/en/node/205</p></htmltext>
<tokenext>It encrypts all of them with a master password , and I 've always got it with me .
Easy to backup the db to the sd card , and easy to export a plain text file of all passwords , for storage in our safe deposit box , in case I get hit by the proverbial truck.http : //www.openintents.org/en/node/205</tokentext>
<sentencetext>It encrypts all of them with a master password, and I've always got it with me.
Easy to backup the db to the sd card, and easy to export a plain text file of all passwords, for storage in our safe deposit box, in case I get hit by the proverbial truck.http://www.openintents.org/en/node/205</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055248</id>
	<title>LockBox</title>
	<author>Anonymous</author>
	<datestamp>1257867300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Coffeecup Software has a password manager called LockBox. It's password protected and encrypted. I keep it on a flash drive.</p><p>Works great, cause the sites can be sortable, plenty of information fields.</p></htmltext>
<tokenext>Coffeecup Software has a password manager called LockBox .
It 's password protected and encrypted .
I keep it on a flash drive.Works great , cause the sites can be sortable , plenty of information fields .</tokentext>
<sentencetext>Coffeecup Software has a password manager called LockBox.
It's password protected and encrypted.
I keep it on a flash drive.Works great, cause the sites can be sortable, plenty of information fields.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054906</id>
	<title>PasswordSafe</title>
	<author>ghelmer</author>
	<datestamp>1257865500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://passwordsafe.sourceforge.net/" title="sourceforge.net" rel="nofollow">http://passwordsafe.sourceforge.net/</a> [sourceforge.net]</p></htmltext>
<tokenext>http : //passwordsafe.sourceforge.net/ [ sourceforge.net ]</tokentext>
<sentencetext>http://passwordsafe.sourceforge.net/ [sourceforge.net]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056586</id>
	<title>Best way to do it!</title>
	<author>coolate</author>
	<datestamp>1257878160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I put mine under my keyboard on a sticker!</htmltext>
<tokenext>I put mine under my keyboard on a sticker !</tokentext>
<sentencetext>I put mine under my keyboard on a sticker!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060882</id>
	<title>Password encryption program.</title>
	<author>gilgsn</author>
	<datestamp>1257093840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>This little program encrypts your passwords: http://islandlimited.net/download.php?file=3</p></htmltext>
<tokenext>This little program encrypts your passwords : http : //islandlimited.net/download.php ? file = 3</tokentext>
<sentencetext>This little program encrypts your passwords: http://islandlimited.net/download.php?file=3</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056214</id>
	<title>Re:Truecrypt</title>
	<author>hedwards</author>
	<datestamp>1257874440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The main problem is that GPGauth seems to require the site to support it. Which is reasonable in the future, but it doesn't really solve this problem now.</htmltext>
<tokenext>The main problem is that GPGauth seems to require the site to support it .
Which is reasonable in the future , but it does n't really solve this problem now .</tokentext>
<sentencetext>The main problem is that GPGauth seems to require the site to support it.
Which is reasonable in the future, but it doesn't really solve this problem now.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055024</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056356</id>
	<title>A master password encypted file using vim and apg</title>
	<author>beachdog</author>
	<datestamp>1257875760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I'll tell you about my password system built around vim, apg and cat.</p><p>This system is a variation of the single encrypted file that enables gnarly passwords and user identifications and challenge response answers.</p><p>This system has two points of weakness. One is: never print out a reference copy of your decrypted password file to a printer attached to a Windows computer. And as the vim "help X" text notes, a process running as you or root could read passwords while the file is open. The leading risk is a browser java, javascript or browser plugin.</p><p>Here is how it works: The vim editor supports ":X" for write a file encrypted with a pass phrase.<br>That is the key feature this scheme uses.</p><p>Steps: On a sheet of paper write out an encryption pass phrase.<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Choose a file name for the passwordfile.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Generate a nice big nasty list of passwords using "apg" and "wc".<br>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Set aside a printed paper copy of a complete separate set of passwords to use if you must change passwords due to a security breach.</p><p>Here is a big command line to play with:</p><p>
&nbsp; &nbsp; &nbsp; (/usr/bin/apg -a 1 -n 99 -m 11 -x 14 -M CL;<nobr> <wbr></nobr>/usr/bin/apg -a 1 -n 100 -m 18 -x 23 -M NCL ) | cat -n</p><p>Using the unix "&gt;" direct the passwords into the filename for your passwordfile.</p><p>Open the file in vi like "vi passwordfile"</p><p>Write the file out using the<nobr> <wbr></nobr>:X command and using your encryption pass phrase.</p><p>Exit and re-open the passwordfile with vi, to ensure you have the passphrase working.</p><p>For each password you store in the file. Create a text entry like this:</p><p>website-url date-established<br>userid<br>password<br>other security information</p><p>Every time you use a password from the pre-generated list, mark the password with a mark to prevent any password being used twice.</p><p>When copying userids and passwords, use the Linux mouse copy instead of typing. Open the password file in a separate window from the Web Browser. If you figure out a few vi editing shortcuts, getting into the password file, and logging on is a fast process.</p><p>For fire safety and disaster recovery, I periodically make a plain text printout of the password file using the vi ":ha" command. As I said: don't print out a almost certainly infected Windows printer.</p><p>A security issue to watch is: don't mix entertainment browsing with banking or online purchase activity, don't put your passwordfile on a machine that you don't own and control.</p><p>The drill if you discover a security breach of this system is: Either somebody got into your account without your password or your Linux password file may be completely breached. Using the spare password file printed on paper noted above, change important passwords post haste.<br>
&nbsp;</p></htmltext>
<tokenext>I 'll tell you about my password system built around vim , apg and cat.This system is a variation of the single encrypted file that enables gnarly passwords and user identifications and challenge response answers.This system has two points of weakness .
One is : never print out a reference copy of your decrypted password file to a printer attached to a Windows computer .
And as the vim " help X " text notes , a process running as you or root could read passwords while the file is open .
The leading risk is a browser java , javascript or browser plugin.Here is how it works : The vim editor supports " : X " for write a file encrypted with a pass phrase.That is the key feature this scheme uses.Steps : On a sheet of paper write out an encryption pass phrase .
              Choose a file name for the passwordfile .
              Generate a nice big nasty list of passwords using " apg " and " wc " .
              Set aside a printed paper copy of a complete separate set of passwords to use if you must change passwords due to a security breach.Here is a big command line to play with :       ( /usr/bin/apg -a 1 -n 99 -m 11 -x 14 -M CL ; /usr/bin/apg -a 1 -n 100 -m 18 -x 23 -M NCL ) | cat -nUsing the unix " &gt; " direct the passwords into the filename for your passwordfile.Open the file in vi like " vi passwordfile " Write the file out using the : X command and using your encryption pass phrase.Exit and re-open the passwordfile with vi , to ensure you have the passphrase working.For each password you store in the file .
Create a text entry like this : website-url date-establisheduseridpasswordother security informationEvery time you use a password from the pre-generated list , mark the password with a mark to prevent any password being used twice.When copying userids and passwords , use the Linux mouse copy instead of typing .
Open the password file in a separate window from the Web Browser .
If you figure out a few vi editing shortcuts , getting into the password file , and logging on is a fast process.For fire safety and disaster recovery , I periodically make a plain text printout of the password file using the vi " : ha " command .
As I said : do n't print out a almost certainly infected Windows printer.A security issue to watch is : do n't mix entertainment browsing with banking or online purchase activity , do n't put your passwordfile on a machine that you do n't own and control.The drill if you discover a security breach of this system is : Either somebody got into your account without your password or your Linux password file may be completely breached .
Using the spare password file printed on paper noted above , change important passwords post haste .
 </tokentext>
<sentencetext>I'll tell you about my password system built around vim, apg and cat.This system is a variation of the single encrypted file that enables gnarly passwords and user identifications and challenge response answers.This system has two points of weakness.
One is: never print out a reference copy of your decrypted password file to a printer attached to a Windows computer.
And as the vim "help X" text notes, a process running as you or root could read passwords while the file is open.
The leading risk is a browser java, javascript or browser plugin.Here is how it works: The vim editor supports ":X" for write a file encrypted with a pass phrase.That is the key feature this scheme uses.Steps: On a sheet of paper write out an encryption pass phrase.
              Choose a file name for the passwordfile.
              Generate a nice big nasty list of passwords using "apg" and "wc".
              Set aside a printed paper copy of a complete separate set of passwords to use if you must change passwords due to a security breach.Here is a big command line to play with:
      (/usr/bin/apg -a 1 -n 99 -m 11 -x 14 -M CL; /usr/bin/apg -a 1 -n 100 -m 18 -x 23 -M NCL ) | cat -nUsing the unix "&gt;" direct the passwords into the filename for your passwordfile.Open the file in vi like "vi passwordfile"Write the file out using the :X command and using your encryption pass phrase.Exit and re-open the passwordfile with vi, to ensure you have the passphrase working.For each password you store in the file.
Create a text entry like this:website-url date-establisheduseridpasswordother security informationEvery time you use a password from the pre-generated list, mark the password with a mark to prevent any password being used twice.When copying userids and passwords, use the Linux mouse copy instead of typing.
Open the password file in a separate window from the Web Browser.
If you figure out a few vi editing shortcuts, getting into the password file, and logging on is a fast process.For fire safety and disaster recovery, I periodically make a plain text printout of the password file using the vi ":ha" command.
As I said: don't print out a almost certainly infected Windows printer.A security issue to watch is: don't mix entertainment browsing with banking or online purchase activity, don't put your passwordfile on a machine that you don't own and control.The drill if you discover a security breach of this system is: Either somebody got into your account without your password or your Linux password file may be completely breached.
Using the spare password file printed on paper noted above, change important passwords post haste.
 </sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058584</id>
	<title>pwsafe</title>
	<author>Kidbro</author>
	<datestamp>1257080460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://sourceforge.net/projects/pwsafe/" title="sourceforge.net">pwsafe</a> [sourceforge.net]</p><p>Or, you know, remember them<nobr> <wbr></nobr>:)</p></htmltext>
<tokenext>pwsafe [ sourceforge.net ] Or , you know , remember them : )</tokentext>
<sentencetext>pwsafe [sourceforge.net]Or, you know, remember them :)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057360</id>
	<title>What I Use</title>
	<author>Anonymous</author>
	<datestamp>1257108840000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use a java program called jPasswords.  It stores the database in ecrypted form.  Only need to remember the master key, and you can keep track of all logins, URLs, notes, etc.</p></htmltext>
<tokenext>I use a java program called jPasswords .
It stores the database in ecrypted form .
Only need to remember the master key , and you can keep track of all logins , URLs , notes , etc .</tokentext>
<sentencetext>I use a java program called jPasswords.
It stores the database in ecrypted form.
Only need to remember the master key, and you can keep track of all logins, URLs, notes, etc.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058016</id>
	<title>writing passwords in plain text isnt wise</title>
	<author>Anonymous</author>
	<datestamp>1257073980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>writing a passwod down in any form or using the same password across multi sites is foolish and begging for disaster.</p><p>as for it in your wallet, oh i mug you of your wallet. maybe badly assulting you and leeaving you in hospital for a couple days while i pillage your email.</p><p>keepass is the way to go. can also email (possibly to someone trusted?) or store your keepass database in some cloud ftp server such as hotmails skydrive (assuming publicly available)</p><p>could also try fSekrit but you lose your cross platform goodness. check out firefox portable at portableapps.com</p></htmltext>
<tokenext>writing a passwod down in any form or using the same password across multi sites is foolish and begging for disaster.as for it in your wallet , oh i mug you of your wallet .
maybe badly assulting you and leeaving you in hospital for a couple days while i pillage your email.keepass is the way to go .
can also email ( possibly to someone trusted ?
) or store your keepass database in some cloud ftp server such as hotmails skydrive ( assuming publicly available ) could also try fSekrit but you lose your cross platform goodness .
check out firefox portable at portableapps.com</tokentext>
<sentencetext>writing a passwod down in any form or using the same password across multi sites is foolish and begging for disaster.as for it in your wallet, oh i mug you of your wallet.
maybe badly assulting you and leeaving you in hospital for a couple days while i pillage your email.keepass is the way to go.
can also email (possibly to someone trusted?
) or store your keepass database in some cloud ftp server such as hotmails skydrive (assuming publicly available)could also try fSekrit but you lose your cross platform goodness.
check out firefox portable at portableapps.com</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058158</id>
	<title>Re:Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257075300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>The advantage of TrueCrypt is that you can stuff more stuff in your volume. For instance, I have a directory with scans of bankcards, divers license, insurance policies and the like. Besides passwords, where do I keep my social security number, private GPG key, private SSH key? TrueCrypt can become very valuable once you realize what you can do with it. For backup, the TC volume is copied to my phone and webserver.</p></htmltext>
<tokenext>The advantage of TrueCrypt is that you can stuff more stuff in your volume .
For instance , I have a directory with scans of bankcards , divers license , insurance policies and the like .
Besides passwords , where do I keep my social security number , private GPG key , private SSH key ?
TrueCrypt can become very valuable once you realize what you can do with it .
For backup , the TC volume is copied to my phone and webserver .</tokentext>
<sentencetext>The advantage of TrueCrypt is that you can stuff more stuff in your volume.
For instance, I have a directory with scans of bankcards, divers license, insurance policies and the like.
Besides passwords, where do I keep my social security number, private GPG key, private SSH key?
TrueCrypt can become very valuable once you realize what you can do with it.
For backup, the TC volume is copied to my phone and webserver.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062502</id>
	<title>Re:Truecrypt</title>
	<author>karmarep</author>
	<datestamp>1257100380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>What about Biometric USB with truecrypt? I think it would be a good way to go. The fingerprint reader w/ a password could unlock the master password file? What are the weaknesses with this?</htmltext>
<tokenext>What about Biometric USB with truecrypt ?
I think it would be a good way to go .
The fingerprint reader w/ a password could unlock the master password file ?
What are the weaknesses with this ?</tokentext>
<sentencetext>What about Biometric USB with truecrypt?
I think it would be a good way to go.
The fingerprint reader w/ a password could unlock the master password file?
What are the weaknesses with this?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055596</id>
	<title>Re:Truecrypt</title>
	<author>iamhigh</author>
	<datestamp>1257869520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I don't usually plug products, but this has really been an awesome buy for me.  I have linux installed on the 8GB version and it's hardly noticeable when in the laptop and runs well.  Has survived daily use for months now.<br> <br>
<a href="http://www.geekstuff4u.com/buffalo-4gb-5mm-thumbkey.html" title="geekstuff4u.com">Buffalo 5mm Flash Drive</a> [geekstuff4u.com]</htmltext>
<tokenext>I do n't usually plug products , but this has really been an awesome buy for me .
I have linux installed on the 8GB version and it 's hardly noticeable when in the laptop and runs well .
Has survived daily use for months now .
Buffalo 5mm Flash Drive [ geekstuff4u.com ]</tokentext>
<sentencetext>I don't usually plug products, but this has really been an awesome buy for me.
I have linux installed on the 8GB version and it's hardly noticeable when in the laptop and runs well.
Has survived daily use for months now.
Buffalo 5mm Flash Drive [geekstuff4u.com]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054964</id>
	<title>Remembering your passwords</title>
	<author>Anonymous</author>
	<datestamp>1257865740000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I have found a really good "tool" for remembering passwords, basically, you rely upon your childhood and the Nursery Rhymes that you learned and/or your own list of favorite songs and poems.  The "algorithm" that I use takes into account the "rules" that seem to be imposed more and more lately by sites that want to make sure that you have a strong password.  Most of these sites require some combination of upper-case letters, lower-case letters, numbers and symbols.  Thus was born the easy to remember password algorithm - I typically use poems.  You start by recognizing that you will need a number (or two) somewhere in the password.  Thus the first portion of the password is the line number of one line of the poem (usually two digits).  Next, you recognize that poems (or songs, etc.) start each line with a capital letter (takes care of one more requirement for the strong password) - I usually use two capitals here that are taken from the first letters of the first two words on that line of the poem.  The next step is to take the first letter of the next words on that line of the poem (or song).  If there is no punctuation on that line, you can end the password with a period (or two).  If there is punctuation within the line, then the requirement for symbol(s) is also taken care of.  Now, all you have to remember is what poem you are currently using and which line you are on.  When you need to change passwords, it's easy just to take the next line of the poem and repeat the procedure.</p></htmltext>
<tokenext>I have found a really good " tool " for remembering passwords , basically , you rely upon your childhood and the Nursery Rhymes that you learned and/or your own list of favorite songs and poems .
The " algorithm " that I use takes into account the " rules " that seem to be imposed more and more lately by sites that want to make sure that you have a strong password .
Most of these sites require some combination of upper-case letters , lower-case letters , numbers and symbols .
Thus was born the easy to remember password algorithm - I typically use poems .
You start by recognizing that you will need a number ( or two ) somewhere in the password .
Thus the first portion of the password is the line number of one line of the poem ( usually two digits ) .
Next , you recognize that poems ( or songs , etc .
) start each line with a capital letter ( takes care of one more requirement for the strong password ) - I usually use two capitals here that are taken from the first letters of the first two words on that line of the poem .
The next step is to take the first letter of the next words on that line of the poem ( or song ) .
If there is no punctuation on that line , you can end the password with a period ( or two ) .
If there is punctuation within the line , then the requirement for symbol ( s ) is also taken care of .
Now , all you have to remember is what poem you are currently using and which line you are on .
When you need to change passwords , it 's easy just to take the next line of the poem and repeat the procedure .</tokentext>
<sentencetext>I have found a really good "tool" for remembering passwords, basically, you rely upon your childhood and the Nursery Rhymes that you learned and/or your own list of favorite songs and poems.
The "algorithm" that I use takes into account the "rules" that seem to be imposed more and more lately by sites that want to make sure that you have a strong password.
Most of these sites require some combination of upper-case letters, lower-case letters, numbers and symbols.
Thus was born the easy to remember password algorithm - I typically use poems.
You start by recognizing that you will need a number (or two) somewhere in the password.
Thus the first portion of the password is the line number of one line of the poem (usually two digits).
Next, you recognize that poems (or songs, etc.
) start each line with a capital letter (takes care of one more requirement for the strong password) - I usually use two capitals here that are taken from the first letters of the first two words on that line of the poem.
The next step is to take the first letter of the next words on that line of the poem (or song).
If there is no punctuation on that line, you can end the password with a period (or two).
If there is punctuation within the line, then the requirement for symbol(s) is also taken care of.
Now, all you have to remember is what poem you are currently using and which line you are on.
When you need to change passwords, it's easy just to take the next line of the poem and repeat the procedure.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055908</id>
	<title>obviously!</title>
	<author>gandhi\_2</author>
	<datestamp>1257871560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>put it in the cloud!</p></htmltext>
<tokenext>put it in the cloud !</tokentext>
<sentencetext>put it in the cloud!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055398</id>
	<title>Re:Truecrypt</title>
	<author>dicobalt</author>
	<datestamp>1257868260000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Even better yet you could put the Firefox profile inside the Truecrypt volume. Edit C:\Users\your\_name\AppData\Roaming\Mozilla\Firefox\profiles.ini to look something like this:

[General]
StartWithLastProfile=1

[Profile0]
Name=default
IsRelative=0
Path=F:\Firefox\Profiles\pg4u527p.default

In this case the F: drive was the mounted Truecrypt drive with the path to the Firefox profile.</htmltext>
<tokenext>Even better yet you could put the Firefox profile inside the Truecrypt volume .
Edit C : \ Users \ your \ _name \ AppData \ Roaming \ Mozilla \ Firefox \ profiles.ini to look something like this : [ General ] StartWithLastProfile = 1 [ Profile0 ] Name = default IsRelative = 0 Path = F : \ Firefox \ Profiles \ pg4u527p.default In this case the F : drive was the mounted Truecrypt drive with the path to the Firefox profile .</tokentext>
<sentencetext>Even better yet you could put the Firefox profile inside the Truecrypt volume.
Edit C:\Users\your\_name\AppData\Roaming\Mozilla\Firefox\profiles.ini to look something like this:

[General]
StartWithLastProfile=1

[Profile0]
Name=default
IsRelative=0
Path=F:\Firefox\Profiles\pg4u527p.default

In this case the F: drive was the mounted Truecrypt drive with the path to the Firefox profile.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056174</id>
	<title>Re:Simple</title>
	<author>cptdondo</author>
	<datestamp>1257873900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Yabbuttt....</p><p>I use the same password for everything, true.  Except that I run the phrase through babelfish, so all I need to remember is "phrase"+"language".  I could post my passwords and still be somewhat secure; unless you can figure out which language I used and what capitalization schema I used you're out of luck.</p><p>And with a bit of menmonics, you can come up with a language phrase that's easy to remember, but utterly unguessable to a stranger.</p></htmltext>
<tokenext>Yabbuttt....I use the same password for everything , true .
Except that I run the phrase through babelfish , so all I need to remember is " phrase " + " language " .
I could post my passwords and still be somewhat secure ; unless you can figure out which language I used and what capitalization schema I used you 're out of luck.And with a bit of menmonics , you can come up with a language phrase that 's easy to remember , but utterly unguessable to a stranger .</tokentext>
<sentencetext>Yabbuttt....I use the same password for everything, true.
Except that I run the phrase through babelfish, so all I need to remember is "phrase"+"language".
I could post my passwords and still be somewhat secure; unless you can figure out which language I used and what capitalization schema I used you're out of luck.And with a bit of menmonics, you can come up with a language phrase that's easy to remember, but utterly unguessable to a stranger.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055420</id>
	<title>fine print</title>
	<author>Tablizer</author>
	<datestamp>1257868380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I would tell you, but then I'd have to kill you.</p></htmltext>
<tokenext>I would tell you , but then I 'd have to kill you .</tokentext>
<sentencetext>I would tell you, but then I'd have to kill you.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056142</id>
	<title>Re:.l3375p34k.</title>
	<author>CaptainTux</author>
	<datestamp>1257873600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Oooh, I like this technique</htmltext>
<tokenext>Oooh , I like this technique</tokentext>
<sentencetext>Oooh, I like this technique</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056070</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055488</id>
	<title>you could try some online password managers...</title>
	<author>roubles</author>
	<datestamp>1257868800000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><a href="http://www.passpack.com/en/home/" title="passpack.com" rel="nofollow">http://www.passpack.com/en/home/</a> [passpack.com] <br>
<a href="http://www.clipperz.com/" title="clipperz.com" rel="nofollow">http://www.clipperz.com/</a> [clipperz.com] <br>
<a href="https://lastpass.com/" title="lastpass.com" rel="nofollow">https://lastpass.com/</a> [lastpass.com]</htmltext>
<tokenext>http : //www.passpack.com/en/home/ [ passpack.com ] http : //www.clipperz.com/ [ clipperz.com ] https : //lastpass.com/ [ lastpass.com ]</tokentext>
<sentencetext>http://www.passpack.com/en/home/ [passpack.com] 
http://www.clipperz.com/ [clipperz.com] 
https://lastpass.com/ [lastpass.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054506</id>
	<title>Use your head and quit your bitching.</title>
	<author>Anonymous</author>
	<datestamp>1257863580000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p>You underestimate the capacity of a human brain to store information.</p></htmltext>
<tokenext>You underestimate the capacity of a human brain to store information .</tokentext>
<sentencetext>You underestimate the capacity of a human brain to store information.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778</id>
	<title>Prepended or Appended Passphrase</title>
	<author>codermotor</author>
	<datestamp>1257864780000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>Create a passphrase which you prepend or append to every important password. Don't divulge that passphrase to any but the most trusted (spouse, family attorney, etc.).</p><p>Keep a list of passwords sans the passphrase in a safe but accessible place in case you forget one. If someone finds that list, it'll do them little good since not only will they not know the passphrase, neither will they even know it exists.</p><p>I'm assuming you have no state secrets or other seekrit stuff which may be intimidated out of you by other means (pliers, electrodes, etc.).</p></htmltext>
<tokenext>Create a passphrase which you prepend or append to every important password .
Do n't divulge that passphrase to any but the most trusted ( spouse , family attorney , etc .
) .Keep a list of passwords sans the passphrase in a safe but accessible place in case you forget one .
If someone finds that list , it 'll do them little good since not only will they not know the passphrase , neither will they even know it exists.I 'm assuming you have no state secrets or other seekrit stuff which may be intimidated out of you by other means ( pliers , electrodes , etc .
) .</tokentext>
<sentencetext>Create a passphrase which you prepend or append to every important password.
Don't divulge that passphrase to any but the most trusted (spouse, family attorney, etc.
).Keep a list of passwords sans the passphrase in a safe but accessible place in case you forget one.
If someone finds that list, it'll do them little good since not only will they not know the passphrase, neither will they even know it exists.I'm assuming you have no state secrets or other seekrit stuff which may be intimidated out of you by other means (pliers, electrodes, etc.
).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057034</id>
	<title>Lastpass</title>
	<author>mattmatt</author>
	<datestamp>1257882480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Use Lastpass. Works cross-browser, cross-operating-system, the passwords sync automagically between computers, but the encryption's all done client-side.</htmltext>
<tokenext>Use Lastpass .
Works cross-browser , cross-operating-system , the passwords sync automagically between computers , but the encryption 's all done client-side .</tokentext>
<sentencetext>Use Lastpass.
Works cross-browser, cross-operating-system, the passwords sync automagically between computers, but the encryption's all done client-side.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065114</id>
	<title>Try the Billeo Password Assistant</title>
	<author>Billeo</author>
	<datestamp>1257067440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>It's a nice slick little web app. Works like Roboform, but it is completely free. Stores your passwords on your machine and encrypts them using AES 128-bit encryption technology.</htmltext>
<tokenext>It 's a nice slick little web app .
Works like Roboform , but it is completely free .
Stores your passwords on your machine and encrypts them using AES 128-bit encryption technology .</tokentext>
<sentencetext>It's a nice slick little web app.
Works like Roboform, but it is completely free.
Stores your passwords on your machine and encrypts them using AES 128-bit encryption technology.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058718</id>
	<title>Re:.l3375p34k.</title>
	<author>selven</author>
	<datestamp>1257081780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I pick a simple easy-to-remember password and when I type it in I switch the keyboard layout to Dvorak. So "hunter2" becomes "dgby.p2".</p></htmltext>
<tokenext>I pick a simple easy-to-remember password and when I type it in I switch the keyboard layout to Dvorak .
So " hunter2 " becomes " dgby.p2 " .</tokentext>
<sentencetext>I pick a simple easy-to-remember password and when I type it in I switch the keyboard layout to Dvorak.
So "hunter2" becomes "dgby.p2".</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056070</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061952</id>
	<title>Put hints in the bookmark to the site</title>
	<author>ImprovOmega</author>
	<datestamp>1257098100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Generate about 4-5 good, strong passwords, memorize them thoroughly, then come up with 4-5 variations (symbol substitution, case flipping, increments the numbers, anything really), then put a hint to the password number and variation in the bookmark text.

Like, for gmail have the bookmark name read something like:

GMail - P1VC

For password 1, variation on capitals.  I use a system similar to this and I haven't had a problem in years.  Though, I do keep a few copies of my bookmarks file lying around because otherwise I am most hosed.  You just have to make sure that no one ever has a chance to get your actual passwords, nor share any of the variations ever, but it seemed to me to be the most reasonably secure and simple method.</htmltext>
<tokenext>Generate about 4-5 good , strong passwords , memorize them thoroughly , then come up with 4-5 variations ( symbol substitution , case flipping , increments the numbers , anything really ) , then put a hint to the password number and variation in the bookmark text .
Like , for gmail have the bookmark name read something like : GMail - P1VC For password 1 , variation on capitals .
I use a system similar to this and I have n't had a problem in years .
Though , I do keep a few copies of my bookmarks file lying around because otherwise I am most hosed .
You just have to make sure that no one ever has a chance to get your actual passwords , nor share any of the variations ever , but it seemed to me to be the most reasonably secure and simple method .</tokentext>
<sentencetext>Generate about 4-5 good, strong passwords, memorize them thoroughly, then come up with 4-5 variations (symbol substitution, case flipping, increments the numbers, anything really), then put a hint to the password number and variation in the bookmark text.
Like, for gmail have the bookmark name read something like:

GMail - P1VC

For password 1, variation on capitals.
I use a system similar to this and I haven't had a problem in years.
Though, I do keep a few copies of my bookmarks file lying around because otherwise I am most hosed.
You just have to make sure that no one ever has a chance to get your actual passwords, nor share any of the variations ever, but it seemed to me to be the most reasonably secure and simple method.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063130</id>
	<title>Use hashing algorithms</title>
	<author>kleinesRaedchen</author>
	<datestamp>1257103080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I created a small shell tool for myself.

I'm entering some characters and the tool performs a incremental search in a file containing login identifiers (e.g. kleinesRaedchen@slashdot.org).

Then it asks for a master password.

At its core the tool creates a login specific password like this:
<p>
<tt>
PASSWD=`echo "${login}${masterpasswd}"  |
    openssl dgst -ripemd160 -binary | openssl dgst -sha1 -binary |
    openssl base64 | head --bytes 8`
</tt>
</p><p>
The password is stored in the KDE klipper for 20 seconds afterwards.</p></htmltext>
<tokenext>I created a small shell tool for myself .
I 'm entering some characters and the tool performs a incremental search in a file containing login identifiers ( e.g .
kleinesRaedchen @ slashdot.org ) . Then it asks for a master password .
At its core the tool creates a login specific password like this : PASSWD = ` echo " $ { login } $ { masterpasswd } " | openssl dgst -ripemd160 -binary | openssl dgst -sha1 -binary | openssl base64 | head --bytes 8 ` The password is stored in the KDE klipper for 20 seconds afterwards .</tokentext>
<sentencetext>I created a small shell tool for myself.
I'm entering some characters and the tool performs a incremental search in a file containing login identifiers (e.g.
kleinesRaedchen@slashdot.org).

Then it asks for a master password.
At its core the tool creates a login specific password like this:


PASSWD=`echo "${login}${masterpasswd}"  |
    openssl dgst -ripemd160 -binary | openssl dgst -sha1 -binary |
    openssl base64 | head --bytes 8`


The password is stored in the KDE klipper for 20 seconds afterwards.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064476</id>
	<title>Manual encryption on paper</title>
	<author>AlejoHausner</author>
	<datestamp>1257107760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Here's a low-tech solution:</p><p>1. Memorize a single 10-digit number, which will be your master passphrase (eg 1234567890).</p><p>2. Keep all your passwords, encrypted with this passphrase, written on paper in your wallet, as follows:<br>
&nbsp; &nbsp; &nbsp; write down the true password on a scrap piece of paper.<br>
&nbsp; &nbsp; &nbsp; &nbsp; eg: augur4</p><p>3.  subtract one passphrase digit from each password character:<br>
&nbsp; &nbsp; &nbsp; &nbsp; a - 1 = z (wrap around the alphabet)<br>
&nbsp; &nbsp; &nbsp; &nbsp; u - 2 = s<br>
&nbsp; &nbsp; &nbsp; &nbsp; g - 3 = d<br>
&nbsp; &nbsp; &nbsp; &nbsp; u - 4 = q<br>
&nbsp; &nbsp; &nbsp; &nbsp; r - 5 = l<br>
&nbsp; &nbsp; &nbsp; &nbsp; 4 - 6 = 8 (wrap around 0 back to 8)</p><p>4. Keep the result in your wallet: zsdql8, next to the name of the website you need it for.</p><p>5. Burn or eat or compost the scrap of paper.</p><p>This has several advantages:<br>- addition can be done in your head: look at zsql8, and it's not too hard to reconstruct augur4 without using a temporary piece of paper.<br>- if someone steals your wallet, they'll need your 10-digit passphrase.<br>- you don't need internet access or a USB key to recall your ATM's PIN.</p><p>Alejo</p></htmltext>
<tokenext>Here 's a low-tech solution : 1 .
Memorize a single 10-digit number , which will be your master passphrase ( eg 1234567890 ) .2 .
Keep all your passwords , encrypted with this passphrase , written on paper in your wallet , as follows :       write down the true password on a scrap piece of paper .
        eg : augur43 .
subtract one passphrase digit from each password character :         a - 1 = z ( wrap around the alphabet )         u - 2 = s         g - 3 = d         u - 4 = q         r - 5 = l         4 - 6 = 8 ( wrap around 0 back to 8 ) 4 .
Keep the result in your wallet : zsdql8 , next to the name of the website you need it for.5 .
Burn or eat or compost the scrap of paper.This has several advantages : - addition can be done in your head : look at zsql8 , and it 's not too hard to reconstruct augur4 without using a temporary piece of paper.- if someone steals your wallet , they 'll need your 10-digit passphrase.- you do n't need internet access or a USB key to recall your ATM 's PIN.Alejo</tokentext>
<sentencetext>Here's a low-tech solution:1.
Memorize a single 10-digit number, which will be your master passphrase (eg 1234567890).2.
Keep all your passwords, encrypted with this passphrase, written on paper in your wallet, as follows:
      write down the true password on a scrap piece of paper.
        eg: augur43.
subtract one passphrase digit from each password character:
        a - 1 = z (wrap around the alphabet)
        u - 2 = s
        g - 3 = d
        u - 4 = q
        r - 5 = l
        4 - 6 = 8 (wrap around 0 back to 8)4.
Keep the result in your wallet: zsdql8, next to the name of the website you need it for.5.
Burn or eat or compost the scrap of paper.This has several advantages:- addition can be done in your head: look at zsql8, and it's not too hard to reconstruct augur4 without using a temporary piece of paper.- if someone steals your wallet, they'll need your 10-digit passphrase.- you don't need internet access or a USB key to recall your ATM's PIN.Alejo</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054760</id>
	<title>I use</title>
	<author>Anonymous</author>
	<datestamp>1257864660000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>1password for Mac OS X.  Wait you meant for Linux, right?</p><p>This isn't my locker...</p></htmltext>
<tokenext>1password for Mac OS X. Wait you meant for Linux , right ? This is n't my locker.. .</tokentext>
<sentencetext>1password for Mac OS X.  Wait you meant for Linux, right?This isn't my locker...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055316</id>
	<title>Re:Keepass</title>
	<author>bigal123</author>
	<datestamp>1257867780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Don't forget that Keepass 2.x series is cross platform compatible via Mono running  "Windows 98, 98SE, ME, 2000, XP, 2003, Vista, 7, Mono (Linux, Mac OS X, BSD,<nobr> <wbr></nobr>...)"

<a href="http://keepass.info/compare.html" title="keepass.info" rel="nofollow">http://keepass.info/compare.html</a> [keepass.info]</htmltext>
<tokenext>Do n't forget that Keepass 2.x series is cross platform compatible via Mono running " Windows 98 , 98SE , ME , 2000 , XP , 2003 , Vista , 7 , Mono ( Linux , Mac OS X , BSD , ... ) " http : //keepass.info/compare.html [ keepass.info ]</tokentext>
<sentencetext>Don't forget that Keepass 2.x series is cross platform compatible via Mono running  "Windows 98, 98SE, ME, 2000, XP, 2003, Vista, 7, Mono (Linux, Mac OS X, BSD, ...)"

http://keepass.info/compare.html [keepass.info]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061020</id>
	<title>I've tried this on OS X</title>
	<author>foniksonik</author>
	<datestamp>1257094440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>With OS X the best way I've tried is to store the built-in Keychain app profile on a USB drive. This can be inserted into any Mac (though most of the system passwords won't work there) and opened via the master password by importing the profile.</p><p>It is of course encrypted and you can set all kinds of policies for individual account/password credentials. It has support for Certs, accounts of all types as well as manually created entries for things like ATM/Credit cards, etc.</p><p>The downside for you of course may be that it only works on a Mac but others may find this useful - or you can look for something comparable.</p><p>You can find details about this at <a href="http://www.macosxhints.com/article.php?story=20030523192222638&amp;query=keychain+usb" title="macosxhints.com">Mac OS X Hints</a> [macosxhints.com].</p></htmltext>
<tokenext>With OS X the best way I 've tried is to store the built-in Keychain app profile on a USB drive .
This can be inserted into any Mac ( though most of the system passwords wo n't work there ) and opened via the master password by importing the profile.It is of course encrypted and you can set all kinds of policies for individual account/password credentials .
It has support for Certs , accounts of all types as well as manually created entries for things like ATM/Credit cards , etc.The downside for you of course may be that it only works on a Mac but others may find this useful - or you can look for something comparable.You can find details about this at Mac OS X Hints [ macosxhints.com ] .</tokentext>
<sentencetext>With OS X the best way I've tried is to store the built-in Keychain app profile on a USB drive.
This can be inserted into any Mac (though most of the system passwords won't work there) and opened via the master password by importing the profile.It is of course encrypted and you can set all kinds of policies for individual account/password credentials.
It has support for Certs, accounts of all types as well as manually created entries for things like ATM/Credit cards, etc.The downside for you of course may be that it only works on a Mac but others may find this useful - or you can look for something comparable.You can find details about this at Mac OS X Hints [macosxhints.com].</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054704</id>
	<title>Revelation + PasswordSafe</title>
	<author>talcite</author>
	<datestamp>1257864420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use a split solution.
<br> <br>
On my desktop running Gnome, I use revelation. It has a handy applet you can add to the gnome toolbar.
<br> <br>
You can export your password file to something compatible with PasswordSafe and then do a USB key install on it. Since the file is encrypted, you don't need to worry about people getting access to your accounts if you lose the USB key.</htmltext>
<tokenext>I use a split solution .
On my desktop running Gnome , I use revelation .
It has a handy applet you can add to the gnome toolbar .
You can export your password file to something compatible with PasswordSafe and then do a USB key install on it .
Since the file is encrypted , you do n't need to worry about people getting access to your accounts if you lose the USB key .</tokentext>
<sentencetext>I use a split solution.
On my desktop running Gnome, I use revelation.
It has a handy applet you can add to the gnome toolbar.
You can export your password file to something compatible with PasswordSafe and then do a USB key install on it.
Since the file is encrypted, you don't need to worry about people getting access to your accounts if you lose the USB key.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056560</id>
	<title>RoboForm Online or RoboForm2Go</title>
	<author>GT-Force</author>
	<datestamp>1257877920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="https://online.roboform.com/" title="roboform.com" rel="nofollow">https://online.roboform.com/</a> [roboform.com]

<a href="http://www.roboform.com/pass2go.html" title="roboform.com" rel="nofollow">http://www.roboform.com/pass2go.html</a> [roboform.com]</htmltext>
<tokenext>https : //online.roboform.com/ [ roboform.com ] http : //www.roboform.com/pass2go.html [ roboform.com ]</tokentext>
<sentencetext>https://online.roboform.com/ [roboform.com]

http://www.roboform.com/pass2go.html [roboform.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055412</id>
	<title>be secure</title>
	<author>kaoshin</author>
	<datestamp>1257868320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Blackberry password keeper for low security passwords.  High security keypass and ironkey.  Top secret stays in my brain.  When captured by the enemy, I will only state my username and a/s/l.</htmltext>
<tokenext>Blackberry password keeper for low security passwords .
High security keypass and ironkey .
Top secret stays in my brain .
When captured by the enemy , I will only state my username and a/s/l .</tokentext>
<sentencetext>Blackberry password keeper for low security passwords.
High security keypass and ironkey.
Top secret stays in my brain.
When captured by the enemy, I will only state my username and a/s/l.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056134</id>
	<title>1Password</title>
	<author>geckopelli</author>
	<datestamp>1257873540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Been using 1Password (agilewebsolutions.com) for several months - nifty browser integration, iPhone app, more portability options.</htmltext>
<tokenext>Been using 1Password ( agilewebsolutions.com ) for several months - nifty browser integration , iPhone app , more portability options .</tokentext>
<sentencetext>Been using 1Password (agilewebsolutions.com) for several months - nifty browser integration, iPhone app, more portability options.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057184</id>
	<title>Re:Use your head and quit your bitching.</title>
	<author>Anonymous</author>
	<datestamp>1257106740000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I prefer the female anatomy approach, H1llaryClintonhasaCavernousv@g1n@</p></htmltext>
<tokenext>I prefer the female anatomy approach , H1llaryClintonhasaCavernousv @ g1n @</tokentext>
<sentencetext>I prefer the female anatomy approach, H1llaryClintonhasaCavernousv@g1n@</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054506</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058262</id>
	<title>KeePassX</title>
	<author>Anonymous</author>
	<datestamp>1257076500000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>KeePassX works for me. On a USB stick. Password or certificate protected.<br>You should be able to have multiple binaries on the USB stick for each OS you need to work on.</p></htmltext>
<tokenext>KeePassX works for me .
On a USB stick .
Password or certificate protected.You should be able to have multiple binaries on the USB stick for each OS you need to work on .</tokentext>
<sentencetext>KeePassX works for me.
On a USB stick.
Password or certificate protected.You should be able to have multiple binaries on the USB stick for each OS you need to work on.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054628</id>
	<title>Re:Keepass</title>
	<author>Chewbode</author>
	<datestamp>1257864120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I agree. Been using KeePass and Password Safe (both OSS) for years now. Prefer KeePass, but both are great if you keep the database file on a flash drive.</htmltext>
<tokenext>I agree .
Been using KeePass and Password Safe ( both OSS ) for years now .
Prefer KeePass , but both are great if you keep the database file on a flash drive .</tokentext>
<sentencetext>I agree.
Been using KeePass and Password Safe (both OSS) for years now.
Prefer KeePass, but both are great if you keep the database file on a flash drive.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055208</id>
	<title>www.secretserveronline.com</title>
	<author>jrbirdman</author>
	<datestamp>1257867120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>It's secure. It's online. It stores more than just passwords. And it's free.  'nuf said.</htmltext>
<tokenext>It 's secure .
It 's online .
It stores more than just passwords .
And it 's free .
'nuf said .</tokentext>
<sentencetext>It's secure.
It's online.
It stores more than just passwords.
And it's free.
'nuf said.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054794</id>
	<title>Re:Keepass</title>
	<author>Areyoukiddingme</author>
	<datestamp>1257864840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>No mod points, so posting.  Keepass is the last password manager you'll ever need.  Keepass 2 can even sync with a server via scp, with the appropriate plugin.  Yes, it supports plugins.</p></htmltext>
<tokenext>No mod points , so posting .
Keepass is the last password manager you 'll ever need .
Keepass 2 can even sync with a server via scp , with the appropriate plugin .
Yes , it supports plugins .</tokentext>
<sentencetext>No mod points, so posting.
Keepass is the last password manager you'll ever need.
Keepass 2 can even sync with a server via scp, with the appropriate plugin.
Yes, it supports plugins.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055570</id>
	<title>Lastpass</title>
	<author>Anonymous</author>
	<datestamp>1257869400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use Lastpass (www.lastpass.com).  Supported by multiple browers, operating systems, and iPhones.</p></htmltext>
<tokenext>I use Lastpass ( www.lastpass.com ) .
Supported by multiple browers , operating systems , and iPhones .</tokentext>
<sentencetext>I use Lastpass (www.lastpass.com).
Supported by multiple browers, operating systems, and iPhones.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054548</id>
	<title>Easiest one is...</title>
	<author>JimboFBX</author>
	<datestamp>1257863880000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>Memorize an e-mail address and change the @ to a '2'. Instantly you have a 14 - 20 character password.

Use a shorter 8 character password with a number you can rotate on for sites you dont necessarily trust (i.e. where an administrator could potentially google your username or e-mail and try out your password at other web sites)</htmltext>
<tokenext>Memorize an e-mail address and change the @ to a '2' .
Instantly you have a 14 - 20 character password .
Use a shorter 8 character password with a number you can rotate on for sites you dont necessarily trust ( i.e .
where an administrator could potentially google your username or e-mail and try out your password at other web sites )</tokentext>
<sentencetext>Memorize an e-mail address and change the @ to a '2'.
Instantly you have a 14 - 20 character password.
Use a shorter 8 character password with a number you can rotate on for sites you dont necessarily trust (i.e.
where an administrator could potentially google your username or e-mail and try out your password at other web sites)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056790</id>
	<title>Use Firefox!</title>
	<author>Anonymous</author>
	<datestamp>1257879780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Firefox Preferences --&gt; Security --&gt; Use master password</p></htmltext>
<tokenext>Firefox Preferences -- &gt; Security -- &gt; Use master password</tokentext>
<sentencetext>Firefox Preferences --&gt; Security --&gt; Use master password</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055176</id>
	<title>Magic Password generator...</title>
	<author>haelduksf</author>
	<datestamp>1257866940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If you check the <a href="http://bookmarklets.arantius.com/password+maker+bookmarklet" title="arantius.com" rel="nofollow">website</a> [arantius.com] for magic password generator, you'll find a bookmarklet and a form that are browser- and os-agnostic, that comes up with the same passwords the plugin does.</htmltext>
<tokenext>If you check the website [ arantius.com ] for magic password generator , you 'll find a bookmarklet and a form that are browser- and os-agnostic , that comes up with the same passwords the plugin does .</tokentext>
<sentencetext>If you check the website [arantius.com] for magic password generator, you'll find a bookmarklet and a form that are browser- and os-agnostic, that comes up with the same passwords the plugin does.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058450</id>
	<title>Re:Prepended or Appended Passphrase</title>
	<author>fmonteiro</author>
	<datestamp>1257078960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>i do something similar:</p><p>i have a 3 level password list,</p><p>1st (xxxxxxxxxx) for most purposes like sites that require login, where they collect non personal compromising information<br>2nd (yyyyyyyyyy) sites that collect personal information, email, home banking<br>3rd (zzzzzzzzzz) my home server</p><p>(you could get a forth for home banking or use the 3rd for such matter)</p><p>i only need to remember these 3 passwords (i make new password regularly),<br>so far not completely bad but not really good either</p><p>then, i add to the password a combination that varies with the hosting site, like this:</p><p>service: gmail<br>user: someUser<br>password combination:<br>
&nbsp; &nbsp; &nbsp; &nbsp; - 1st non vocal on service: g<br>
&nbsp; &nbsp; &nbsp; &nbsp; - last vocal on user: e<br>
&nbsp; &nbsp; &nbsp; &nbsp; - last non vocal on user: r<br>
&nbsp; &nbsp; &nbsp; &nbsp; - 1st vocal on service: a<br>
&nbsp; &nbsp; &nbsp; &nbsp; - then i concatenate one of my three passwords according with the service</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; my password for this service would be: gerayyyyyyyyyy or: gyeyyyyyyyyrya if you prefer to scramble it more</p><p>you could make your own combination algorithm,<br>mine's not exactly this either<nobr> <wbr></nobr>;)</p><p>you only need to know:<br>
&nbsp; &nbsp; &nbsp; &nbsp; - 3 passwords,<br>
&nbsp; &nbsp; &nbsp; &nbsp; - one simple algorithm (keep it simple, it's human power that will run the algorithm)<br>
&nbsp; &nbsp; &nbsp; &nbsp; - the service and user, which you needed any way</p></htmltext>
<tokenext>i do something similar : i have a 3 level password list,1st ( xxxxxxxxxx ) for most purposes like sites that require login , where they collect non personal compromising information2nd ( yyyyyyyyyy ) sites that collect personal information , email , home banking3rd ( zzzzzzzzzz ) my home server ( you could get a forth for home banking or use the 3rd for such matter ) i only need to remember these 3 passwords ( i make new password regularly ) ,so far not completely bad but not really good eitherthen , i add to the password a combination that varies with the hosting site , like this : service : gmailuser : someUserpassword combination :         - 1st non vocal on service : g         - last vocal on user : e         - last non vocal on user : r         - 1st vocal on service : a         - then i concatenate one of my three passwords according with the service         my password for this service would be : gerayyyyyyyyyy or : gyeyyyyyyyyrya if you prefer to scramble it moreyou could make your own combination algorithm,mine 's not exactly this either ; ) you only need to know :         - 3 passwords ,         - one simple algorithm ( keep it simple , it 's human power that will run the algorithm )         - the service and user , which you needed any way</tokentext>
<sentencetext>i do something similar:i have a 3 level password list,1st (xxxxxxxxxx) for most purposes like sites that require login, where they collect non personal compromising information2nd (yyyyyyyyyy) sites that collect personal information, email, home banking3rd (zzzzzzzzzz) my home server(you could get a forth for home banking or use the 3rd for such matter)i only need to remember these 3 passwords (i make new password regularly),so far not completely bad but not really good eitherthen, i add to the password a combination that varies with the hosting site, like this:service: gmailuser: someUserpassword combination:
        - 1st non vocal on service: g
        - last vocal on user: e
        - last non vocal on user: r
        - 1st vocal on service: a
        - then i concatenate one of my three passwords according with the service
        my password for this service would be: gerayyyyyyyyyy or: gyeyyyyyyyyrya if you prefer to scramble it moreyou could make your own combination algorithm,mine's not exactly this either ;)you only need to know:
        - 3 passwords,
        - one simple algorithm (keep it simple, it's human power that will run the algorithm)
        - the service and user, which you needed any way</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058910</id>
	<title>Universal Password Manager</title>
	<author>Anonymous</author>
	<datestamp>1257083460000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>How about Universal Password Manager, http://sourceforge.net/projects/upm/. It's written in Java and comes packaged as a Windows Installer/Mac DMG/tar.gz. It's as basic as you'll get in terms of a password manager but that's what I wanted. It does what it's meant to do and nothing else.</p><p>Disclaimer: I wrote UPM.</p></htmltext>
<tokenext>How about Universal Password Manager , http : //sourceforge.net/projects/upm/ .
It 's written in Java and comes packaged as a Windows Installer/Mac DMG/tar.gz .
It 's as basic as you 'll get in terms of a password manager but that 's what I wanted .
It does what it 's meant to do and nothing else.Disclaimer : I wrote UPM .</tokentext>
<sentencetext>How about Universal Password Manager, http://sourceforge.net/projects/upm/.
It's written in Java and comes packaged as a Windows Installer/Mac DMG/tar.gz.
It's as basic as you'll get in terms of a password manager but that's what I wanted.
It does what it's meant to do and nothing else.Disclaimer: I wrote UPM.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061470</id>
	<title>XMarks!</title>
	<author>golem00</author>
	<datestamp>1257096240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>XMarks works with Firefox, IE, Chrome and Safari (xmarks.com).   Even though it was originally intended to allow portability of Bookmarks, it works great with passwords.   And you can store your passwords at the XMarks site (encrypted) or use your own server.</htmltext>
<tokenext>XMarks works with Firefox , IE , Chrome and Safari ( xmarks.com ) .
Even though it was originally intended to allow portability of Bookmarks , it works great with passwords .
And you can store your passwords at the XMarks site ( encrypted ) or use your own server .</tokentext>
<sentencetext>XMarks works with Firefox, IE, Chrome and Safari (xmarks.com).
Even though it was originally intended to allow portability of Bookmarks, it works great with passwords.
And you can store your passwords at the XMarks site (encrypted) or use your own server.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30151246</id>
	<title>Re:paper in your wallet</title>
	<author>psithurism</author>
	<datestamp>1257082380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Which also points out 1 flaw in this system: You need to keep a backup in case your wallet is stolen. That backup is vulnerable as well.<br> <br>Despite this, I'll admit I use this system, and have found a  second flaw: Password lists can get out of sync, not only from one another, but also because you may have to change a password in circumstances that don't permit you to write it down (shoulder surfing for example).</htmltext>
<tokenext>Which also points out 1 flaw in this system : You need to keep a backup in case your wallet is stolen .
That backup is vulnerable as well .
Despite this , I 'll admit I use this system , and have found a second flaw : Password lists can get out of sync , not only from one another , but also because you may have to change a password in circumstances that do n't permit you to write it down ( shoulder surfing for example ) .</tokentext>
<sentencetext>Which also points out 1 flaw in this system: You need to keep a backup in case your wallet is stolen.
That backup is vulnerable as well.
Despite this, I'll admit I use this system, and have found a  second flaw: Password lists can get out of sync, not only from one another, but also because you may have to change a password in circumstances that don't permit you to write it down (shoulder surfing for example).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063962</id>
	<title>Usability first</title>
	<author>GuerreroDelInterfaz</author>
	<datestamp>1257105960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The best way is to design a system *yourself* so nobody else knows it.</p><p>I have that kind of system myself but, if I tell you what it is, it will then less secure (very much so on<nobr> <wbr></nobr>/.)...</p><p>So...</p><p>Anyway, I'll give you some tips.</p><p>Think of the things that you have no problem remembering. If these they are easy to find (like in a dictionary), design some combination that would not. Among those, select the ones that could be found elsewhere if your memory fails. From these select the ones easier to use and/or to consult elsewhere. Design some indexing method that will allow *you* to find them easily from these available sources. Store these indexes the way that is more convenient for you.</p><p>An example that I \_do\_not\_ use and that's worse than the one I use: Bible quotes. Bibles are available almost everywhere. Long ones have good resistance to brute force. And the indexing is already done for you. You just have to design some basic encryption method for the index (the method depends on the storing method: simpe rotation for hand-written, as complex as you like if store on a computer: you can write a prgram to do that) and store the index in some place (the piece of paper in the wallet, some text file on your computer, whatever is more secure for your case).</p><p>In any case, you should design something that is easy to use \_for\_you\_ or you'll end up using some other less secure but more usable system.</p><p>Ah, and don't use the example I described as now it's already known...</p><p>--<br>El Guerrero del Interfaz</p></htmltext>
<tokenext>The best way is to design a system * yourself * so nobody else knows it.I have that kind of system myself but , if I tell you what it is , it will then less secure ( very much so on / .
) ...So...Anyway , I 'll give you some tips.Think of the things that you have no problem remembering .
If these they are easy to find ( like in a dictionary ) , design some combination that would not .
Among those , select the ones that could be found elsewhere if your memory fails .
From these select the ones easier to use and/or to consult elsewhere .
Design some indexing method that will allow * you * to find them easily from these available sources .
Store these indexes the way that is more convenient for you.An example that I \ _do \ _not \ _ use and that 's worse than the one I use : Bible quotes .
Bibles are available almost everywhere .
Long ones have good resistance to brute force .
And the indexing is already done for you .
You just have to design some basic encryption method for the index ( the method depends on the storing method : simpe rotation for hand-written , as complex as you like if store on a computer : you can write a prgram to do that ) and store the index in some place ( the piece of paper in the wallet , some text file on your computer , whatever is more secure for your case ) .In any case , you should design something that is easy to use \ _for \ _you \ _ or you 'll end up using some other less secure but more usable system.Ah , and do n't use the example I described as now it 's already known...--El Guerrero del Interfaz</tokentext>
<sentencetext>The best way is to design a system *yourself* so nobody else knows it.I have that kind of system myself but, if I tell you what it is, it will then less secure (very much so on /.
)...So...Anyway, I'll give you some tips.Think of the things that you have no problem remembering.
If these they are easy to find (like in a dictionary), design some combination that would not.
Among those, select the ones that could be found elsewhere if your memory fails.
From these select the ones easier to use and/or to consult elsewhere.
Design some indexing method that will allow *you* to find them easily from these available sources.
Store these indexes the way that is more convenient for you.An example that I \_do\_not\_ use and that's worse than the one I use: Bible quotes.
Bibles are available almost everywhere.
Long ones have good resistance to brute force.
And the indexing is already done for you.
You just have to design some basic encryption method for the index (the method depends on the storing method: simpe rotation for hand-written, as complex as you like if store on a computer: you can write a prgram to do that) and store the index in some place (the piece of paper in the wallet, some text file on your computer, whatever is more secure for your case).In any case, you should design something that is easy to use \_for\_you\_ or you'll end up using some other less secure but more usable system.Ah, and don't use the example I described as now it's already known...--El Guerrero del Interfaz</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061692</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>Anonymous</author>
	<datestamp>1257097020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Until you get a Roomba with WIFI.</p><p>Bwa-hah-hah</p></htmltext>
<tokenext>Until you get a Roomba with WIFI.Bwa-hah-hah</tokentext>
<sentencetext>Until you get a Roomba with WIFI.Bwa-hah-hah</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054610</id>
	<title>Opera Password Manager</title>
	<author>ya really</author>
	<datestamp>1257864060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Opera stores multiple passwords for sites (like say if you have a few gmails). Unlike normally with most built in password managers, Opera allows you to set a master password that prompts you to enter it before it'll show your current passwords for a website. It works sort of like this:<br> <br>

Opera does not store its Master Password in the plaintext format. Moreover, Opera doesn't even store its hash. The developers have chosen a different route: the password along with the salt participates in the encryption of a portion of data and then, to check the validity of the password, it uses the decrypted data hash and the original salt value.
<br> <br>
source: <a href="http://www.passcape.com/choosing\_master\_password\_decryption\_method.htm" title="passcape.com">http://www.passcape.com/choosing\_master\_password\_decryption\_method.htm</a> [passcape.com]</htmltext>
<tokenext>Opera stores multiple passwords for sites ( like say if you have a few gmails ) .
Unlike normally with most built in password managers , Opera allows you to set a master password that prompts you to enter it before it 'll show your current passwords for a website .
It works sort of like this : Opera does not store its Master Password in the plaintext format .
Moreover , Opera does n't even store its hash .
The developers have chosen a different route : the password along with the salt participates in the encryption of a portion of data and then , to check the validity of the password , it uses the decrypted data hash and the original salt value .
source : http : //www.passcape.com/choosing \ _master \ _password \ _decryption \ _method.htm [ passcape.com ]</tokentext>
<sentencetext>Opera stores multiple passwords for sites (like say if you have a few gmails).
Unlike normally with most built in password managers, Opera allows you to set a master password that prompts you to enter it before it'll show your current passwords for a website.
It works sort of like this: 

Opera does not store its Master Password in the plaintext format.
Moreover, Opera doesn't even store its hash.
The developers have chosen a different route: the password along with the salt participates in the encryption of a portion of data and then, to check the validity of the password, it uses the decrypted data hash and the original salt value.
source: http://www.passcape.com/choosing\_master\_password\_decryption\_method.htm [passcape.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055728</id>
	<title>RoboForm?</title>
	<author>TavisJohn</author>
	<datestamp>1257870540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use RoboForm.  I have a master PW to protect all my passwords, it will auto-fill websites if I wish it to.  (Preventing Keyloggers from being able to log the data)</p><p>It has a portable app so I can put it on a flashdrive.</p><p>I can copy the data to my netbook from my gaming machine.</p><p>It works great with IE, Maxthon, Chromium (the RF flavor of Chrome), and FireFox.</p><p>You can manually look up passwords, it has a PW generator, and a notes function to keep track of other important data.</p><p>Check it out: <a href="http://www.roboform.com/" title="roboform.com" rel="nofollow">http://www.roboform.com/</a> [roboform.com]</p></htmltext>
<tokenext>I use RoboForm .
I have a master PW to protect all my passwords , it will auto-fill websites if I wish it to .
( Preventing Keyloggers from being able to log the data ) It has a portable app so I can put it on a flashdrive.I can copy the data to my netbook from my gaming machine.It works great with IE , Maxthon , Chromium ( the RF flavor of Chrome ) , and FireFox.You can manually look up passwords , it has a PW generator , and a notes function to keep track of other important data.Check it out : http : //www.roboform.com/ [ roboform.com ]</tokentext>
<sentencetext>I use RoboForm.
I have a master PW to protect all my passwords, it will auto-fill websites if I wish it to.
(Preventing Keyloggers from being able to log the data)It has a portable app so I can put it on a flashdrive.I can copy the data to my netbook from my gaming machine.It works great with IE, Maxthon, Chromium (the RF flavor of Chrome), and FireFox.You can manually look up passwords, it has a PW generator, and a notes function to keep track of other important data.Check it out: http://www.roboform.com/ [roboform.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064294</id>
	<title>Echo: 1password</title>
	<author>nilbog</author>
	<datestamp>1257107160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>1password is by far the best solution available for this.  I've seen some other people say it, but i wanted to echo how great it is.  On the security side, it uses 128 bit AES encryption.  You can find more information on their security here: <a href="http://help.agile.ws/1Password3/agile\_keychain\_design.html" title="agile.ws">http://help.agile.ws/1Password3/agile\_keychain\_design.html</a> [agile.ws] - basically it would take eleventy billion years to crack into your password database.</p><p>1Password also offers direct browser integration with all major browsers.  It's so good that I'll only use a browser if 1password supports it.  It also comes with tools like a password generator and a place to store secured notes (which is where I keep all my software registration keys, etc.).  Bottom line is I couldn't live without 1password.</p><p>All that said, I still commit my bank password to memory and do not store it in 1password or anywhere else.</p></htmltext>
<tokenext>1password is by far the best solution available for this .
I 've seen some other people say it , but i wanted to echo how great it is .
On the security side , it uses 128 bit AES encryption .
You can find more information on their security here : http : //help.agile.ws/1Password3/agile \ _keychain \ _design.html [ agile.ws ] - basically it would take eleventy billion years to crack into your password database.1Password also offers direct browser integration with all major browsers .
It 's so good that I 'll only use a browser if 1password supports it .
It also comes with tools like a password generator and a place to store secured notes ( which is where I keep all my software registration keys , etc. ) .
Bottom line is I could n't live without 1password.All that said , I still commit my bank password to memory and do not store it in 1password or anywhere else .</tokentext>
<sentencetext>1password is by far the best solution available for this.
I've seen some other people say it, but i wanted to echo how great it is.
On the security side, it uses 128 bit AES encryption.
You can find more information on their security here: http://help.agile.ws/1Password3/agile\_keychain\_design.html [agile.ws] - basically it would take eleventy billion years to crack into your password database.1Password also offers direct browser integration with all major browsers.
It's so good that I'll only use a browser if 1password supports it.
It also comes with tools like a password generator and a place to store secured notes (which is where I keep all my software registration keys, etc.).
Bottom line is I couldn't live without 1password.All that said, I still commit my bank password to memory and do not store it in 1password or anywhere else.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056776</id>
	<title>create a password equation</title>
	<author>Warmlight</author>
	<datestamp>1257879660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The way I handle passwords is I developed and code based on the name of whatever I am assigning the password to.  That way you don't have to remember a hundred different passwords, just one code.  Use different indicators such as colors, letters and numbers based on the item. Ex.  gmail password =5GLmai   the password is 5 for the number of letters, first and last letter together capitalized, then the middle letters together lowercase.</htmltext>
<tokenext>The way I handle passwords is I developed and code based on the name of whatever I am assigning the password to .
That way you do n't have to remember a hundred different passwords , just one code .
Use different indicators such as colors , letters and numbers based on the item .
Ex. gmail password = 5GLmai the password is 5 for the number of letters , first and last letter together capitalized , then the middle letters together lowercase .</tokentext>
<sentencetext>The way I handle passwords is I developed and code based on the name of whatever I am assigning the password to.
That way you don't have to remember a hundred different passwords, just one code.
Use different indicators such as colors, letters and numbers based on the item.
Ex.  gmail password =5GLmai   the password is 5 for the number of letters, first and last letter together capitalized, then the middle letters together lowercase.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055068</id>
	<title>An Open Source, Platform Agnostic Alternative!</title>
	<author>hsteck\_ylf</author>
	<datestamp>1257866340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>PasswordMaker.org has a solution that allows you to create passwords using a number of options and hashing algorithms. You use one (or a few) main passwords and then hash those with something specific about the program/application/website you are creating the unique and strong password for. The hash is a repeatable process so long as you can remember the options and password you used to generate it.

There are executables, web applications and embedded source code at their site and it is an open source solution. You are not tied to any particular device or program and can create the hashes from any machine in the world.</htmltext>
<tokenext>PasswordMaker.org has a solution that allows you to create passwords using a number of options and hashing algorithms .
You use one ( or a few ) main passwords and then hash those with something specific about the program/application/website you are creating the unique and strong password for .
The hash is a repeatable process so long as you can remember the options and password you used to generate it .
There are executables , web applications and embedded source code at their site and it is an open source solution .
You are not tied to any particular device or program and can create the hashes from any machine in the world .</tokentext>
<sentencetext>PasswordMaker.org has a solution that allows you to create passwords using a number of options and hashing algorithms.
You use one (or a few) main passwords and then hash those with something specific about the program/application/website you are creating the unique and strong password for.
The hash is a repeatable process so long as you can remember the options and password you used to generate it.
There are executables, web applications and embedded source code at their site and it is an open source solution.
You are not tied to any particular device or program and can create the hashes from any machine in the world.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</id>
	<title>PassGorithm - One Algorithm, infinite passwords</title>
	<author>abdielillo</author>
	<datestamp>1257867420000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>I invented this method and has worked for me perfectly since then. What I did was to develop an algorithm by which I can reconstruct my passwords based on the website or account.

For example:
1) Take the first letter on the website name
     eg : slashdot = 's'
2) Count letters in the website name:
     eg : slashdot = '6'
3) Count the vowels
     eg : slashdot = '2'
4) Take the last letter
     eg : slashdot = 't'
5) Add and underscore and a keyword in common to the end of the 4 previous characters
     eg : 's62t\_w00t'


Here's another example with google.com
1) 'g'
2) '3'
3) '3'
4) 'e'
5) 'g33e\_w00t'


Be creative with the rules... like for example, if its a bank account, make all letters UPPERCASE.


Hope this helps.


Note: the above example is not my PassGorithm<nobr> <wbr></nobr>:D</htmltext>
<tokenext>I invented this method and has worked for me perfectly since then .
What I did was to develop an algorithm by which I can reconstruct my passwords based on the website or account .
For example : 1 ) Take the first letter on the website name eg : slashdot = 's ' 2 ) Count letters in the website name : eg : slashdot = '6 ' 3 ) Count the vowels eg : slashdot = '2 ' 4 ) Take the last letter eg : slashdot = 't ' 5 ) Add and underscore and a keyword in common to the end of the 4 previous characters eg : 's62t \ _w00t ' Here 's another example with google.com 1 ) 'g ' 2 ) '3 ' 3 ) '3 ' 4 ) 'e ' 5 ) 'g33e \ _w00t ' Be creative with the rules... like for example , if its a bank account , make all letters UPPERCASE .
Hope this helps .
Note : the above example is not my PassGorithm : D</tokentext>
<sentencetext>I invented this method and has worked for me perfectly since then.
What I did was to develop an algorithm by which I can reconstruct my passwords based on the website or account.
For example:
1) Take the first letter on the website name
     eg : slashdot = 's'
2) Count letters in the website name:
     eg : slashdot = '6'
3) Count the vowels
     eg : slashdot = '2'
4) Take the last letter
     eg : slashdot = 't'
5) Add and underscore and a keyword in common to the end of the 4 previous characters
     eg : 's62t\_w00t'


Here's another example with google.com
1) 'g'
2) '3'
3) '3'
4) 'e'
5) 'g33e\_w00t'


Be creative with the rules... like for example, if its a bank account, make all letters UPPERCASE.
Hope this helps.
Note: the above example is not my PassGorithm :D</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057804</id>
	<title>Exile</title>
	<author>Taojin</author>
	<datestamp>1257071100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Been using Exile ( <a href="http://www.codeproject.com/KB/applications/Exile.aspx" title="codeproject.com" rel="nofollow">http://www.codeproject.com/KB/applications/Exile.aspx</a> [codeproject.com] ) since a couple of years and it's been of great help. Only have to remember 1 hard password now<nobr> <wbr></nobr>:)</htmltext>
<tokenext>Been using Exile ( http : //www.codeproject.com/KB/applications/Exile.aspx [ codeproject.com ] ) since a couple of years and it 's been of great help .
Only have to remember 1 hard password now : )</tokentext>
<sentencetext>Been using Exile ( http://www.codeproject.com/KB/applications/Exile.aspx [codeproject.com] ) since a couple of years and it's been of great help.
Only have to remember 1 hard password now :)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057946</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>u.hertlein</author>
	<datestamp>1257073320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>I invented this method and has worked for me perfectly since then. What I did was to develop an algorithm by which I can reconstruct my passwords based on the website or account.</p></div><p>This is security through obscurity: you're relying on the algorithm being kept secret.</p><p>That being said, I used to do this as well for a while but started to move critical passwords away from it.
Now I store them in my iPod instead, which has the drawback that I have no idea how I can recover my passwords when it dies.  There are backups but no idea if I can actually get at the data.  It would be useful to export them (as text or CSV) and encrypt that with GPG.</p></div>
	</htmltext>
<tokenext>I invented this method and has worked for me perfectly since then .
What I did was to develop an algorithm by which I can reconstruct my passwords based on the website or account.This is security through obscurity : you 're relying on the algorithm being kept secret.That being said , I used to do this as well for a while but started to move critical passwords away from it .
Now I store them in my iPod instead , which has the drawback that I have no idea how I can recover my passwords when it dies .
There are backups but no idea if I can actually get at the data .
It would be useful to export them ( as text or CSV ) and encrypt that with GPG .</tokentext>
<sentencetext>I invented this method and has worked for me perfectly since then.
What I did was to develop an algorithm by which I can reconstruct my passwords based on the website or account.This is security through obscurity: you're relying on the algorithm being kept secret.That being said, I used to do this as well for a while but started to move critical passwords away from it.
Now I store them in my iPod instead, which has the drawback that I have no idea how I can recover my passwords when it dies.
There are backups but no idea if I can actually get at the data.
It would be useful to export them (as text or CSV) and encrypt that with GPG.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</id>
	<title>Simple</title>
	<author>Anonymous</author>
	<datestamp>1257863640000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>Just use the same password for everything. I use "1234".. its the same as my luggage combo</p></htmltext>
<tokenext>Just use the same password for everything .
I use " 1234 " .. its the same as my luggage combo</tokentext>
<sentencetext>Just use the same password for everything.
I use "1234".. its the same as my luggage combo</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054694</id>
	<title>Do what everyone does</title>
	<author>Anonymous</author>
	<datestamp>1257864360000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext><p>Do what every idiot in my office does - use their name.</p><p>Sure, I try to change the password policy on the server, but of course management gets mad because they can't use "bill" to login and "bill" for a password.</p><p>Just this morning someone was all in a huff that there was an open document on their computer. Well, change the password retard, and logout at the end of the day.</p><p>BTW, I'm the sysadmin.</p><p>Seriously though, if you really can't remember, try using paper and pen in a very cryptic method so as to not shout "I'm a password list" or use a "base" password and addon specifics regarding the login site, for example, for facebook "billbook," for google, "billgoogle," you know, like the retards in my office.</p></htmltext>
<tokenext>Do what every idiot in my office does - use their name.Sure , I try to change the password policy on the server , but of course management gets mad because they ca n't use " bill " to login and " bill " for a password.Just this morning someone was all in a huff that there was an open document on their computer .
Well , change the password retard , and logout at the end of the day.BTW , I 'm the sysadmin.Seriously though , if you really ca n't remember , try using paper and pen in a very cryptic method so as to not shout " I 'm a password list " or use a " base " password and addon specifics regarding the login site , for example , for facebook " billbook , " for google , " billgoogle , " you know , like the retards in my office .</tokentext>
<sentencetext>Do what every idiot in my office does - use their name.Sure, I try to change the password policy on the server, but of course management gets mad because they can't use "bill" to login and "bill" for a password.Just this morning someone was all in a huff that there was an open document on their computer.
Well, change the password retard, and logout at the end of the day.BTW, I'm the sysadmin.Seriously though, if you really can't remember, try using paper and pen in a very cryptic method so as to not shout "I'm a password list" or use a "base" password and addon specifics regarding the login site, for example, for facebook "billbook," for google, "billgoogle," you know, like the retards in my office.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055710</id>
	<title>Re:Hashing Works</title>
	<author>PPH</author>
	<datestamp>1257870420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Let me guess: "oogleGay"</htmltext>
<tokenext>Let me guess : " oogleGay "</tokentext>
<sentencetext>Let me guess: "oogleGay"</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054564</id>
	<title>Plain-text on a different computer?</title>
	<author>Capsaicin</author>
	<datestamp>1257863880000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>If you have access to any other box, how about a plain-text file there?  Even a little security through obscurity (ie hidden file burried in the filesystem somewhere) would be better than letting Firefox automagically fill it in.
I guess you could always encrypt the file so you only have a single one you absolutely must remember (shades of <i>Flourish and Blott's</i> losing all those copies of the <i>Invisible Book of Invisibility</i> though).</p></htmltext>
<tokenext>If you have access to any other box , how about a plain-text file there ?
Even a little security through obscurity ( ie hidden file burried in the filesystem somewhere ) would be better than letting Firefox automagically fill it in .
I guess you could always encrypt the file so you only have a single one you absolutely must remember ( shades of Flourish and Blott 's losing all those copies of the Invisible Book of Invisibility though ) .</tokentext>
<sentencetext>If you have access to any other box, how about a plain-text file there?
Even a little security through obscurity (ie hidden file burried in the filesystem somewhere) would be better than letting Firefox automagically fill it in.
I guess you could always encrypt the file so you only have a single one you absolutely must remember (shades of Flourish and Blott's losing all those copies of the Invisible Book of Invisibility though).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055026</id>
	<title>Poems</title>
	<author>Anonymous</author>
	<datestamp>1257866160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Any poem or bible verse can be used as an acrostic to generate a password.  Here is one from the 23rd Psalm:</p><p>THHHHHYITTTTSa</p><p>Here is one from Hamlet's soliloquy:</p><p>HWTOANTTDTFWMT... etc.</p><p>You can also have a rule that says a number gets incorporated into them.  Like pi:</p><p>H3W1T4O1A5N9T2T6D5TFWMT</p></htmltext>
<tokenext>Any poem or bible verse can be used as an acrostic to generate a password .
Here is one from the 23rd Psalm : THHHHHYITTTTSaHere is one from Hamlet 's soliloquy : HWTOANTTDTFWMT... etc.You can also have a rule that says a number gets incorporated into them .
Like pi : H3W1T4O1A5N9T2T6D5TFWMT</tokentext>
<sentencetext>Any poem or bible verse can be used as an acrostic to generate a password.
Here is one from the 23rd Psalm:THHHHHYITTTTSaHere is one from Hamlet's soliloquy:HWTOANTTDTFWMT... etc.You can also have a rule that says a number gets incorporated into them.
Like pi:H3W1T4O1A5N9T2T6D5TFWMT</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30072040</id>
	<title>Re:paper in your wallet</title>
	<author>tpackert</author>
	<datestamp>1258038600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I found a nice free tool for this called PINS 4 by Mirek Wojtowicz.  I Wrote about it here <a href="http://opensourceitdad.blogspot.com/" title="blogspot.com" rel="nofollow">http://opensourceitdad.blogspot.com/</a> [blogspot.com]</p><p>I keep the program and the data file on my PC and the thumbdrive.  Its easy to use, Ctrl-F find the URL, CTRL-H launch the default browser, CTRL-Y paste the login ID and PW into the web page.</p><p>The only thing I wish it would do that it doesn't is to know which sites need IE so I can have Ctrl-H launch the browser needed for the site.</p></htmltext>
<tokenext>I found a nice free tool for this called PINS 4 by Mirek Wojtowicz .
I Wrote about it here http : //opensourceitdad.blogspot.com/ [ blogspot.com ] I keep the program and the data file on my PC and the thumbdrive .
Its easy to use , Ctrl-F find the URL , CTRL-H launch the default browser , CTRL-Y paste the login ID and PW into the web page.The only thing I wish it would do that it does n't is to know which sites need IE so I can have Ctrl-H launch the browser needed for the site .</tokentext>
<sentencetext>I found a nice free tool for this called PINS 4 by Mirek Wojtowicz.
I Wrote about it here http://opensourceitdad.blogspot.com/ [blogspot.com]I keep the program and the data file on my PC and the thumbdrive.
Its easy to use, Ctrl-F find the URL, CTRL-H launch the default browser, CTRL-Y paste the login ID and PW into the web page.The only thing I wish it would do that it doesn't is to know which sites need IE so I can have Ctrl-H launch the browser needed for the site.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067888</id>
	<title>Digital watch...</title>
	<author>Anonymous</author>
	<datestamp>1257082080000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>with storage is the best as far as I'm concerned. I used to keep passwords for several different mainframe accounts there. No worry about my watch being compromised.</p></htmltext>
<tokenext>with storage is the best as far as I 'm concerned .
I used to keep passwords for several different mainframe accounts there .
No worry about my watch being compromised .</tokentext>
<sentencetext>with storage is the best as far as I'm concerned.
I used to keep passwords for several different mainframe accounts there.
No worry about my watch being compromised.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058442</id>
	<title>Firefox...</title>
	<author>rossini138</author>
	<datestamp>1257078840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Allowing firefox to fill in the passwords for you is daft, but not if you use a master password. Then you only really need to remember that one password</htmltext>
<tokenext>Allowing firefox to fill in the passwords for you is daft , but not if you use a master password .
Then you only really need to remember that one password</tokentext>
<sentencetext>Allowing firefox to fill in the passwords for you is daft, but not if you use a master password.
Then you only really need to remember that one password</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057904</id>
	<title>Full Disk Encryption - good enough for most people</title>
	<author>Em Ellel</author>
	<datestamp>1257072720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Once you start using a full disk encryption solution like Truecrypt or others, all the "insecure" electronic methods you discussed suddenly become secure.</p></div><p>Amen to that - for what the original poster asked for, this is the best solution by far. Remember that passwords are not the only sensitive data on your drive - whole disk encryption will protect all of your data. Combine this with autolocking screensaver and some other basic security precautions (keep your OS up to date, never leave your computer unlocked, keep the FW up, don't load random software from internet without a sandbox, etc, etc) and you have a REASONABLE protection. Is it foolproof - no. THERE IS NO FOOLPROOF SECURITY. Security is a game of  "cost of intruding" vs "worth of data". As long as you keep the "cost of intruding" higher than the "worth of the data" - you are reasonably protected.</p><p>One catch though - last I checked Truecrypt does not support Linux for full OS disk encryption. There are other, less simple, but probably as secure (if not more) solutions for Linux.</p><p>Alternative to this is running PortableFirefox from an encrypted disk/usb/partition/file.</p><p>-Em</p></div>
	</htmltext>
<tokenext>Once you start using a full disk encryption solution like Truecrypt or others , all the " insecure " electronic methods you discussed suddenly become secure.Amen to that - for what the original poster asked for , this is the best solution by far .
Remember that passwords are not the only sensitive data on your drive - whole disk encryption will protect all of your data .
Combine this with autolocking screensaver and some other basic security precautions ( keep your OS up to date , never leave your computer unlocked , keep the FW up , do n't load random software from internet without a sandbox , etc , etc ) and you have a REASONABLE protection .
Is it foolproof - no .
THERE IS NO FOOLPROOF SECURITY .
Security is a game of " cost of intruding " vs " worth of data " .
As long as you keep the " cost of intruding " higher than the " worth of the data " - you are reasonably protected.One catch though - last I checked Truecrypt does not support Linux for full OS disk encryption .
There are other , less simple , but probably as secure ( if not more ) solutions for Linux.Alternative to this is running PortableFirefox from an encrypted disk/usb/partition/file.-Em</tokentext>
<sentencetext>Once you start using a full disk encryption solution like Truecrypt or others, all the "insecure" electronic methods you discussed suddenly become secure.Amen to that - for what the original poster asked for, this is the best solution by far.
Remember that passwords are not the only sensitive data on your drive - whole disk encryption will protect all of your data.
Combine this with autolocking screensaver and some other basic security precautions (keep your OS up to date, never leave your computer unlocked, keep the FW up, don't load random software from internet without a sandbox, etc, etc) and you have a REASONABLE protection.
Is it foolproof - no.
THERE IS NO FOOLPROOF SECURITY.
Security is a game of  "cost of intruding" vs "worth of data".
As long as you keep the "cost of intruding" higher than the "worth of the data" - you are reasonably protected.One catch though - last I checked Truecrypt does not support Linux for full OS disk encryption.
There are other, less simple, but probably as secure (if not more) solutions for Linux.Alternative to this is running PortableFirefox from an encrypted disk/usb/partition/file.-Em
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054882</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061684</id>
	<title>Fatal flaw</title>
	<author>Squirrel Killer</author>
	<datestamp>1257096960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Except that I run the phrase through babelfish, so all I need to remember is "phrase"+"language".  I could post my passwords and still be somewhat secure; unless you can figure out which language I used and what capitalization schema I used you're out of luck.</p></div><p>Works until they change the algorithm.</p></div>
	</htmltext>
<tokenext>Except that I run the phrase through babelfish , so all I need to remember is " phrase " + " language " .
I could post my passwords and still be somewhat secure ; unless you can figure out which language I used and what capitalization schema I used you 're out of luck.Works until they change the algorithm .</tokentext>
<sentencetext>Except that I run the phrase through babelfish, so all I need to remember is "phrase"+"language".
I could post my passwords and still be somewhat secure; unless you can figure out which language I used and what capitalization schema I used you're out of luck.Works until they change the algorithm.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056174</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</id>
	<title>Post-It Note on the Monitor</title>
	<author>Anonymous</author>
	<datestamp>1257864000000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>Post-It notes have the distinct advantage that no computer virus or Trojan can steal it.</p></htmltext>
<tokenext>Post-It notes have the distinct advantage that no computer virus or Trojan can steal it .</tokentext>
<sentencetext>Post-It notes have the distinct advantage that no computer virus or Trojan can steal it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057626</id>
	<title>The b word</title>
	<author>Anonymous</author>
	<datestamp>1257068820000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>BRAIN</p></htmltext>
<tokenext>BRAIN</tokentext>
<sentencetext>BRAIN</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056324</id>
	<title>PasswordMaker</title>
	<author>TwinkieStix</author>
	<datestamp>1257875520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>PasswordMaker is a great way to hash a master password with the URL of the website you are visiting.  You only need to remember one or a few master passwords and have access to PasswordMaker.  Passwordmaker supports several different hashing algorithyms as well as lots of other options, so you can customize the security of your passwords.</p><p>There's a firefox extension:<br><a href="https://addons.mozilla.org/en-US/firefox/addon/469" title="mozilla.org">https://addons.mozilla.org/en-US/firefox/addon/469</a> [mozilla.org]</p><p>There's an open source javascript passwordmaker for when you are on the road, it runs completely client side - and you can self-host it if you are paranoid:<br><a href="http://passwordmaker.org/passwordmaker.html" title="passwordmaker.org">http://passwordmaker.org/passwordmaker.html</a> [passwordmaker.org]</p><p>And, theres an Android app in the Market as well.</p></htmltext>
<tokenext>PasswordMaker is a great way to hash a master password with the URL of the website you are visiting .
You only need to remember one or a few master passwords and have access to PasswordMaker .
Passwordmaker supports several different hashing algorithyms as well as lots of other options , so you can customize the security of your passwords.There 's a firefox extension : https : //addons.mozilla.org/en-US/firefox/addon/469 [ mozilla.org ] There 's an open source javascript passwordmaker for when you are on the road , it runs completely client side - and you can self-host it if you are paranoid : http : //passwordmaker.org/passwordmaker.html [ passwordmaker.org ] And , theres an Android app in the Market as well .</tokentext>
<sentencetext>PasswordMaker is a great way to hash a master password with the URL of the website you are visiting.
You only need to remember one or a few master passwords and have access to PasswordMaker.
Passwordmaker supports several different hashing algorithyms as well as lots of other options, so you can customize the security of your passwords.There's a firefox extension:https://addons.mozilla.org/en-US/firefox/addon/469 [mozilla.org]There's an open source javascript passwordmaker for when you are on the road, it runs completely client side - and you can self-host it if you are paranoid:http://passwordmaker.org/passwordmaker.html [passwordmaker.org]And, theres an Android app in the Market as well.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057484</id>
	<title>Re:Simple</title>
	<author>pinkushun</author>
	<datestamp>1257067140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>To match minimum requirements, you need upper and lower case characters. Use Password1234.</p></htmltext>
<tokenext>To match minimum requirements , you need upper and lower case characters .
Use Password1234 .</tokentext>
<sentencetext>To match minimum requirements, you need upper and lower case characters.
Use Password1234.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054598</id>
	<title>Re:1password</title>
	<author>Jerry Rivers</author>
	<datestamp>1257864000000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>I'll second this. 1Password also works with both Safari and Firefox (and maybe others), allowing you to disable the browser's ability to remember passwords.  All you need to do is remember the master password.  It's an excellent utility for corporate environments too.</p></htmltext>
<tokenext>I 'll second this .
1Password also works with both Safari and Firefox ( and maybe others ) , allowing you to disable the browser 's ability to remember passwords .
All you need to do is remember the master password .
It 's an excellent utility for corporate environments too .</tokentext>
<sentencetext>I'll second this.
1Password also works with both Safari and Firefox (and maybe others), allowing you to disable the browser's ability to remember passwords.
All you need to do is remember the master password.
It's an excellent utility for corporate environments too.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054530</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056520</id>
	<title>Best solution for managing passwords</title>
	<author>hambela101</author>
	<datestamp>1257877620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="http://www.angel.net/~nic/passwd.html" title="angel.net" rel="nofollow">http://www.angel.net/~nic/passwd.html</a> [angel.net]</htmltext>
<tokenext>http : //www.angel.net/ ~ nic/passwd.html [ angel.net ]</tokentext>
<sentencetext>http://www.angel.net/~nic/passwd.html [angel.net]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057354</id>
	<title>Your phone</title>
	<author>jandersen</author>
	<datestamp>1257108780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Yeah, I know it sounds daft, and it is perhaps a rather naive scheme, but what I do is keep them on my mobile. That's mostly for PIN numbers, though; I store them as false telephone numbers. I don't use the socalled "secure" style of passwords, I write them too many times every day for that to work; I need something that is reasonably easy to type.</p></htmltext>
<tokenext>Yeah , I know it sounds daft , and it is perhaps a rather naive scheme , but what I do is keep them on my mobile .
That 's mostly for PIN numbers , though ; I store them as false telephone numbers .
I do n't use the socalled " secure " style of passwords , I write them too many times every day for that to work ; I need something that is reasonably easy to type .</tokentext>
<sentencetext>Yeah, I know it sounds daft, and it is perhaps a rather naive scheme, but what I do is keep them on my mobile.
That's mostly for PIN numbers, though; I store them as false telephone numbers.
I don't use the socalled "secure" style of passwords, I write them too many times every day for that to work; I need something that is reasonably easy to type.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057594</id>
	<title>Password Corral - Win32</title>
	<author>DNX Blandy</author>
	<datestamp>1257068400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use this for storing all my password, its simple and needs no install, meaning you can run it from a USB key!

Password Corral
<a href="http://www.cygnusproductions.com/freeware/pc.asp" title="cygnusproductions.com" rel="nofollow">http://www.cygnusproductions.com/freeware/pc.asp</a> [cygnusproductions.com]

With regards to getting around the path location issue, simply use . to tell the prog to look in current directory.</htmltext>
<tokenext>I use this for storing all my password , its simple and needs no install , meaning you can run it from a USB key !
Password Corral http : //www.cygnusproductions.com/freeware/pc.asp [ cygnusproductions.com ] With regards to getting around the path location issue , simply use .
to tell the prog to look in current directory .</tokentext>
<sentencetext>I use this for storing all my password, its simple and needs no install, meaning you can run it from a USB key!
Password Corral
http://www.cygnusproductions.com/freeware/pc.asp [cygnusproductions.com]

With regards to getting around the path location issue, simply use .
to tell the prog to look in current directory.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30140774</id>
	<title>Re:Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257107580000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>KeyPass seconded. I use it for my password needs (windows, linux and osx) and am very satisfied, the autotype feature is a real timesaver.</p><p>I my passdb is locked with a file and a password, so I need both to access it. And the db is spead across a number of locations.</p></htmltext>
<tokenext>KeyPass seconded .
I use it for my password needs ( windows , linux and osx ) and am very satisfied , the autotype feature is a real timesaver.I my passdb is locked with a file and a password , so I need both to access it .
And the db is spead across a number of locations .</tokentext>
<sentencetext>KeyPass seconded.
I use it for my password needs (windows, linux and osx) and am very satisfied, the autotype feature is a real timesaver.I my passdb is locked with a file and a password, so I need both to access it.
And the db is spead across a number of locations.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055958</id>
	<title>Roboform ... or</title>
	<author>Anonymous</author>
	<datestamp>1257871980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I personally like Roboform and install it to USB<nobr> <wbr></nobr>... although, I've increasingly been using a web-only product for public sites called myonelogin.com<nobr> <wbr></nobr>... seems pretty reasonable, but I'm a little nervous about storing passwords in the cloud.</p><p>Anyway, just adding my $.02</p></htmltext>
<tokenext>I personally like Roboform and install it to USB ... although , I 've increasingly been using a web-only product for public sites called myonelogin.com ... seems pretty reasonable , but I 'm a little nervous about storing passwords in the cloud.Anyway , just adding my $ .02</tokentext>
<sentencetext>I personally like Roboform and install it to USB ... although, I've increasingly been using a web-only product for public sites called myonelogin.com ... seems pretty reasonable, but I'm a little nervous about storing passwords in the cloud.Anyway, just adding my $.02</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30079464</id>
	<title>Re:Prepended or Appended Passphrase</title>
	<author>hmar</author>
	<datestamp>1258022280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Even better, make all those other passwords some sort of produce and write "grocery list" at the top..
best if written on the back of an envelope.</htmltext>
<tokenext>Even better , make all those other passwords some sort of produce and write " grocery list " at the top. . best if written on the back of an envelope .</tokentext>
<sentencetext>Even better, make all those other passwords some sort of produce and write "grocery list" at the top..
best if written on the back of an envelope.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054660</id>
	<title>Password Safe</title>
	<author>antic</author>
	<datestamp>1257864240000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>I have to track a lot of personal passwords and also 200+ passwords for client websites, emails, etc. I use Password Safe and recommend it:</p><p><a href="http://passwordsafe.sourceforge.net/" title="sourceforge.net">http://passwordsafe.sourceforge.net/</a> [sourceforge.net]</p><p>Hides when minimised and has a useful function that enables it to copy a password and minimise again when you double click a client name (i.e., if you need their main/default password). Quick and easy.</p><p>Used to have Filezilla set to remember client passwords until a PDF hole led to a bot stealing Filezilla's password store and auto-hacking a lot of sites that were a serious pain to clean up.</p></htmltext>
<tokenext>I have to track a lot of personal passwords and also 200 + passwords for client websites , emails , etc .
I use Password Safe and recommend it : http : //passwordsafe.sourceforge.net/ [ sourceforge.net ] Hides when minimised and has a useful function that enables it to copy a password and minimise again when you double click a client name ( i.e. , if you need their main/default password ) .
Quick and easy.Used to have Filezilla set to remember client passwords until a PDF hole led to a bot stealing Filezilla 's password store and auto-hacking a lot of sites that were a serious pain to clean up .</tokentext>
<sentencetext>I have to track a lot of personal passwords and also 200+ passwords for client websites, emails, etc.
I use Password Safe and recommend it:http://passwordsafe.sourceforge.net/ [sourceforge.net]Hides when minimised and has a useful function that enables it to copy a password and minimise again when you double click a client name (i.e., if you need their main/default password).
Quick and easy.Used to have Filezilla set to remember client passwords until a PDF hole led to a bot stealing Filezilla's password store and auto-hacking a lot of sites that were a serious pain to clean up.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054686</id>
	<title>All kinds of solutions that work, really ....</title>
	<author>King\_TJ</author>
	<datestamp>1257864360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've researched this one for my boss, as well as for personal use.  I agree that for Mac users, 1password isn't too bad a program.</p><p>If you want a *hardware* based solution, I've looked at Mandylion Labs' Password Manager before too.</p><p>Personally, I thought the Mandylion Labs solution was overkill for anything less than corporate use, though.  Its "strong points" are largely centered around an I.T. staff centrally administering password policies for the keyfob and so on.</p><p>Another basic, but potentially effective and useful solution is simply keeping track of your login info in a text document, but maintaining that document someplace like Google Docs.  Then, wherever there's Internet access, there's the ability to get to the document and it's platform-neutral.  No worries about a computer drive crash causing you to lose all your passwords either.</p></htmltext>
<tokenext>I 've researched this one for my boss , as well as for personal use .
I agree that for Mac users , 1password is n't too bad a program.If you want a * hardware * based solution , I 've looked at Mandylion Labs ' Password Manager before too.Personally , I thought the Mandylion Labs solution was overkill for anything less than corporate use , though .
Its " strong points " are largely centered around an I.T .
staff centrally administering password policies for the keyfob and so on.Another basic , but potentially effective and useful solution is simply keeping track of your login info in a text document , but maintaining that document someplace like Google Docs .
Then , wherever there 's Internet access , there 's the ability to get to the document and it 's platform-neutral .
No worries about a computer drive crash causing you to lose all your passwords either .</tokentext>
<sentencetext>I've researched this one for my boss, as well as for personal use.
I agree that for Mac users, 1password isn't too bad a program.If you want a *hardware* based solution, I've looked at Mandylion Labs' Password Manager before too.Personally, I thought the Mandylion Labs solution was overkill for anything less than corporate use, though.
Its "strong points" are largely centered around an I.T.
staff centrally administering password policies for the keyfob and so on.Another basic, but potentially effective and useful solution is simply keeping track of your login info in a text document, but maintaining that document someplace like Google Docs.
Then, wherever there's Internet access, there's the ability to get to the document and it's platform-neutral.
No worries about a computer drive crash causing you to lose all your passwords either.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054530</id>
	<title>1password</title>
	<author>excalibur313</author>
	<datestamp>1257863760000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>If you have a mac, definitely get 1password.  It encrypts all of your passwords in a database that is accessed via 1 password that temporarily unlocks it.  You can have it generate very long passwords on the fly too to make it very secure.  It stores passwords from all websites that can be recalled during a session by pressing apple+\ but it locks after a period of time where it asks for the master password.  You can also store secure notes, and keychains from applications.</htmltext>
<tokenext>If you have a mac , definitely get 1password .
It encrypts all of your passwords in a database that is accessed via 1 password that temporarily unlocks it .
You can have it generate very long passwords on the fly too to make it very secure .
It stores passwords from all websites that can be recalled during a session by pressing apple + \ but it locks after a period of time where it asks for the master password .
You can also store secure notes , and keychains from applications .</tokentext>
<sentencetext>If you have a mac, definitely get 1password.
It encrypts all of your passwords in a database that is accessed via 1 password that temporarily unlocks it.
You can have it generate very long passwords on the fly too to make it very secure.
It stores passwords from all websites that can be recalled during a session by pressing apple+\ but it locks after a period of time where it asks for the master password.
You can also store secure notes, and keychains from applications.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054800</id>
	<title>In  plain view</title>
	<author>MichaelSmith</author>
	<datestamp>1257864900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Looking around I can see lots of words and phrases, such as</p><ul><li>surface</li><li>mammoth</li><li>X Toolkit Intrinsics</li><li>exit</li><li>wsjp133 (the asset ID of my cube neighbors PC)</li><li>ADA 2005</li><li>Depression</li></ul><p><nobr> <wbr></nobr>...and so on. Remembering where your password can be seen is a good aid to memorising it. And if that doesn't work it is right there in front of you.</p></htmltext>
<tokenext>Looking around I can see lots of words and phrases , such assurfacemammothX Toolkit Intrinsicsexitwsjp133 ( the asset ID of my cube neighbors PC ) ADA 2005Depression ...and so on .
Remembering where your password can be seen is a good aid to memorising it .
And if that does n't work it is right there in front of you .</tokentext>
<sentencetext>Looking around I can see lots of words and phrases, such assurfacemammothX Toolkit Intrinsicsexitwsjp133 (the asset ID of my cube neighbors PC)ADA 2005Depression ...and so on.
Remembering where your password can be seen is a good aid to memorising it.
And if that doesn't work it is right there in front of you.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058214</id>
	<title>Re:Prepended or Appended Passphrase</title>
	<author>Anonymous</author>
	<datestamp>1257076080000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>This is exactly what I do.</p><p>For SUPER secure stuff, I use localized passwords. Login to my firewall at home? It's my password with the ISBN of a certain book in my bookshelf appended to it. I could NOT tell you what the password to that account is unless I was in that room.</p></htmltext>
<tokenext>This is exactly what I do.For SUPER secure stuff , I use localized passwords .
Login to my firewall at home ?
It 's my password with the ISBN of a certain book in my bookshelf appended to it .
I could NOT tell you what the password to that account is unless I was in that room .</tokentext>
<sentencetext>This is exactly what I do.For SUPER secure stuff, I use localized passwords.
Login to my firewall at home?
It's my password with the ISBN of a certain book in my bookshelf appended to it.
I could NOT tell you what the password to that account is unless I was in that room.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057682</id>
	<title>Re:Simple</title>
	<author>Anonymous</author>
	<datestamp>1257069480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I always use 0000, but keep the sequence secret.</p></htmltext>
<tokenext>I always use 0000 , but keep the sequence secret .</tokentext>
<sentencetext>I always use 0000, but keep the sequence secret.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055752</id>
	<title>Re:Hashing Works</title>
	<author>StickyWidget</author>
	<datestamp>1257870660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>That's a really really cool idea....  I never thought about doing that.  And once you have done it enough, you can probably do it within seconds.
<p>
~Sticky</p></htmltext>
<tokenext>That 's a really really cool idea.... I never thought about doing that .
And once you have done it enough , you can probably do it within seconds .
~ Sticky</tokentext>
<sentencetext>That's a really really cool idea....  I never thought about doing that.
And once you have done it enough, you can probably do it within seconds.
~Sticky</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055042</id>
	<title>Roboform - ubiquitous, multi-device viewable, easy</title>
	<author>Wizmon</author>
	<datestamp>1257866220000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>I've been using this for years. I've tried KeePass, 1Password, etc for weeks each, and kept coming back to Roboform. Roboform is MUCH better than any of these I've tried at filling forms easily/fast - not just passwords, but identity and credit card/payment information. My biggest complaint with it has always been syncing my encrypted roboform directory files between different machines - used live sync, sugarsync, etc - but now they do that also, with a free RoboForm Online account. Data still encrypted, but I can now get to it with my master password and any web browser. (Even dumb phones). PLUS - they've come out with clients for the iPhone. (Have had Palm, WinMobile, Blackberry, Symbian clients for quite awhile). I have full access to my codes, always synced, EVERYWHERE I go. Love it.

My final favorite use for this, in addition to the password vault, is for ALL my bookmarks. I got tired of syncing/restoring/losing bookmarks between different laptops, desktops, OSs, etc some time ago - so I now have thousands saved over the last several years into my Roboform repository. I save them (as well as passcards, etc) with a few extra keywords, and use the Roboform search window to very rapidly go to any website (and login if necessary), even when I can't remember exactly what the site was called - pull it up by subject/keyword. A major timesaver. Cost some $$, but not much, and well worth it.</htmltext>
<tokenext>I 've been using this for years .
I 've tried KeePass , 1Password , etc for weeks each , and kept coming back to Roboform .
Roboform is MUCH better than any of these I 've tried at filling forms easily/fast - not just passwords , but identity and credit card/payment information .
My biggest complaint with it has always been syncing my encrypted roboform directory files between different machines - used live sync , sugarsync , etc - but now they do that also , with a free RoboForm Online account .
Data still encrypted , but I can now get to it with my master password and any web browser .
( Even dumb phones ) .
PLUS - they 've come out with clients for the iPhone .
( Have had Palm , WinMobile , Blackberry , Symbian clients for quite awhile ) .
I have full access to my codes , always synced , EVERYWHERE I go .
Love it .
My final favorite use for this , in addition to the password vault , is for ALL my bookmarks .
I got tired of syncing/restoring/losing bookmarks between different laptops , desktops , OSs , etc some time ago - so I now have thousands saved over the last several years into my Roboform repository .
I save them ( as well as passcards , etc ) with a few extra keywords , and use the Roboform search window to very rapidly go to any website ( and login if necessary ) , even when I ca n't remember exactly what the site was called - pull it up by subject/keyword .
A major timesaver .
Cost some $ $ , but not much , and well worth it .</tokentext>
<sentencetext>I've been using this for years.
I've tried KeePass, 1Password, etc for weeks each, and kept coming back to Roboform.
Roboform is MUCH better than any of these I've tried at filling forms easily/fast - not just passwords, but identity and credit card/payment information.
My biggest complaint with it has always been syncing my encrypted roboform directory files between different machines - used live sync, sugarsync, etc - but now they do that also, with a free RoboForm Online account.
Data still encrypted, but I can now get to it with my master password and any web browser.
(Even dumb phones).
PLUS - they've come out with clients for the iPhone.
(Have had Palm, WinMobile, Blackberry, Symbian clients for quite awhile).
I have full access to my codes, always synced, EVERYWHERE I go.
Love it.
My final favorite use for this, in addition to the password vault, is for ALL my bookmarks.
I got tired of syncing/restoring/losing bookmarks between different laptops, desktops, OSs, etc some time ago - so I now have thousands saved over the last several years into my Roboform repository.
I save them (as well as passcards, etc) with a few extra keywords, and use the Roboform search window to very rapidly go to any website (and login if necessary), even when I can't remember exactly what the site was called - pull it up by subject/keyword.
A major timesaver.
Cost some $$, but not much, and well worth it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059500</id>
	<title>Password tools</title>
	<author>mike\_v</author>
	<datestamp>1257087900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've used everything from the slip of paper in the wallet to encrypted files on the pc.</p><p>My current choice is SplashID Desktop/iPhone</p><p>This app runs on the iPhone, Windows and Mac and syncs wireless between the iPhone and the desktop.</p><p>When I was carrying a Windows Mobile device I used Handy Desktop Safe that has a WM app so it was on the phone/PDA and the windows machine.</p><p>My criteria other than security (encryption) is that the tool work on multiple paltforms depending on the device that living in my pocket at the time.</p><p>I even had opne for my Palm Pilot back in the day.</p></htmltext>
<tokenext>I 've used everything from the slip of paper in the wallet to encrypted files on the pc.My current choice is SplashID Desktop/iPhoneThis app runs on the iPhone , Windows and Mac and syncs wireless between the iPhone and the desktop.When I was carrying a Windows Mobile device I used Handy Desktop Safe that has a WM app so it was on the phone/PDA and the windows machine.My criteria other than security ( encryption ) is that the tool work on multiple paltforms depending on the device that living in my pocket at the time.I even had opne for my Palm Pilot back in the day .</tokentext>
<sentencetext>I've used everything from the slip of paper in the wallet to encrypted files on the pc.My current choice is SplashID Desktop/iPhoneThis app runs on the iPhone, Windows and Mac and syncs wireless between the iPhone and the desktop.When I was carrying a Windows Mobile device I used Handy Desktop Safe that has a WM app so it was on the phone/PDA and the windows machine.My criteria other than security (encryption) is that the tool work on multiple paltforms depending on the device that living in my pocket at the time.I even had opne for my Palm Pilot back in the day.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065786</id>
	<title>Re:supergenpass</title>
	<author>nolifetillpleather</author>
	<datestamp>1257070800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The supergenpass bookmarklet runs its javascript in the DOM of the site you're trying to get your password to, so...</p><p>I'm still using it because I have a lot of sites set up with my SGP generated password, but I'm kind of concerned. Not sure how concerned I should be. Halp</p></htmltext>
<tokenext>The supergenpass bookmarklet runs its javascript in the DOM of the site you 're trying to get your password to , so...I 'm still using it because I have a lot of sites set up with my SGP generated password , but I 'm kind of concerned .
Not sure how concerned I should be .
Halp</tokentext>
<sentencetext>The supergenpass bookmarklet runs its javascript in the DOM of the site you're trying to get your password to, so...I'm still using it because I have a lot of sites set up with my SGP generated password, but I'm kind of concerned.
Not sure how concerned I should be.
Halp</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056102</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062872</id>
	<title>Dropbox + truecript + keepass x</title>
	<author>Neomusashi</author>
	<datestamp>1257102180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Ofcourse I' m one of those guys with multiple computers<nobr> <wbr></nobr>... . My personal laptop on which I work at home is a macbook pro. At work I have windows 7 pc. So my system has to be cross platfrom and synced at any time. Since I don' t want to use 2 password files I did the following.
I have a dropbox account (actually this is a amazon S3 storage service with AES encryption, you could also use evernote for that purpose) on which I placed a truecrypt file of about 50 mb encrypted with 3 encryption algorithms. In this file I have a keepassx file  with all my passwords. So I only need 2 passwords to remember. One for the keepassx file : ************** and one for the truecrypt volume: ************ .<nobr> <wbr></nobr>:) .

Another tip:
There is a keepass version for smartphones that can open keepassx files.</htmltext>
<tokenext>Ofcourse I ' m one of those guys with multiple computers ... . My personal laptop on which I work at home is a macbook pro .
At work I have windows 7 pc .
So my system has to be cross platfrom and synced at any time .
Since I don ' t want to use 2 password files I did the following .
I have a dropbox account ( actually this is a amazon S3 storage service with AES encryption , you could also use evernote for that purpose ) on which I placed a truecrypt file of about 50 mb encrypted with 3 encryption algorithms .
In this file I have a keepassx file with all my passwords .
So I only need 2 passwords to remember .
One for the keepassx file : * * * * * * * * * * * * * * and one for the truecrypt volume : * * * * * * * * * * * * .
: ) .
Another tip : There is a keepass version for smartphones that can open keepassx files .</tokentext>
<sentencetext>Ofcourse I' m one of those guys with multiple computers ... . My personal laptop on which I work at home is a macbook pro.
At work I have windows 7 pc.
So my system has to be cross platfrom and synced at any time.
Since I don' t want to use 2 password files I did the following.
I have a dropbox account (actually this is a amazon S3 storage service with AES encryption, you could also use evernote for that purpose) on which I placed a truecrypt file of about 50 mb encrypted with 3 encryption algorithms.
In this file I have a keepassx file  with all my passwords.
So I only need 2 passwords to remember.
One for the keepassx file : ************** and one for the truecrypt volume: ************ .
:) .
Another tip:
There is a keepass version for smartphones that can open keepassx files.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30070420</id>
	<title>PassPack</title>
	<author>Anonymous</author>
	<datestamp>1258019940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>passpack.com</p></htmltext>
<tokenext>passpack.com</tokentext>
<sentencetext>passpack.com</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055470</id>
	<title>Re:Hashing Works</title>
	<author>General Wesc</author>
	<datestamp>1257868740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've been looking for a viable hash for years. I can't perform an md5sum in my head.</p></htmltext>
<tokenext>I 've been looking for a viable hash for years .
I ca n't perform an md5sum in my head .</tokentext>
<sentencetext>I've been looking for a viable hash for years.
I can't perform an md5sum in my head.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055076</id>
	<title>sale:jordan 1-25,coach,ed hardy handbags,ugg</title>
	<author>coolforsale2010</author>
	<datestamp>1257866400000</datestamp>
	<modclass>Troll</modclass>
	<modscore>0</modscore>
	<htmltext>If you want to have a warm winter,you have to know Ugg boots.Ugg boots are &ldquo;must have &rdquo; nike air max jordan<nobr> <wbr></nobr>,shoes, caoch,gucci,lv,dg, ed hardy handbagsin the winter.Now here is an onlinestore , discount 30\%-50\% off,free shipping, you may take a look, you may find the UGGS you want here.
<a href="http://www.coolforsale.com/" title="coolforsale.com" rel="nofollow">http://www.coolforsale.com/</a> [coolforsale.com]
thanks...</htmltext>
<tokenext>If you want to have a warm winter,you have to know Ugg boots.Ugg boots are    must have    nike air max jordan ,shoes , caoch,gucci,lv,dg , ed hardy handbagsin the winter.Now here is an onlinestore , discount 30 \ % -50 \ % off,free shipping , you may take a look , you may find the UGGS you want here .
http : //www.coolforsale.com/ [ coolforsale.com ] thanks.. .</tokentext>
<sentencetext>If you want to have a warm winter,you have to know Ugg boots.Ugg boots are “must have ” nike air max jordan ,shoes, caoch,gucci,lv,dg, ed hardy handbagsin the winter.Now here is an onlinestore , discount 30\%-50\% off,free shipping, you may take a look, you may find the UGGS you want here.
http://www.coolforsale.com/ [coolforsale.com]
thanks...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055644</id>
	<title>Notational Velocity</title>
	<author>drewm1980</author>
	<datestamp>1257870000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use Notational Velocity.  It's open source, mac.  Make sure you turn on encryption.  I'm using version 1.1.1.  It's a minimalist application that was written for a user interface class at Northwestern University.  The design is as elegant as it could possibly be.</p><p><a href="http://notational.net/" title="notational.net" rel="nofollow">http://notational.net/</a> [notational.net]</p></htmltext>
<tokenext>I use Notational Velocity .
It 's open source , mac .
Make sure you turn on encryption .
I 'm using version 1.1.1 .
It 's a minimalist application that was written for a user interface class at Northwestern University .
The design is as elegant as it could possibly be.http : //notational.net/ [ notational.net ]</tokentext>
<sentencetext>I use Notational Velocity.
It's open source, mac.
Make sure you turn on encryption.
I'm using version 1.1.1.
It's a minimalist application that was written for a user interface class at Northwestern University.
The design is as elegant as it could possibly be.http://notational.net/ [notational.net]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056366</id>
	<title>Re:Hashing Works</title>
	<author>charlener</author>
	<datestamp>1257875940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Definitely the way to go - using l33t substitutes in some pattern you've decided also tends to very easily give you the non-alpha uc/lc numeric requirements of most passwords.</p><p>Though this doesn't help for when you have reset policies - as you'd have to remember to change all the passwords at once so you don't get horribly confused.</p><p>I'm assuming people are using bugmenot/mailinator for non-personally-necessary logins. The only unique accounts and passwords for me are ones for work/school or loans/banking. For online purchases I'd rather not set up an account as it's just one more place that has my stored financial information...</p></htmltext>
<tokenext>Definitely the way to go - using l33t substitutes in some pattern you 've decided also tends to very easily give you the non-alpha uc/lc numeric requirements of most passwords.Though this does n't help for when you have reset policies - as you 'd have to remember to change all the passwords at once so you do n't get horribly confused.I 'm assuming people are using bugmenot/mailinator for non-personally-necessary logins .
The only unique accounts and passwords for me are ones for work/school or loans/banking .
For online purchases I 'd rather not set up an account as it 's just one more place that has my stored financial information.. .</tokentext>
<sentencetext>Definitely the way to go - using l33t substitutes in some pattern you've decided also tends to very easily give you the non-alpha uc/lc numeric requirements of most passwords.Though this doesn't help for when you have reset policies - as you'd have to remember to change all the passwords at once so you don't get horribly confused.I'm assuming people are using bugmenot/mailinator for non-personally-necessary logins.
The only unique accounts and passwords for me are ones for work/school or loans/banking.
For online purchases I'd rather not set up an account as it's just one more place that has my stored financial information...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057444</id>
	<title>The old fashioned way...</title>
	<author>Sinn3d</author>
	<datestamp>1257066600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I memorize em... nuts I know, but it works.</htmltext>
<tokenext>I memorize em... nuts I know , but it works .</tokentext>
<sentencetext>I memorize em... nuts I know, but it works.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055514</id>
	<title>Multi-prong approach.</title>
	<author>jafo</author>
	<datestamp>1257868980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Crypto for the file-system.  Then store your less than critical passwords in firefox, and/or use a master password system to generate a unique password for each individual site based off a single password.  Really important passwords I store in a GPG encrypted file on this crypto partition.<br><br>Then I back this stuff up to a server that resides in a secure facility.<br><br>Works very well.<br><br>Sean</htmltext>
<tokenext>Crypto for the file-system .
Then store your less than critical passwords in firefox , and/or use a master password system to generate a unique password for each individual site based off a single password .
Really important passwords I store in a GPG encrypted file on this crypto partition.Then I back this stuff up to a server that resides in a secure facility.Works very well.Sean</tokentext>
<sentencetext>Crypto for the file-system.
Then store your less than critical passwords in firefox, and/or use a master password system to generate a unique password for each individual site based off a single password.
Really important passwords I store in a GPG encrypted file on this crypto partition.Then I back this stuff up to a server that resides in a secure facility.Works very well.Sean</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055000</id>
	<title>Re:Keepass</title>
	<author>Resident Netizen</author>
	<datestamp>1257865980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Another vote for keepass, but this time on a USB stick with Portable Apps-<br><a href="http://portableapps.com/" title="portableapps.com" rel="nofollow">http://portableapps.com/</a> [portableapps.com]</p></htmltext>
<tokenext>Another vote for keepass , but this time on a USB stick with Portable Apps-http : //portableapps.com/ [ portableapps.com ]</tokentext>
<sentencetext>Another vote for keepass, but this time on a USB stick with Portable Apps-http://portableapps.com/ [portableapps.com]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057334</id>
	<title>Password Gorilla</title>
	<author>streepje</author>
	<datestamp>1257108540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://www.fpx.de/fp/Software/Gorilla/" title="www.fpx.de" rel="nofollow">http://www.fpx.de/fp/Software/Gorilla/</a> [www.fpx.de]</p></htmltext>
<tokenext>http : //www.fpx.de/fp/Software/Gorilla/ [ www.fpx.de ]</tokentext>
<sentencetext>http://www.fpx.de/fp/Software/Gorilla/ [www.fpx.de]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055142</id>
	<title>Themed Passwords</title>
	<author>PrimaryConsult</author>
	<datestamp>1257866700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Anything that relies on anything outside of your head could cause problems if you are trying to access something on a guest system.  You could come up with a theme (similar to naming servers) for all of your passwords. Substitute in numbers/special characters/capitalization in a way that directly corresponds to how important what it is guarding is.  For example, a password to a forum could be "washington", while a password to a bank could be "r00$3v31t" (it is helpful if your theme is less obvious).  Provide a hint vaguely related to the theme (either with the built-in hint system or for a card in your wallet) to help you differentiate.  For example:<ul>
<li>the fourth sentence spoken in a movie (hint: actor from that movie but not the one who spoke that line) </li><li>the same phrase in different languages (hint: a person's name in that language) </li><li>fifth sentence on page 42 of a book (hint: the person who is the reason you read that book)</li></ul><p>
In this way every website has a different password, and not even your closest friends will be able to guess from the hint.  And so if a database is compromised or packets are sniffed while you are logging in, only the website in question is affected.  If you forget which of your many passwords goes with which site, the hint should help.  And if you completely forgot the password, you can look up based on the theme what the password is.</p><p>
If you are worried that the theme can be easily predicted from the sheet, you can use the position on the sheet of paper, feed it through a formula, and have the resulting number be a number used in determining the word or phrase.</p><p>
If you are less worried about accessing your stuff remotely, you could do something rudimentary like append what the password is for to the password, run it through crypt(), and use that.</p></htmltext>
<tokenext>Anything that relies on anything outside of your head could cause problems if you are trying to access something on a guest system .
You could come up with a theme ( similar to naming servers ) for all of your passwords .
Substitute in numbers/special characters/capitalization in a way that directly corresponds to how important what it is guarding is .
For example , a password to a forum could be " washington " , while a password to a bank could be " r00 $ 3v31t " ( it is helpful if your theme is less obvious ) .
Provide a hint vaguely related to the theme ( either with the built-in hint system or for a card in your wallet ) to help you differentiate .
For example : the fourth sentence spoken in a movie ( hint : actor from that movie but not the one who spoke that line ) the same phrase in different languages ( hint : a person 's name in that language ) fifth sentence on page 42 of a book ( hint : the person who is the reason you read that book ) In this way every website has a different password , and not even your closest friends will be able to guess from the hint .
And so if a database is compromised or packets are sniffed while you are logging in , only the website in question is affected .
If you forget which of your many passwords goes with which site , the hint should help .
And if you completely forgot the password , you can look up based on the theme what the password is .
If you are worried that the theme can be easily predicted from the sheet , you can use the position on the sheet of paper , feed it through a formula , and have the resulting number be a number used in determining the word or phrase .
If you are less worried about accessing your stuff remotely , you could do something rudimentary like append what the password is for to the password , run it through crypt ( ) , and use that .</tokentext>
<sentencetext>Anything that relies on anything outside of your head could cause problems if you are trying to access something on a guest system.
You could come up with a theme (similar to naming servers) for all of your passwords.
Substitute in numbers/special characters/capitalization in a way that directly corresponds to how important what it is guarding is.
For example, a password to a forum could be "washington", while a password to a bank could be "r00$3v31t" (it is helpful if your theme is less obvious).
Provide a hint vaguely related to the theme (either with the built-in hint system or for a card in your wallet) to help you differentiate.
For example:
the fourth sentence spoken in a movie (hint: actor from that movie but not the one who spoke that line) the same phrase in different languages (hint: a person's name in that language) fifth sentence on page 42 of a book (hint: the person who is the reason you read that book)
In this way every website has a different password, and not even your closest friends will be able to guess from the hint.
And so if a database is compromised or packets are sniffed while you are logging in, only the website in question is affected.
If you forget which of your many passwords goes with which site, the hint should help.
And if you completely forgot the password, you can look up based on the theme what the password is.
If you are worried that the theme can be easily predicted from the sheet, you can use the position on the sheet of paper, feed it through a formula, and have the resulting number be a number used in determining the word or phrase.
If you are less worried about accessing your stuff remotely, you could do something rudimentary like append what the password is for to the password, run it through crypt(), and use that.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059312</id>
	<title>Brains...</title>
	<author>Anonymous</author>
	<datestamp>1257086880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>My technique is pretty simple. My brain. To this point I have about 47 active passwords rattling around in there, uniquely.</p></htmltext>
<tokenext>My technique is pretty simple .
My brain .
To this point I have about 47 active passwords rattling around in there , uniquely .</tokentext>
<sentencetext>My technique is pretty simple.
My brain.
To this point I have about 47 active passwords rattling around in there, uniquely.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055974</id>
	<title>Firefox Master Password</title>
	<author>dokebi</author>
	<datestamp>1257872100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I'm surprised nobody has brought up firefox's (and thunderbird's) master password feature. I believe it uses strong encryption to store all your passwords. Since almost all of my passwords are for websites now a days, it's great. Of course, I also keep a backup in a gpg encrypted file.</htmltext>
<tokenext>I 'm surprised nobody has brought up firefox 's ( and thunderbird 's ) master password feature .
I believe it uses strong encryption to store all your passwords .
Since almost all of my passwords are for websites now a days , it 's great .
Of course , I also keep a backup in a gpg encrypted file .</tokentext>
<sentencetext>I'm surprised nobody has brought up firefox's (and thunderbird's) master password feature.
I believe it uses strong encryption to store all your passwords.
Since almost all of my passwords are for websites now a days, it's great.
Of course, I also keep a backup in a gpg encrypted file.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063092</id>
	<title>Encrypt the disk.</title>
	<author>Ungrounded Lightning</author>
	<datestamp>1257103020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Current linux versions are capable of encrypting the disk - files and swap - automatically.  (Ubuntu, for instance, can install this feature from the "alternate" install disk.)</p><p>Only the boot partition is in the clear.  Any passwords you stashed in Firefox's autocomplete mechanism are encrypted as well.  You have to issue the filesystem password to boot or to come out of hybernation etc.</p><p>With this in place the bad guy has to get your laptop while it's running and use it before it sleeps or whatever.  (Fancier attackers might be able to pull something out slightly longer - if they get to the RAM before the charge dissipates.)  Even if you're only using browser autocomplete passwords this gives your system (and ALL the files it contains) another layer of protection.</p><p>DON'T forget the password or all your files are gone forever.  Unlike commercial products there are no backup or backdoor passwords or challenge/response protocols.  The passphrase you use when installing is the only one there is.  Without it (or a cryptosystem crack) even the software has no way to decrypt your files.</p></htmltext>
<tokenext>Current linux versions are capable of encrypting the disk - files and swap - automatically .
( Ubuntu , for instance , can install this feature from the " alternate " install disk .
) Only the boot partition is in the clear .
Any passwords you stashed in Firefox 's autocomplete mechanism are encrypted as well .
You have to issue the filesystem password to boot or to come out of hybernation etc.With this in place the bad guy has to get your laptop while it 's running and use it before it sleeps or whatever .
( Fancier attackers might be able to pull something out slightly longer - if they get to the RAM before the charge dissipates .
) Even if you 're only using browser autocomplete passwords this gives your system ( and ALL the files it contains ) another layer of protection.DO N'T forget the password or all your files are gone forever .
Unlike commercial products there are no backup or backdoor passwords or challenge/response protocols .
The passphrase you use when installing is the only one there is .
Without it ( or a cryptosystem crack ) even the software has no way to decrypt your files .</tokentext>
<sentencetext>Current linux versions are capable of encrypting the disk - files and swap - automatically.
(Ubuntu, for instance, can install this feature from the "alternate" install disk.
)Only the boot partition is in the clear.
Any passwords you stashed in Firefox's autocomplete mechanism are encrypted as well.
You have to issue the filesystem password to boot or to come out of hybernation etc.With this in place the bad guy has to get your laptop while it's running and use it before it sleeps or whatever.
(Fancier attackers might be able to pull something out slightly longer - if they get to the RAM before the charge dissipates.
)  Even if you're only using browser autocomplete passwords this gives your system (and ALL the files it contains) another layer of protection.DON'T forget the password or all your files are gone forever.
Unlike commercial products there are no backup or backdoor passwords or challenge/response protocols.
The passphrase you use when installing is the only one there is.
Without it (or a cryptosystem crack) even the software has no way to decrypt your files.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055456</id>
	<title>Re:Hashing Works</title>
	<author>Anonymous</author>
	<datestamp>1257868680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>That is incredibly interesting and probably the best idea so far that is completely immune to physical access to the machine while still creating strong yet easy to remember passwords. +100 squirrelpoints (since I never log in and can't mod)</p></htmltext>
<tokenext>That is incredibly interesting and probably the best idea so far that is completely immune to physical access to the machine while still creating strong yet easy to remember passwords .
+ 100 squirrelpoints ( since I never log in and ca n't mod )</tokentext>
<sentencetext>That is incredibly interesting and probably the best idea so far that is completely immune to physical access to the machine while still creating strong yet easy to remember passwords.
+100 squirrelpoints (since I never log in and can't mod)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057998</id>
	<title>Try keepass</title>
	<author>known\_ID</author>
	<datestamp>1257073800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="http://keepass.info/" title="keepass.info" rel="nofollow">http://keepass.info/</a> [keepass.info] we use it at the company i work. It offers some safety in keeping your passwords together and secure.</htmltext>
<tokenext>http : //keepass.info/ [ keepass.info ] we use it at the company i work .
It offers some safety in keeping your passwords together and secure .</tokentext>
<sentencetext>http://keepass.info/ [keepass.info] we use it at the company i work.
It offers some safety in keeping your passwords together and secure.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055678</id>
	<title>I wrote one...</title>
	<author>BlueScreenOfTOM</author>
	<datestamp>1257870240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>For what it's worth, I wrote a password keeper app for myself a while back. I offer it on my website <a href="http://www.tomreich.com/?p=software" title="tomreich.com" rel="nofollow">here</a> [tomreich.com] if anyone is interested (first link). It's just a simple<nobr> <wbr></nobr>.NET winforms app, but I use the built-in support for AES to store the data using AES 256 bit encryption.

Probably better tools out there, but I felt like this is some pretty heavy data to trust to a random app I found on the internet, and I didn't want to have to sift through a bunch of code in a FOSS app to make sure my password file wasn't getting periodically sent to Russia. Of course by that logic you shouldn't trust me either, which is fine too<nobr> <wbr></nobr>:-)</htmltext>
<tokenext>For what it 's worth , I wrote a password keeper app for myself a while back .
I offer it on my website here [ tomreich.com ] if anyone is interested ( first link ) .
It 's just a simple .NET winforms app , but I use the built-in support for AES to store the data using AES 256 bit encryption .
Probably better tools out there , but I felt like this is some pretty heavy data to trust to a random app I found on the internet , and I did n't want to have to sift through a bunch of code in a FOSS app to make sure my password file was n't getting periodically sent to Russia .
Of course by that logic you should n't trust me either , which is fine too : - )</tokentext>
<sentencetext>For what it's worth, I wrote a password keeper app for myself a while back.
I offer it on my website here [tomreich.com] if anyone is interested (first link).
It's just a simple .NET winforms app, but I use the built-in support for AES to store the data using AES 256 bit encryption.
Probably better tools out there, but I felt like this is some pretty heavy data to trust to a random app I found on the internet, and I didn't want to have to sift through a bunch of code in a FOSS app to make sure my password file wasn't getting periodically sent to Russia.
Of course by that logic you shouldn't trust me either, which is fine too :-)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056184</id>
	<title>list passwords as a description or label</title>
	<author>Maione</author>
	<datestamp>1257874020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>All my accounts are in a notepad. Their corresponding passwords are labeled.
Like Work password, or e-mail password. For the passwords force changes I usually put a number in there and then I'll append + 1 or something on the text file. It doesn't give away where the number might be placed or what the password might be.</htmltext>
<tokenext>All my accounts are in a notepad .
Their corresponding passwords are labeled .
Like Work password , or e-mail password .
For the passwords force changes I usually put a number in there and then I 'll append + 1 or something on the text file .
It does n't give away where the number might be placed or what the password might be .</tokentext>
<sentencetext>All my accounts are in a notepad.
Their corresponding passwords are labeled.
Like Work password, or e-mail password.
For the passwords force changes I usually put a number in there and then I'll append + 1 or something on the text file.
It doesn't give away where the number might be placed or what the password might be.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055548</id>
	<title>PasswordsMax</title>
	<author>Anonymous</author>
	<datestamp>1257869280000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Great little program...have been using it for years. The developer, Vince Sorenson, is also wonderful to work with--very personal attention.</p></htmltext>
<tokenext>Great little program...have been using it for years .
The developer , Vince Sorenson , is also wonderful to work with--very personal attention .</tokentext>
<sentencetext>Great little program...have been using it for years.
The developer, Vince Sorenson, is also wonderful to work with--very personal attention.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057742</id>
	<title>Re:Truecrypt</title>
	<author>YourExperiment</author>
	<datestamp>1257070260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Simply create a Truecrypt volume and set up Firefox to store its profile there. Then you can let Firefox remember all your site passwords, safe in the knowledge that they're perfectly secure if your computer is stolen.</htmltext>
<tokenext>Simply create a Truecrypt volume and set up Firefox to store its profile there .
Then you can let Firefox remember all your site passwords , safe in the knowledge that they 're perfectly secure if your computer is stolen .</tokentext>
<sentencetext>Simply create a Truecrypt volume and set up Firefox to store its profile there.
Then you can let Firefox remember all your site passwords, safe in the knowledge that they're perfectly secure if your computer is stolen.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055034</id>
	<title>Re:Hashapass</title>
	<author>internic</author>
	<datestamp>1257866220000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>
Hashapass is a clever idea, but don't you run into the problem of various sites having different requirements for a valid password?
</p><p>
In my experience some sites want you to have a long passwords, others actually limit the length.  Some only allow alphanumeric characters, and others mandate the presence of a non-alphanumeric character.  Even worse, a lot of sites don't state clearly at the login prompt what their requirements are (you might need to fail once to see or even find it on another page), so doing an on-the-fly conversion of the password to the right form may still require you to remember which form they accept.  Actually, for me this is the hardest part about remembering my passwords for various sites.
</p></htmltext>
<tokenext>Hashapass is a clever idea , but do n't you run into the problem of various sites having different requirements for a valid password ?
In my experience some sites want you to have a long passwords , others actually limit the length .
Some only allow alphanumeric characters , and others mandate the presence of a non-alphanumeric character .
Even worse , a lot of sites do n't state clearly at the login prompt what their requirements are ( you might need to fail once to see or even find it on another page ) , so doing an on-the-fly conversion of the password to the right form may still require you to remember which form they accept .
Actually , for me this is the hardest part about remembering my passwords for various sites .</tokentext>
<sentencetext>
Hashapass is a clever idea, but don't you run into the problem of various sites having different requirements for a valid password?
In my experience some sites want you to have a long passwords, others actually limit the length.
Some only allow alphanumeric characters, and others mandate the presence of a non-alphanumeric character.
Even worse, a lot of sites don't state clearly at the login prompt what their requirements are (you might need to fail once to see or even find it on another page), so doing an on-the-fly conversion of the password to the right form may still require you to remember which form they accept.
Actually, for me this is the hardest part about remembering my passwords for various sites.
</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054526</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058230</id>
	<title>LastPass..</title>
	<author>Anonymous</author>
	<datestamp>1257076200000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use LastPass. Probably no different from many other password managers mentioned. Works well.</p></htmltext>
<tokenext>I use LastPass .
Probably no different from many other password managers mentioned .
Works well .</tokentext>
<sentencetext>I use LastPass.
Probably no different from many other password managers mentioned.
Works well.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058768</id>
	<title>Keepass and Dropbox = great success...</title>
	<author>legumes</author>
	<datestamp>1257082320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use Keepass and then sync the file to a dropbox folder, then I have access to it from outside too<nobr> <wbr></nobr>...<nobr> <wbr></nobr>:P</htmltext>
<tokenext>I use Keepass and then sync the file to a dropbox folder , then I have access to it from outside too ... : P</tokentext>
<sentencetext>I use Keepass and then sync the file to a dropbox folder, then I have access to it from outside too ... :P</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062374</id>
	<title>Re:Keepass</title>
	<author>Punkster812</author>
	<datestamp>1257099720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>This is an awesome solution. I have been using it for a couple of years now and have introduced it to a lot of people. Basically create one strong password that you can remember, it creates a nice encrypted file for you, lets you sort and group your passwords (i.e. Internet, Banking, Network, and lets you add custom groups). Then you can have it perform auto-type where it switches to the last window and types the username &gt; tab &gt; password (you can also use scripting if you need it to do some other variation for a particular site), or copy just the username or password with an auto-clear memory so your password doesn't stay in memory.
<br> <br>
Keepass works Windows, Linux, and Mac. I don't have a Mac, but it runs on all my Linux and Windows machines. And because it is encrypted, you can throw it on a jump drive, or something like SkyDrive so you can access it from anywhere. You can even install Keepass on your jumpdrive with the no-installer version so you have a total portable solution.</htmltext>
<tokenext>This is an awesome solution .
I have been using it for a couple of years now and have introduced it to a lot of people .
Basically create one strong password that you can remember , it creates a nice encrypted file for you , lets you sort and group your passwords ( i.e .
Internet , Banking , Network , and lets you add custom groups ) .
Then you can have it perform auto-type where it switches to the last window and types the username &gt; tab &gt; password ( you can also use scripting if you need it to do some other variation for a particular site ) , or copy just the username or password with an auto-clear memory so your password does n't stay in memory .
Keepass works Windows , Linux , and Mac .
I do n't have a Mac , but it runs on all my Linux and Windows machines .
And because it is encrypted , you can throw it on a jump drive , or something like SkyDrive so you can access it from anywhere .
You can even install Keepass on your jumpdrive with the no-installer version so you have a total portable solution .</tokentext>
<sentencetext>This is an awesome solution.
I have been using it for a couple of years now and have introduced it to a lot of people.
Basically create one strong password that you can remember, it creates a nice encrypted file for you, lets you sort and group your passwords (i.e.
Internet, Banking, Network, and lets you add custom groups).
Then you can have it perform auto-type where it switches to the last window and types the username &gt; tab &gt; password (you can also use scripting if you need it to do some other variation for a particular site), or copy just the username or password with an auto-clear memory so your password doesn't stay in memory.
Keepass works Windows, Linux, and Mac.
I don't have a Mac, but it runs on all my Linux and Windows machines.
And because it is encrypted, you can throw it on a jump drive, or something like SkyDrive so you can access it from anywhere.
You can even install Keepass on your jumpdrive with the no-installer version so you have a total portable solution.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056076</id>
	<title>Re:Ironkey</title>
	<author>ColdWetDog</author>
	<datestamp>1257873000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You might also consider a slightly different approach to the wife problem (this specific instance, not the general problem).  My wife doesn't need access to my Slashdot account, my electronics parts lookup database or other manner of things she's not interested in.  She does need access to the financial stuff.  So we have the accounts in both names for the bank and financial services websites.  That way, if I kick the bucket, she's already in and more importantly, has legal access to the site so she can do whatever she needs to do. <br> <br>
If you just give her the password to your bank account and she transfers funds, that could be fraud or theft depending on the legal status of your estate.  That's what our lawyer suggested anyway.<br> <br>
I do have the password to my 1password program in the safe deposit box so she can continue babbling on Slashdot should she be so inclined.....</htmltext>
<tokenext>You might also consider a slightly different approach to the wife problem ( this specific instance , not the general problem ) .
My wife does n't need access to my Slashdot account , my electronics parts lookup database or other manner of things she 's not interested in .
She does need access to the financial stuff .
So we have the accounts in both names for the bank and financial services websites .
That way , if I kick the bucket , she 's already in and more importantly , has legal access to the site so she can do whatever she needs to do .
If you just give her the password to your bank account and she transfers funds , that could be fraud or theft depending on the legal status of your estate .
That 's what our lawyer suggested anyway .
I do have the password to my 1password program in the safe deposit box so she can continue babbling on Slashdot should she be so inclined.... .</tokentext>
<sentencetext>You might also consider a slightly different approach to the wife problem (this specific instance, not the general problem).
My wife doesn't need access to my Slashdot account, my electronics parts lookup database or other manner of things she's not interested in.
She does need access to the financial stuff.
So we have the accounts in both names for the bank and financial services websites.
That way, if I kick the bucket, she's already in and more importantly, has legal access to the site so she can do whatever she needs to do.
If you just give her the password to your bank account and she transfers funds, that could be fraud or theft depending on the legal status of your estate.
That's what our lawyer suggested anyway.
I do have the password to my 1password program in the safe deposit box so she can continue babbling on Slashdot should she be so inclined.....</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054604</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056880</id>
	<title>Re:Keepass</title>
	<author>Anonymous</author>
	<datestamp>1257880860000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I'll second this.  Keepass and KeepassX work wonderfully.</p><p>Then put your keepass file on dropbox so you can always get to it.</p></htmltext>
<tokenext>I 'll second this .
Keepass and KeepassX work wonderfully.Then put your keepass file on dropbox so you can always get to it .</tokentext>
<sentencetext>I'll second this.
Keepass and KeepassX work wonderfully.Then put your keepass file on dropbox so you can always get to it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057492</id>
	<title>Re:LockNote</title>
	<author>Anonymous</author>
	<datestamp>1257067380000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I second that...I keep all my secrets in locknote and keep a copy of it on my usb drive.</p></htmltext>
<tokenext>I second that...I keep all my secrets in locknote and keep a copy of it on my usb drive .</tokentext>
<sentencetext>I second that...I keep all my secrets in locknote and keep a copy of it on my usb drive.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054706</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057326</id>
	<title>PasswordMaker</title>
	<author>Anonymous</author>
	<datestamp>1257108420000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use http://passwordmaker.org/ for a few months now. Its great. First of all it creates a unique password for each site, base on one master password. This master password is the only one I have to remember, and for some sites I have a special profile because of some password restrictions. It has a standalone website, a firefox plugin and there is source code to compile it on every major platform.</p></htmltext>
<tokenext>I use http : //passwordmaker.org/ for a few months now .
Its great .
First of all it creates a unique password for each site , base on one master password .
This master password is the only one I have to remember , and for some sites I have a special profile because of some password restrictions .
It has a standalone website , a firefox plugin and there is source code to compile it on every major platform .</tokentext>
<sentencetext>I use http://passwordmaker.org/ for a few months now.
Its great.
First of all it creates a unique password for each site, base on one master password.
This master password is the only one I have to remember, and for some sites I have a special profile because of some password restrictions.
It has a standalone website, a firefox plugin and there is source code to compile it on every major platform.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061110</id>
	<title>Re:Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257094800000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>This is the obvious solution, which for gods know what reason hasn't been adopted.  This is what we should do, but we're still using passwords that cause so many more problems than they solve.</p><p>That said, the site doesn't seem to give an idea of what websites use it.  Without a way to see it's an option, and without wider adoption, it will likely fizzle.</p></htmltext>
<tokenext>This is the obvious solution , which for gods know what reason has n't been adopted .
This is what we should do , but we 're still using passwords that cause so many more problems than they solve.That said , the site does n't seem to give an idea of what websites use it .
Without a way to see it 's an option , and without wider adoption , it will likely fizzle .</tokentext>
<sentencetext>This is the obvious solution, which for gods know what reason hasn't been adopted.
This is what we should do, but we're still using passwords that cause so many more problems than they solve.That said, the site doesn't seem to give an idea of what websites use it.
Without a way to see it's an option, and without wider adoption, it will likely fizzle.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055024</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059970</id>
	<title>Password for a bank??</title>
	<author>the\_one(2)</author>
	<datestamp>1257089820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If your bank is using a password scheme to authenticate you you should switch to a bank with proper security as soon as you can.</p></htmltext>
<tokenext>If your bank is using a password scheme to authenticate you you should switch to a bank with proper security as soon as you can .</tokentext>
<sentencetext>If your bank is using a password scheme to authenticate you you should switch to a bank with proper security as soon as you can.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054746</id>
	<title>eWallet over paper</title>
	<author>Anonymous</author>
	<datestamp>1257864540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use eWallet on my cellphone, with secured cleartext copy at home.  Very convenient, relying on semi-trusted vendor/security and pretty much with me at all times... but when I lost my previous cellphone this summer on a bus, I was able to have access codes/passwords changed in hours.  And subsequently have had NO indication that the *.wlt file was ever breached. Also, passwords are "scrambled" by a simple memorized algorithm; enter the text you see and you won't get in.</p><p>My wife, OTOH, kept this kind of info cleartext on paper in a "bag" (not her purse) and we had a major panic when that was stolen from her car in a smash-n-grab.</p></htmltext>
<tokenext>I use eWallet on my cellphone , with secured cleartext copy at home .
Very convenient , relying on semi-trusted vendor/security and pretty much with me at all times... but when I lost my previous cellphone this summer on a bus , I was able to have access codes/passwords changed in hours .
And subsequently have had NO indication that the * .wlt file was ever breached .
Also , passwords are " scrambled " by a simple memorized algorithm ; enter the text you see and you wo n't get in.My wife , OTOH , kept this kind of info cleartext on paper in a " bag " ( not her purse ) and we had a major panic when that was stolen from her car in a smash-n-grab .</tokentext>
<sentencetext>I use eWallet on my cellphone, with secured cleartext copy at home.
Very convenient, relying on semi-trusted vendor/security and pretty much with me at all times... but when I lost my previous cellphone this summer on a bus, I was able to have access codes/passwords changed in hours.
And subsequently have had NO indication that the *.wlt file was ever breached.
Also, passwords are "scrambled" by a simple memorized algorithm; enter the text you see and you won't get in.My wife, OTOH, kept this kind of info cleartext on paper in a "bag" (not her purse) and we had a major panic when that was stolen from her car in a smash-n-grab.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30096302</id>
	<title>Old school password storage</title>
	<author>Dr.Big.Man</author>
	<datestamp>1258199760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I still keep a PSION Series 5mx Pro for my everyday agenda, address book and else. (Still looking for a *good* alternative for my iPhone, including migration/synchronisation software - got any?).</p><p>The PSION is secured with a 3 letter password (to allow for easy log-in). *ALL* my passwords, credit card numbers, PIN &amp;c. are stored there in an encrypted file. The CompactFlash card of the device holds an impressive 128 MB (yes Meg - not Gig) but 80 Meg remain almost always free. It is regularly backuped to my PC being regularly backuped to my Synology DS-408 being regularly backuped independendly to two 1,5 TB external hard drives.  From a previous SDK there does still exist an emulator for PC that even allowed to access the file from there. But last time I used that is ages ago - literally.</p><p>As the devices used to be pretty cheap recently, I do still hold 2 spare ones in my drawer for replacement in case of emergency...</p></htmltext>
<tokenext>I still keep a PSION Series 5mx Pro for my everyday agenda , address book and else .
( Still looking for a * good * alternative for my iPhone , including migration/synchronisation software - got any ?
) .The PSION is secured with a 3 letter password ( to allow for easy log-in ) .
* ALL * my passwords , credit card numbers , PIN &amp;c. are stored there in an encrypted file .
The CompactFlash card of the device holds an impressive 128 MB ( yes Meg - not Gig ) but 80 Meg remain almost always free .
It is regularly backuped to my PC being regularly backuped to my Synology DS-408 being regularly backuped independendly to two 1,5 TB external hard drives .
From a previous SDK there does still exist an emulator for PC that even allowed to access the file from there .
But last time I used that is ages ago - literally.As the devices used to be pretty cheap recently , I do still hold 2 spare ones in my drawer for replacement in case of emergency.. .</tokentext>
<sentencetext>I still keep a PSION Series 5mx Pro for my everyday agenda, address book and else.
(Still looking for a *good* alternative for my iPhone, including migration/synchronisation software - got any?
).The PSION is secured with a 3 letter password (to allow for easy log-in).
*ALL* my passwords, credit card numbers, PIN &amp;c. are stored there in an encrypted file.
The CompactFlash card of the device holds an impressive 128 MB (yes Meg - not Gig) but 80 Meg remain almost always free.
It is regularly backuped to my PC being regularly backuped to my Synology DS-408 being regularly backuped independendly to two 1,5 TB external hard drives.
From a previous SDK there does still exist an emulator for PC that even allowed to access the file from there.
But last time I used that is ages ago - literally.As the devices used to be pretty cheap recently, I do still hold 2 spare ones in my drawer for replacement in case of emergency...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055966</id>
	<title>Re:Opera Password Manager</title>
	<author>Anonymous</author>
	<datestamp>1257871980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Opera does not store its Master Password in the plaintext format. Moreover, Opera doesn't even store its hash. The developers have chosen a different route: the password along with the salt participates in the encryption of a portion of data and then, to check the validity of the password, it uses the decrypted data hash and the original salt value.</p></div><p>That sounds familiar.... maybe because Firefox does the exact same thing when you choose to use a master password.</p></div>
	</htmltext>
<tokenext>Opera does not store its Master Password in the plaintext format .
Moreover , Opera does n't even store its hash .
The developers have chosen a different route : the password along with the salt participates in the encryption of a portion of data and then , to check the validity of the password , it uses the decrypted data hash and the original salt value.That sounds familiar.... maybe because Firefox does the exact same thing when you choose to use a master password .</tokentext>
<sentencetext>Opera does not store its Master Password in the plaintext format.
Moreover, Opera doesn't even store its hash.
The developers have chosen a different route: the password along with the salt participates in the encryption of a portion of data and then, to check the validity of the password, it uses the decrypted data hash and the original salt value.That sounds familiar.... maybe because Firefox does the exact same thing when you choose to use a master password.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054610</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054966</id>
	<title>1Password</title>
	<author>Anonymous</author>
	<datestamp>1257865800000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>On my Mac, I live &amp; die by 1Password. I resisted putting all my passwords into a single store like it, but once I started, I was blown away by the program.</p><p>For my PC at work, TrueCrypt with a spreadsheet inside.</p></htmltext>
<tokenext>On my Mac , I live &amp; die by 1Password .
I resisted putting all my passwords into a single store like it , but once I started , I was blown away by the program.For my PC at work , TrueCrypt with a spreadsheet inside .</tokentext>
<sentencetext>On my Mac, I live &amp; die by 1Password.
I resisted putting all my passwords into a single store like it, but once I started, I was blown away by the program.For my PC at work, TrueCrypt with a spreadsheet inside.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056274</id>
	<title>Re:Keepass</title>
	<author>Anonymous</author>
	<datestamp>1257875100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p> <a href="http://keepass.info/download.html" title="keepass.info" rel="nofollow">http://keepass.info/download.html</a> [keepass.info] </p></div><p>KeePass 2 is the favored encrypted password vault application for my company and other security administrators like myself.  It can also be scripted to autologon to any application or website... after entering in your master password.</p></div>
	</htmltext>
<tokenext>http : //keepass.info/download.html [ keepass.info ] KeePass 2 is the favored encrypted password vault application for my company and other security administrators like myself .
It can also be scripted to autologon to any application or website... after entering in your master password .</tokentext>
<sentencetext> http://keepass.info/download.html [keepass.info] KeePass 2 is the favored encrypted password vault application for my company and other security administrators like myself.
It can also be scripted to autologon to any application or website... after entering in your master password.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30073614</id>
	<title>Put your browser profile inside truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1258045380000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Having the browser remember you passwords is so easy, it's hard to give up.  So why not just setup truecrypt, and move your browser user profile inside the truecrypt volume?</p><p>Then you only have to remember one password (well two, your login password for the computer, and the password for the truecrypt volume).  And then you can start up your web browser, and it remembers all your passwords just like always.  And everything is very encrypted this way.</p><p>It's not quite as secure as keepass, since keepass can be made to require a file and a password...but unless you're keeping the file on a USB stick and not your hard drive, it's not really much more secure than just having one password for truecrypt (anyone who gets access to your hardrive will have the keepass DB and the key file).  And messing around with keepass for your day to day passwords is a major chore.  It's great for a master list of passwords as a backup though, or if you're sharing passwords with others at work, etc.</p><p>--Julian</p></htmltext>
<tokenext>Having the browser remember you passwords is so easy , it 's hard to give up .
So why not just setup truecrypt , and move your browser user profile inside the truecrypt volume ? Then you only have to remember one password ( well two , your login password for the computer , and the password for the truecrypt volume ) .
And then you can start up your web browser , and it remembers all your passwords just like always .
And everything is very encrypted this way.It 's not quite as secure as keepass , since keepass can be made to require a file and a password...but unless you 're keeping the file on a USB stick and not your hard drive , it 's not really much more secure than just having one password for truecrypt ( anyone who gets access to your hardrive will have the keepass DB and the key file ) .
And messing around with keepass for your day to day passwords is a major chore .
It 's great for a master list of passwords as a backup though , or if you 're sharing passwords with others at work , etc.--Julian</tokentext>
<sentencetext>Having the browser remember you passwords is so easy, it's hard to give up.
So why not just setup truecrypt, and move your browser user profile inside the truecrypt volume?Then you only have to remember one password (well two, your login password for the computer, and the password for the truecrypt volume).
And then you can start up your web browser, and it remembers all your passwords just like always.
And everything is very encrypted this way.It's not quite as secure as keepass, since keepass can be made to require a file and a password...but unless you're keeping the file on a USB stick and not your hard drive, it's not really much more secure than just having one password for truecrypt (anyone who gets access to your hardrive will have the keepass DB and the key file).
And messing around with keepass for your day to day passwords is a major chore.
It's great for a master list of passwords as a backup though, or if you're sharing passwords with others at work, etc.--Julian</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055050</id>
	<title>I used a Mandylion brand password dongle</title>
	<author>LukeCrawford</author>
	<datestamp>1257866280000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>for a long time... it was a little keychain dongle... you push a sequence on the buttons on front and it lets you see the passwords.   There are not that many buttons, so if it's stolen don't expect it to last more than a few days, but it'll slow 'em down hopefully long enough to let you change your passwords.</p><p>but mine broke<nobr> <wbr></nobr>:(</p></htmltext>
<tokenext>for a long time... it was a little keychain dongle... you push a sequence on the buttons on front and it lets you see the passwords .
There are not that many buttons , so if it 's stolen do n't expect it to last more than a few days , but it 'll slow 'em down hopefully long enough to let you change your passwords.but mine broke : (</tokentext>
<sentencetext>for a long time... it was a little keychain dongle... you push a sequence on the buttons on front and it lets you see the passwords.
There are not that many buttons, so if it's stolen don't expect it to last more than a few days, but it'll slow 'em down hopefully long enough to let you change your passwords.but mine broke :(</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058222</id>
	<title>Oooh, I wonder!</title>
	<author>L4t3r4lu5</author>
	<datestamp>1257076140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="http://lmgtfy.com/?q=store+passwords" title="lmgtfy.com">Let me Google that for you...</a> [lmgtfy.com] <br> <br>I've seen some pretty rubbish SlashDot questions, but this really takes the cake. 5 minutes of Google searching would have revealed Password Safe, Keepass, and all manner of other free secure password databases / keyrings.<br> <br>Drop kdawson as an editor.</htmltext>
<tokenext>Let me Google that for you... [ lmgtfy.com ] I 've seen some pretty rubbish SlashDot questions , but this really takes the cake .
5 minutes of Google searching would have revealed Password Safe , Keepass , and all manner of other free secure password databases / keyrings .
Drop kdawson as an editor .</tokentext>
<sentencetext>Let me Google that for you... [lmgtfy.com]  I've seen some pretty rubbish SlashDot questions, but this really takes the cake.
5 minutes of Google searching would have revealed Password Safe, Keepass, and all manner of other free secure password databases / keyrings.
Drop kdawson as an editor.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058192</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>Anonymous</author>
	<datestamp>1257075840000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>So your password security is determined by some rather simple mechanism you put together rather quickly, and it's security depends on no one guessing that mechanism; this is called "security by obscurity", and, to make it short, its VERY BAD. If anyone figures out one of your passwords, it should'nt be too hard to figure out your scheme, and boom - he has successfully cracked all your passwords!</p></htmltext>
<tokenext>So your password security is determined by some rather simple mechanism you put together rather quickly , and it 's security depends on no one guessing that mechanism ; this is called " security by obscurity " , and , to make it short , its VERY BAD .
If anyone figures out one of your passwords , it should'nt be too hard to figure out your scheme , and boom - he has successfully cracked all your passwords !</tokentext>
<sentencetext>So your password security is determined by some rather simple mechanism you put together rather quickly, and it's security depends on no one guessing that mechanism; this is called "security by obscurity", and, to make it short, its VERY BAD.
If anyone figures out one of your passwords, it should'nt be too hard to figure out your scheme, and boom - he has successfully cracked all your passwords!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062390</id>
	<title>Re:Use the master password feature and stop worryi</title>
	<author>Anonymous</author>
	<datestamp>1257099840000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Works fine unless you use tabs and add-ons. There is a bug this procedure that prompts you for the master password for tabs and addons. You will end up entering it MANY times. One would think Mozilla would have resolved this issue long ago.</p></htmltext>
<tokenext>Works fine unless you use tabs and add-ons .
There is a bug this procedure that prompts you for the master password for tabs and addons .
You will end up entering it MANY times .
One would think Mozilla would have resolved this issue long ago .</tokentext>
<sentencetext>Works fine unless you use tabs and add-ons.
There is a bug this procedure that prompts you for the master password for tabs and addons.
You will end up entering it MANY times.
One would think Mozilla would have resolved this issue long ago.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054508</id>
	<title>Keepass</title>
	<author>Anonymous</author>
	<datestamp>1257863640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>KeePass is a great application that runs on any platform - the file is encrypted ensuring that in the event your lappy gets stolen, your passwords will remain secret - that is unless your password is password.</p></htmltext>
<tokenext>KeePass is a great application that runs on any platform - the file is encrypted ensuring that in the event your lappy gets stolen , your passwords will remain secret - that is unless your password is password .</tokentext>
<sentencetext>KeePass is a great application that runs on any platform - the file is encrypted ensuring that in the event your lappy gets stolen, your passwords will remain secret - that is unless your password is password.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064018</id>
	<title>If you have an Android phone: SplashID</title>
	<author>d474</author>
	<datestamp>1257106200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="http://www.splashdata.com/splashid/android/" title="splashdata.com">SplashID</a> [splashdata.com] on your Android phone.<br>
Use one 256bit Blowfish password to access ALL of your passwords.  Your phone goes everywhere with you, so do your passwords.  If you lose your phone, no big deal.  Chances are that person doesn't have the resources to crack that encryption.<br> <br>
Best part is you can use it to fill in forms for websites you visit on your phone, which is good because typing in obscure passwords on a phone can be a challenging feat.</htmltext>
<tokenext>SplashID [ splashdata.com ] on your Android phone .
Use one 256bit Blowfish password to access ALL of your passwords .
Your phone goes everywhere with you , so do your passwords .
If you lose your phone , no big deal .
Chances are that person does n't have the resources to crack that encryption .
Best part is you can use it to fill in forms for websites you visit on your phone , which is good because typing in obscure passwords on a phone can be a challenging feat .</tokentext>
<sentencetext>SplashID [splashdata.com] on your Android phone.
Use one 256bit Blowfish password to access ALL of your passwords.
Your phone goes everywhere with you, so do your passwords.
If you lose your phone, no big deal.
Chances are that person doesn't have the resources to crack that encryption.
Best part is you can use it to fill in forms for websites you visit on your phone, which is good because typing in obscure passwords on a phone can be a challenging feat.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061586</id>
	<title>Anonymous Coward</title>
	<author>Anonymous</author>
	<datestamp>1257096600000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Hey, I just use the Master Password feature on Firefox. Use something which no one could guess as your master.</p><p>This is a desktop though so I'm not worries about it being stolen.</p></htmltext>
<tokenext>Hey , I just use the Master Password feature on Firefox .
Use something which no one could guess as your master.This is a desktop though so I 'm not worries about it being stolen .</tokentext>
<sentencetext>Hey, I just use the Master Password feature on Firefox.
Use something which no one could guess as your master.This is a desktop though so I'm not worries about it being stolen.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058676</id>
	<title>Re:PasswordSafe</title>
	<author>Anonymous</author>
	<datestamp>1257081360000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Also, PasswordSafe is windows software, but there are softs for Linux, OSX and Solaris which support reading and writing password safe encrypted files, there are GUI or command line softs.<br>And the password file can be easily stored in Dropbox or an equivalent soft to access it from anywhere, and version it.<br>It can also store its settings either in the registry, or in files to have everything is an USB key.<br>Then it's free, and lightweight.</p><p>Yup, it's nice sofware.</p></htmltext>
<tokenext>Also , PasswordSafe is windows software , but there are softs for Linux , OSX and Solaris which support reading and writing password safe encrypted files , there are GUI or command line softs.And the password file can be easily stored in Dropbox or an equivalent soft to access it from anywhere , and version it.It can also store its settings either in the registry , or in files to have everything is an USB key.Then it 's free , and lightweight.Yup , it 's nice sofware .</tokentext>
<sentencetext>Also, PasswordSafe is windows software, but there are softs for Linux, OSX and Solaris which support reading and writing password safe encrypted files, there are GUI or command line softs.And the password file can be easily stored in Dropbox or an equivalent soft to access it from anywhere, and version it.It can also store its settings either in the registry, or in files to have everything is an USB key.Then it's free, and lightweight.Yup, it's nice sofware.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056102</id>
	<title>supergenpass</title>
	<author>Doctor Device</author>
	<datestamp>1257873300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>SuperGenPass is a good option for online passwords. especially since the website lets you customize the bookmarklet before you download it. though why there is an option to hardcode your master password into the bookmarklet, thereby completely defeating the security of it, is beyond me. conversely, the option to have it store a hash of your master password and compare it against the master pass you type in the field is nice... especially if you're like me and prone to typographical errors.</htmltext>
<tokenext>SuperGenPass is a good option for online passwords .
especially since the website lets you customize the bookmarklet before you download it .
though why there is an option to hardcode your master password into the bookmarklet , thereby completely defeating the security of it , is beyond me .
conversely , the option to have it store a hash of your master password and compare it against the master pass you type in the field is nice... especially if you 're like me and prone to typographical errors .</tokentext>
<sentencetext>SuperGenPass is a good option for online passwords.
especially since the website lets you customize the bookmarklet before you download it.
though why there is an option to hardcode your master password into the bookmarklet, thereby completely defeating the security of it, is beyond me.
conversely, the option to have it store a hash of your master password and compare it against the master pass you type in the field is nice... especially if you're like me and prone to typographical errors.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054646</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054872</id>
	<title>Re:1password</title>
	<author>yemanja</author>
	<datestamp>1257865260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I second the seconders.  I also like that 1Password has its own version of the keychain that is easy to copy to a jump drive, etc.</p></htmltext>
<tokenext>I second the seconders .
I also like that 1Password has its own version of the keychain that is easy to copy to a jump drive , etc .</tokentext>
<sentencetext>I second the seconders.
I also like that 1Password has its own version of the keychain that is easy to copy to a jump drive, etc.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054530</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058176</id>
	<title>Use Roboform</title>
	<author>Anonymous</author>
	<datestamp>1257075660000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I have used Roboform for at least 8 years and love it.   http://www.roboform.com</p><p>The RF people havemobile solutions ranging from password protected USB to have apps for various smart phones.</p></htmltext>
<tokenext>I have used Roboform for at least 8 years and love it .
http : //www.roboform.comThe RF people havemobile solutions ranging from password protected USB to have apps for various smart phones .</tokentext>
<sentencetext>I have used Roboform for at least 8 years and love it.
http://www.roboform.comThe RF people havemobile solutions ranging from password protected USB to have apps for various smart phones.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054738</id>
	<title>Definitely porn stars</title>
	<author>sgt\_doom</author>
	<datestamp>1257864540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Porn star names....definitely, always works for me.  Plus, I can then guess other users' passwords much more easily and don't need to bother with those pesky password cracking software.  Let's see....jjordan (jana jordan), mistiluv (misti love), brandytal (brandy talore).....</htmltext>
<tokenext>Porn star names....definitely , always works for me .
Plus , I can then guess other users ' passwords much more easily and do n't need to bother with those pesky password cracking software .
Let 's see....jjordan ( jana jordan ) , mistiluv ( misti love ) , brandytal ( brandy talore ) .... .</tokentext>
<sentencetext>Porn star names....definitely, always works for me.
Plus, I can then guess other users' passwords much more easily and don't need to bother with those pesky password cracking software.
Let's see....jjordan (jana jordan), mistiluv (misti love), brandytal (brandy talore).....</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055840</id>
	<title>Roboform</title>
	<author>labnet</author>
	<datestamp>1257871200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've used Roboform for about 3 years now and it works great. I have around 100 passwords stored on it.<br>It works on the single master password concept and stores the hashed files as text files in the appropriate folder.<br>It has a USB version for portability (which I don't use)<br>It also has form filling functions including credit card details which work very well.</p><p>You click on the site you wish to visit, it surfs there, fills in the forms, enters the site (in one click)</p></htmltext>
<tokenext>I 've used Roboform for about 3 years now and it works great .
I have around 100 passwords stored on it.It works on the single master password concept and stores the hashed files as text files in the appropriate folder.It has a USB version for portability ( which I do n't use ) It also has form filling functions including credit card details which work very well.You click on the site you wish to visit , it surfs there , fills in the forms , enters the site ( in one click )</tokentext>
<sentencetext>I've used Roboform for about 3 years now and it works great.
I have around 100 passwords stored on it.It works on the single master password concept and stores the hashed files as text files in the appropriate folder.It has a USB version for portability (which I don't use)It also has form filling functions including credit card details which work very well.You click on the site you wish to visit, it surfs there, fills in the forms, enters the site (in one click)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059320</id>
	<title>Re:paper in your wallet</title>
	<author>Anonymous</author>
	<datestamp>1257086940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Click on "forgot username"</p><p>Then after getting username click on"Forgot Password" link.</p><p>Works everytime. I do that probably 80 percent of sites.</p></htmltext>
<tokenext>Click on " forgot username " Then after getting username click on " Forgot Password " link.Works everytime .
I do that probably 80 percent of sites .</tokentext>
<sentencetext>Click on "forgot username"Then after getting username click on"Forgot Password" link.Works everytime.
I do that probably 80 percent of sites.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054706</id>
	<title>LockNote</title>
	<author>Anonymous</author>
	<datestamp>1257864420000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>I use Steganos LockNote (GPL, <a href="http://www.steganos.com/us/products/for-free/locknote/overview/" title="steganos.com">http://www.steganos.com/us/products/for-free/locknote/overview/</a> [steganos.com]), it's essentially a self-contained AES encrypting Notepad.<br>And it's extremely stand-alone/portable, so you can just stick it on a USB stick.</p></htmltext>
<tokenext>I use Steganos LockNote ( GPL , http : //www.steganos.com/us/products/for-free/locknote/overview/ [ steganos.com ] ) , it 's essentially a self-contained AES encrypting Notepad.And it 's extremely stand-alone/portable , so you can just stick it on a USB stick .</tokentext>
<sentencetext>I use Steganos LockNote (GPL, http://www.steganos.com/us/products/for-free/locknote/overview/ [steganos.com]), it's essentially a self-contained AES encrypting Notepad.And it's extremely stand-alone/portable, so you can just stick it on a USB stick.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055366</id>
	<title>Clipperz</title>
	<author>Dunkirk</author>
	<datestamp>1257868020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://www.clipperz.com/" title="clipperz.com">http://www.clipperz.com/</a> [clipperz.com]</p><p>Clipperz is both a service, and a downloadable webapp you can run on your own server. It's the closest thing I've found that approximates the features of 1Pass (for Macs) on Linux. Now I just need to get a data plan for my phone.</p></htmltext>
<tokenext>http : //www.clipperz.com/ [ clipperz.com ] Clipperz is both a service , and a downloadable webapp you can run on your own server .
It 's the closest thing I 've found that approximates the features of 1Pass ( for Macs ) on Linux .
Now I just need to get a data plan for my phone .</tokentext>
<sentencetext>http://www.clipperz.com/ [clipperz.com]Clipperz is both a service, and a downloadable webapp you can run on your own server.
It's the closest thing I've found that approximates the features of 1Pass (for Macs) on Linux.
Now I just need to get a data plan for my phone.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057290</id>
	<title>Re:Use the master password feature and stop worryi</title>
	<author>adaviel</author>
	<datestamp>1257107940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I concur. On some Firefox versions I think there was a separate box "encrypt passwords". Use it.
Apart from ease-of-use, this method is proof against keyloggers (since you are not actually typing the website password).
It also makes it less of a headache to use a different password for each website. The question you should ask is, "Do I trust molewhacker.com with my day-trading password?" and so on.
I recently changed most of my online passwords to unique random 20-character strings - only the odd glitch where a site truncated it, or did not accept certain punctuation.
To be sure, it's a pain to transfer them to a different computer (I use a GPG encrypted textfile), and my bank uses a method that the browser won't remember (so it still has a short more memorable passphrase...)</htmltext>
<tokenext>I concur .
On some Firefox versions I think there was a separate box " encrypt passwords " .
Use it .
Apart from ease-of-use , this method is proof against keyloggers ( since you are not actually typing the website password ) .
It also makes it less of a headache to use a different password for each website .
The question you should ask is , " Do I trust molewhacker.com with my day-trading password ?
" and so on .
I recently changed most of my online passwords to unique random 20-character strings - only the odd glitch where a site truncated it , or did not accept certain punctuation .
To be sure , it 's a pain to transfer them to a different computer ( I use a GPG encrypted textfile ) , and my bank uses a method that the browser wo n't remember ( so it still has a short more memorable passphrase... )</tokentext>
<sentencetext>I concur.
On some Firefox versions I think there was a separate box "encrypt passwords".
Use it.
Apart from ease-of-use, this method is proof against keyloggers (since you are not actually typing the website password).
It also makes it less of a headache to use a different password for each website.
The question you should ask is, "Do I trust molewhacker.com with my day-trading password?
" and so on.
I recently changed most of my online passwords to unique random 20-character strings - only the odd glitch where a site truncated it, or did not accept certain punctuation.
To be sure, it's a pain to transfer them to a different computer (I use a GPG encrypted textfile), and my bank uses a method that the browser won't remember (so it still has a short more memorable passphrase...)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055610</id>
	<title>SuperGenPass</title>
	<author>Anonymous</author>
	<datestamp>1257869700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Try the website supergenpass.com.  It makes a javascript bookmarklet for your browser.  You basically use a master password, which gets combined with the domain name in order to generate a random-looking password of whichever length you'd like.  Since the bookmarklet is stored locally, nothing (aside from the initial bookmarklet download) is transmitted online.</p></htmltext>
<tokenext>Try the website supergenpass.com .
It makes a javascript bookmarklet for your browser .
You basically use a master password , which gets combined with the domain name in order to generate a random-looking password of whichever length you 'd like .
Since the bookmarklet is stored locally , nothing ( aside from the initial bookmarklet download ) is transmitted online .</tokentext>
<sentencetext>Try the website supergenpass.com.
It makes a javascript bookmarklet for your browser.
You basically use a master password, which gets combined with the domain name in order to generate a random-looking password of whichever length you'd like.
Since the bookmarklet is stored locally, nothing (aside from the initial bookmarklet download) is transmitted online.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058690</id>
	<title>SPB Wallet (not a plug)</title>
	<author>sheepslayeruk</author>
	<datestamp>1257081600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>FWIW - I use SPB Wallet to hold passwords etc. I normally prefer OS stuff, but made an exception in this case since it syncs with (and runs on) my Windoze More-bile phone and integrates well with Firefox. Comes with password generator, can capture and auto-fill login pages, auto cleans out clipboard if you've copy-pasted data and is a general encrypted database that stores all sorts of info.

I have no idea how well it actually does in terms of leaving traces etc, but it works nicely for me, keeping my phone, work PC and home PC synced up whilst being very convenient in terms of browser use.</htmltext>
<tokenext>FWIW - I use SPB Wallet to hold passwords etc .
I normally prefer OS stuff , but made an exception in this case since it syncs with ( and runs on ) my Windoze More-bile phone and integrates well with Firefox .
Comes with password generator , can capture and auto-fill login pages , auto cleans out clipboard if you 've copy-pasted data and is a general encrypted database that stores all sorts of info .
I have no idea how well it actually does in terms of leaving traces etc , but it works nicely for me , keeping my phone , work PC and home PC synced up whilst being very convenient in terms of browser use .</tokentext>
<sentencetext>FWIW - I use SPB Wallet to hold passwords etc.
I normally prefer OS stuff, but made an exception in this case since it syncs with (and runs on) my Windoze More-bile phone and integrates well with Firefox.
Comes with password generator, can capture and auto-fill login pages, auto cleans out clipboard if you've copy-pasted data and is a general encrypted database that stores all sorts of info.
I have no idea how well it actually does in terms of leaving traces etc, but it works nicely for me, keeping my phone, work PC and home PC synced up whilst being very convenient in terms of browser use.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057956</id>
	<title>Why don't you read the question first?</title>
	<author>jotaeleemeese</author>
	<datestamp>1257073440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I understand that reading Slashdot is done quickly and under pressure (you should be working after all), so I wonder what kind of service people provide to their costumers/users/business partners when they can't adhere to the specifications of a given request.</p><p>First of all the questioner specifically says that he has bad memory, so point number one of your reply is out of context already.</p><p>Then later on he says he does not want a solution tied to Firefox, but then you helpfully proceed to tie a solution to Firefox.</p><p>Wakey, wakey!</p></htmltext>
<tokenext>I understand that reading Slashdot is done quickly and under pressure ( you should be working after all ) , so I wonder what kind of service people provide to their costumers/users/business partners when they ca n't adhere to the specifications of a given request.First of all the questioner specifically says that he has bad memory , so point number one of your reply is out of context already.Then later on he says he does not want a solution tied to Firefox , but then you helpfully proceed to tie a solution to Firefox.Wakey , wakey !</tokentext>
<sentencetext>I understand that reading Slashdot is done quickly and under pressure (you should be working after all), so I wonder what kind of service people provide to their costumers/users/business partners when they can't adhere to the specifications of a given request.First of all the questioner specifically says that he has bad memory, so point number one of your reply is out of context already.Then later on he says he does not want a solution tied to Firefox, but then you helpfully proceed to tie a solution to Firefox.Wakey, wakey!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054488</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061716</id>
	<title>Lockcrypt and/or Secure Password Extension</title>
	<author>gVibe</author>
	<datestamp>1257097080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Lockcrypt (http://www.lockcrypt.com)<br> <br>

* Central Database (Flat File or MySQL)<br>
* Strong Encryption<br>
* Multiple Languages<br>
* Customizable Account Types<br>
* Import and Export<br>
* AutoType<br>
* Firefox Extension<br>
* J2ME and<nobr> <wbr></nobr>.NET Mobile Versions<br>
* Secure Clipboard<br>
* Easy to Use Interface<br> <br>

Secure Password (https://addons.mozilla.org/en-US/firefox/addon/4429)<br> <br>

* Add on Extension to Firefox's password database<br>
* Adds strong encryption (not plain text)<br>
* Easy one-click access to Site information for logging in.</htmltext>
<tokenext>Lockcrypt ( http : //www.lockcrypt.com ) * Central Database ( Flat File or MySQL ) * Strong Encryption * Multiple Languages * Customizable Account Types * Import and Export * AutoType * Firefox Extension * J2ME and .NET Mobile Versions * Secure Clipboard * Easy to Use Interface Secure Password ( https : //addons.mozilla.org/en-US/firefox/addon/4429 ) * Add on Extension to Firefox 's password database * Adds strong encryption ( not plain text ) * Easy one-click access to Site information for logging in .</tokentext>
<sentencetext>Lockcrypt (http://www.lockcrypt.com) 

* Central Database (Flat File or MySQL)
* Strong Encryption
* Multiple Languages
* Customizable Account Types
* Import and Export
* AutoType
* Firefox Extension
* J2ME and .NET Mobile Versions
* Secure Clipboard
* Easy to Use Interface 

Secure Password (https://addons.mozilla.org/en-US/firefox/addon/4429) 

* Add on Extension to Firefox's password database
* Adds strong encryption (not plain text)
* Easy one-click access to Site information for logging in.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058776</id>
	<title>If you use OSX</title>
	<author>gordguide</author>
	<datestamp>1257082380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I used to use 3rd party encryption and password keeper tools, until one of the paid apps I relied on introduced a bug in an update that corrupted the encrypted data. If you are well versed in IT you probably know what that means, but for the regular folk out there I'll spell it out: Your data is unrecoverable, forever, if an encrypted file becomes corrupted even by a small amount. So, Rule Number One:</p><p>BACKUP YOUR ENCRYPTED DATA</p><p>If you use a password manager, know how to find the password file and know how to back it up, how to recover it, how to use it on another system with the same tools installed.</p><p>Bitten by that bug, where everything I could not re-create from memory was essentially gone, I looked once again at the tools the OS provided me.</p><p>Using OSX's system-wide Keychain support and utilities, I created a user keychain, set a robust password on it, and created appropriately titled secure notes. All my login credentials, all my banking info, all secure data is stored there. You can back it up, you can carry it on a USB drive and use it on another Mac, you can sync it across multiple machines. The text formatting abilities are rudimentary, but I can live with it.</p><p>It's encrypted and unusable by anyone who does not know the username and password of the owner, and isn't visible to other users. It has OS and OS-vendor level support, and that same level of troubleshooting and testing<nobr> <wbr></nobr>... it works and obscure bugs, if there are any, will be found and fixed (in the case of my paid app, the developer just gave up and left us all staring at empty wallets and useless apps with unusable data).</p><p>The latest version of FileVault (10.5 or later) has had major improvements. I never had problems with FileVault on my laptop going back 7 years, but others I know have. The later version encrypts in 10MB sections, and therefore if there are issues (eg drive or data corruption), most of your data will be recoverable. It's also much faster since it only deals with changed data during certain normal operations (eg recovering free space).</p></htmltext>
<tokenext>I used to use 3rd party encryption and password keeper tools , until one of the paid apps I relied on introduced a bug in an update that corrupted the encrypted data .
If you are well versed in IT you probably know what that means , but for the regular folk out there I 'll spell it out : Your data is unrecoverable , forever , if an encrypted file becomes corrupted even by a small amount .
So , Rule Number One : BACKUP YOUR ENCRYPTED DATAIf you use a password manager , know how to find the password file and know how to back it up , how to recover it , how to use it on another system with the same tools installed.Bitten by that bug , where everything I could not re-create from memory was essentially gone , I looked once again at the tools the OS provided me.Using OSX 's system-wide Keychain support and utilities , I created a user keychain , set a robust password on it , and created appropriately titled secure notes .
All my login credentials , all my banking info , all secure data is stored there .
You can back it up , you can carry it on a USB drive and use it on another Mac , you can sync it across multiple machines .
The text formatting abilities are rudimentary , but I can live with it.It 's encrypted and unusable by anyone who does not know the username and password of the owner , and is n't visible to other users .
It has OS and OS-vendor level support , and that same level of troubleshooting and testing ... it works and obscure bugs , if there are any , will be found and fixed ( in the case of my paid app , the developer just gave up and left us all staring at empty wallets and useless apps with unusable data ) .The latest version of FileVault ( 10.5 or later ) has had major improvements .
I never had problems with FileVault on my laptop going back 7 years , but others I know have .
The later version encrypts in 10MB sections , and therefore if there are issues ( eg drive or data corruption ) , most of your data will be recoverable .
It 's also much faster since it only deals with changed data during certain normal operations ( eg recovering free space ) .</tokentext>
<sentencetext>I used to use 3rd party encryption and password keeper tools, until one of the paid apps I relied on introduced a bug in an update that corrupted the encrypted data.
If you are well versed in IT you probably know what that means, but for the regular folk out there I'll spell it out: Your data is unrecoverable, forever, if an encrypted file becomes corrupted even by a small amount.
So, Rule Number One:BACKUP YOUR ENCRYPTED DATAIf you use a password manager, know how to find the password file and know how to back it up, how to recover it, how to use it on another system with the same tools installed.Bitten by that bug, where everything I could not re-create from memory was essentially gone, I looked once again at the tools the OS provided me.Using OSX's system-wide Keychain support and utilities, I created a user keychain, set a robust password on it, and created appropriately titled secure notes.
All my login credentials, all my banking info, all secure data is stored there.
You can back it up, you can carry it on a USB drive and use it on another Mac, you can sync it across multiple machines.
The text formatting abilities are rudimentary, but I can live with it.It's encrypted and unusable by anyone who does not know the username and password of the owner, and isn't visible to other users.
It has OS and OS-vendor level support, and that same level of troubleshooting and testing ... it works and obscure bugs, if there are any, will be found and fixed (in the case of my paid app, the developer just gave up and left us all staring at empty wallets and useless apps with unusable data).The latest version of FileVault (10.5 or later) has had major improvements.
I never had problems with FileVault on my laptop going back 7 years, but others I know have.
The later version encrypts in 10MB sections, and therefore if there are issues (eg drive or data corruption), most of your data will be recoverable.
It's also much faster since it only deals with changed data during certain normal operations (eg recovering free space).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054654</id>
	<title>Firefox is okay</title>
	<author>Anonymous</author>
	<datestamp>1257864240000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p>The Firefox automatic password remembering thingy is okay. Not too worried about if the computer is stolen as I have a BIOS password plus there's not exactly enough money in my bank account to be worth bothering with, and my bank system doesn't actually let you do a lot without human intervention. My biggest worry, actually, was if Firefox would ever show me these saved passwords in case I do wish to make an attempt to remember. It can. Cool.</p><p>What I can't believe is how many people are giving their best ideas for remembering passwords. Was this a serious question or a cleverly disguised bit of social engineering?</p></htmltext>
<tokenext>The Firefox automatic password remembering thingy is okay .
Not too worried about if the computer is stolen as I have a BIOS password plus there 's not exactly enough money in my bank account to be worth bothering with , and my bank system does n't actually let you do a lot without human intervention .
My biggest worry , actually , was if Firefox would ever show me these saved passwords in case I do wish to make an attempt to remember .
It can .
Cool.What I ca n't believe is how many people are giving their best ideas for remembering passwords .
Was this a serious question or a cleverly disguised bit of social engineering ?</tokentext>
<sentencetext>The Firefox automatic password remembering thingy is okay.
Not too worried about if the computer is stolen as I have a BIOS password plus there's not exactly enough money in my bank account to be worth bothering with, and my bank system doesn't actually let you do a lot without human intervention.
My biggest worry, actually, was if Firefox would ever show me these saved passwords in case I do wish to make an attempt to remember.
It can.
Cool.What I can't believe is how many people are giving their best ideas for remembering passwords.
Was this a serious question or a cleverly disguised bit of social engineering?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056548</id>
	<title>It's gotta be multi-platform</title>
	<author>CrtxReavr</author>
	<datestamp>1257877860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use a text file that I keep on a USB stick, copy lots of places and encrypt/de-crypt with OpenSSL.  It's native to so many systems, and can pretty easily be installed on anything that it isn't.</p><p>(First switch to borne shell or something else that doesn't keep a command history, dummy!)</p><blockquote><div><p> <tt>openssl des -k yeahUwish &lt; passwords.txt &gt; passwords.txt.des<br>
&nbsp; <br>openssl des -d -k yeahUwish &lt; passwords.txt.des</tt></p></div> </blockquote><p>You can even kick the security up a notch.:</p><blockquote><div><p> <tt>openssl des -k `md5 -s yeahUwish` &lt; passwords.txt &gt; passwords.txt.des<br>
&nbsp; <br>openssl des -d -k `md5 -s yeahUwish` &lt; passwords.txt.des</tt></p></div> </blockquote><p>Let the reactionary flaming begin!</p><p>-CR</p></div>
	</htmltext>
<tokenext>I use a text file that I keep on a USB stick , copy lots of places and encrypt/de-crypt with OpenSSL .
It 's native to so many systems , and can pretty easily be installed on anything that it is n't .
( First switch to borne shell or something else that does n't keep a command history , dummy !
) openssl des -k yeahUwish passwords.txt.des   openssl des -d -k yeahUwish You can even kick the security up a notch .
: openssl des -k ` md5 -s yeahUwish ` passwords.txt.des   openssl des -d -k ` md5 -s yeahUwish ` Let the reactionary flaming begin ! -CR</tokentext>
<sentencetext>I use a text file that I keep on a USB stick, copy lots of places and encrypt/de-crypt with OpenSSL.
It's native to so many systems, and can pretty easily be installed on anything that it isn't.
(First switch to borne shell or something else that doesn't keep a command history, dummy!
) openssl des -k yeahUwish  passwords.txt.des
  openssl des -d -k yeahUwish  You can even kick the security up a notch.
: openssl des -k `md5 -s yeahUwish`  passwords.txt.des
  openssl des -d -k `md5 -s yeahUwish`  Let the reactionary flaming begin!-CR
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055940</id>
	<title>Re:Xmarks, KeePass and Encrypted Zip combination</title>
	<author>ethan0</author>
	<datestamp>1257871860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I do something not far off from this, but replace the Xmarks synchronization thing with the portability of the firefox password hasher extension.</p><p>1. about the same, make a long master password.<br>2. use the fiirefox Password Hasher extension: <a href="http://wijjo.com/PasswordHasher" title="wijjo.com" rel="nofollow">http://wijjo.com/PasswordHasher</a> [wijjo.com] . It makes a hash using your master password with a site tag to come up with an individual password for each site you're on. So each site doesn't know the password for any other site, and you can either use the extension, or an html file (which calculates the hash with javascript) + copy/paste in order to get the password for any site, portably.</p></htmltext>
<tokenext>I do something not far off from this , but replace the Xmarks synchronization thing with the portability of the firefox password hasher extension.1 .
about the same , make a long master password.2 .
use the fiirefox Password Hasher extension : http : //wijjo.com/PasswordHasher [ wijjo.com ] .
It makes a hash using your master password with a site tag to come up with an individual password for each site you 're on .
So each site does n't know the password for any other site , and you can either use the extension , or an html file ( which calculates the hash with javascript ) + copy/paste in order to get the password for any site , portably .</tokentext>
<sentencetext>I do something not far off from this, but replace the Xmarks synchronization thing with the portability of the firefox password hasher extension.1.
about the same, make a long master password.2.
use the fiirefox Password Hasher extension: http://wijjo.com/PasswordHasher [wijjo.com] .
It makes a hash using your master password with a site tag to come up with an individual password for each site you're on.
So each site doesn't know the password for any other site, and you can either use the extension, or an html file (which calculates the hash with javascript) + copy/paste in order to get the password for any site, portably.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054488</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054940</id>
	<title>Formula-derived</title>
	<author>Mr Fodder</author>
	<datestamp>1257865680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>A trick I learned on Slashdot long ago that has served me well over the years is to use a formula-based password whereby you have a constant formula combined with an application-specific salt.  Take this simplified example for web pages, say I wanted a password for slashdot:</p><p>1) Take each alternate letter of the server root section of the url:  "saho"<br>2) Append the remaining letters of the url so you now come to "saholsdt"<br>3) Sprinkle in a bit of your username after every second letter: "sakhodlsadtn"<br>4) And finally add a few numbers, say the last two letters of the server root converted to ascii:  "15sakhodsadtn20"</p><p>Hopefully you get the idea.  What you end up with is a password that is unique per-site or application but - assuming you use a consistent formula every time - is easy for you to remember.  Other than a few exceptions I have been able to store my passwords nowhere else but my head.  (Work-related passwords that expire every month have been the exception, the solution for me was to write down nothing but the salt and apply my formula accordingly)</p></htmltext>
<tokenext>A trick I learned on Slashdot long ago that has served me well over the years is to use a formula-based password whereby you have a constant formula combined with an application-specific salt .
Take this simplified example for web pages , say I wanted a password for slashdot : 1 ) Take each alternate letter of the server root section of the url : " saho " 2 ) Append the remaining letters of the url so you now come to " saholsdt " 3 ) Sprinkle in a bit of your username after every second letter : " sakhodlsadtn " 4 ) And finally add a few numbers , say the last two letters of the server root converted to ascii : " 15sakhodsadtn20 " Hopefully you get the idea .
What you end up with is a password that is unique per-site or application but - assuming you use a consistent formula every time - is easy for you to remember .
Other than a few exceptions I have been able to store my passwords nowhere else but my head .
( Work-related passwords that expire every month have been the exception , the solution for me was to write down nothing but the salt and apply my formula accordingly )</tokentext>
<sentencetext>A trick I learned on Slashdot long ago that has served me well over the years is to use a formula-based password whereby you have a constant formula combined with an application-specific salt.
Take this simplified example for web pages, say I wanted a password for slashdot:1) Take each alternate letter of the server root section of the url:  "saho"2) Append the remaining letters of the url so you now come to "saholsdt"3) Sprinkle in a bit of your username after every second letter: "sakhodlsadtn"4) And finally add a few numbers, say the last two letters of the server root converted to ascii:  "15sakhodsadtn20"Hopefully you get the idea.
What you end up with is a password that is unique per-site or application but - assuming you use a consistent formula every time - is easy for you to remember.
Other than a few exceptions I have been able to store my passwords nowhere else but my head.
(Work-related passwords that expire every month have been the exception, the solution for me was to write down nothing but the salt and apply my formula accordingly)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059428</id>
	<title>Free Steganos LockNote or Password Manager</title>
	<author>mdibiofuel</author>
	<datestamp>1257087540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I know these are Windows apps, but still very useful free apps:

Steganos Locknote: <a href="http://www.steganos.com/us/products/for-free/locknote/overview/" title="steganos.com" rel="nofollow">http://www.steganos.com/us/products/for-free/locknote/overview/</a> [steganos.com]

Steganos Password Manager: <a href="http://www.steganos.com/us/products/for-free/password-manager-free/overview/" title="steganos.com" rel="nofollow">http://www.steganos.com/us/products/for-free/password-manager-free/overview/</a> [steganos.com]</htmltext>
<tokenext>I know these are Windows apps , but still very useful free apps : Steganos Locknote : http : //www.steganos.com/us/products/for-free/locknote/overview/ [ steganos.com ] Steganos Password Manager : http : //www.steganos.com/us/products/for-free/password-manager-free/overview/ [ steganos.com ]</tokentext>
<sentencetext>I know these are Windows apps, but still very useful free apps:

Steganos Locknote: http://www.steganos.com/us/products/for-free/locknote/overview/ [steganos.com]

Steganos Password Manager: http://www.steganos.com/us/products/for-free/password-manager-free/overview/ [steganos.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056840</id>
	<title>I store them on my BlackBerry</title>
	<author>MyFirstNameIsPaul</author>
	<datestamp>1257880440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I just use a memo on my BlackBerry Bold.  I use the highest built-in encryption on the phone and it locks itself every 15 minutes.  For those not familiar with BlackBerries, a password attempt can only be made 5 times and then the device wipes itself.</p><p>
I back the phone up at least once a week, so even if I lose the phone I can easily reinstall my entire profile to a replacement, and the phone is never far from me.</p><p>
Maybe I trust in RIM too much, but it seems like security is pretty important to their business model.</p></htmltext>
<tokenext>I just use a memo on my BlackBerry Bold .
I use the highest built-in encryption on the phone and it locks itself every 15 minutes .
For those not familiar with BlackBerries , a password attempt can only be made 5 times and then the device wipes itself .
I back the phone up at least once a week , so even if I lose the phone I can easily reinstall my entire profile to a replacement , and the phone is never far from me .
Maybe I trust in RIM too much , but it seems like security is pretty important to their business model .</tokentext>
<sentencetext>I just use a memo on my BlackBerry Bold.
I use the highest built-in encryption on the phone and it locks itself every 15 minutes.
For those not familiar with BlackBerries, a password attempt can only be made 5 times and then the device wipes itself.
I back the phone up at least once a week, so even if I lose the phone I can easily reinstall my entire profile to a replacement, and the phone is never far from me.
Maybe I trust in RIM too much, but it seems like security is pretty important to their business model.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059174</id>
	<title>Web based system?</title>
	<author>dschuetz</author>
	<datestamp>1257085860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Anyone considered a web-based system? (preferably run on your own server, naturally).</p><p>This one looks interesting: <a href="http://www.alexanderinteractive.com/blog/2009/08/mortimer-password-manager-redesigned-v12.html" title="alexanderinteractive.com">http://www.alexanderinteractive.com/blog/2009/08/mortimer-password-manager-redesigned-v12.html</a> [alexanderinteractive.com] Uses PKI thoughout so everyone can have their own "copy" of individual shared accounts without divulging your personal passwords to other users of the system.</p></htmltext>
<tokenext>Anyone considered a web-based system ?
( preferably run on your own server , naturally ) .This one looks interesting : http : //www.alexanderinteractive.com/blog/2009/08/mortimer-password-manager-redesigned-v12.html [ alexanderinteractive.com ] Uses PKI thoughout so everyone can have their own " copy " of individual shared accounts without divulging your personal passwords to other users of the system .</tokentext>
<sentencetext>Anyone considered a web-based system?
(preferably run on your own server, naturally).This one looks interesting: http://www.alexanderinteractive.com/blog/2009/08/mortimer-password-manager-redesigned-v12.html [alexanderinteractive.com] Uses PKI thoughout so everyone can have their own "copy" of individual shared accounts without divulging your personal passwords to other users of the system.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064912</id>
	<title>Re:Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257066480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>KeePass is my favorite method. Not only does it generate strong passwords (mac address, 40, 128 or 256-bit key based) like this "FrLbOdmbb0SaGs2wx3ly" but you can use a shortcut key to have it auto fill the password for you in your browser/application and completely bypass your clipboard.</p><p>For backup I keep the database locally, on a RAID backup and in the cloud. Now I just have to remember one strong password to access all my other ones (hint: it's not the one above:).</p><p>You can also use it to store other sensitive information like account numbers for bills and what not.</p></htmltext>
<tokenext>KeePass is my favorite method .
Not only does it generate strong passwords ( mac address , 40 , 128 or 256-bit key based ) like this " FrLbOdmbb0SaGs2wx3ly " but you can use a shortcut key to have it auto fill the password for you in your browser/application and completely bypass your clipboard.For backup I keep the database locally , on a RAID backup and in the cloud .
Now I just have to remember one strong password to access all my other ones ( hint : it 's not the one above : ) .You can also use it to store other sensitive information like account numbers for bills and what not .</tokentext>
<sentencetext>KeePass is my favorite method.
Not only does it generate strong passwords (mac address, 40, 128 or 256-bit key based) like this "FrLbOdmbb0SaGs2wx3ly" but you can use a shortcut key to have it auto fill the password for you in your browser/application and completely bypass your clipboard.For backup I keep the database locally, on a RAID backup and in the cloud.
Now I just have to remember one strong password to access all my other ones (hint: it's not the one above:).You can also use it to store other sensitive information like account numbers for bills and what not.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054754</id>
	<title>Password Gorilla</title>
	<author>Lord Kano</author>
	<datestamp>1257864660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I had to address this same issue recently myself. I'm getting an increasing number of login/passwords. I won't use the same combination on any two sites and I'm in my 30s. I can't remember passwords like I could 10 years ago. For me <a href="http://www.fpx.de/fp/Software/Gorilla/" title="www.fpx.de" rel="nofollow">Password Gorilla</a> [www.fpx.de] was the product that fit all of my needs.</p><p>It's Free/OSS, runs on all major platforms, can be run from a flash drive and is compatible with the Password Safe file format.</p><p>LK</p></htmltext>
<tokenext>I had to address this same issue recently myself .
I 'm getting an increasing number of login/passwords .
I wo n't use the same combination on any two sites and I 'm in my 30s .
I ca n't remember passwords like I could 10 years ago .
For me Password Gorilla [ www.fpx.de ] was the product that fit all of my needs.It 's Free/OSS , runs on all major platforms , can be run from a flash drive and is compatible with the Password Safe file format.LK</tokentext>
<sentencetext>I had to address this same issue recently myself.
I'm getting an increasing number of login/passwords.
I won't use the same combination on any two sites and I'm in my 30s.
I can't remember passwords like I could 10 years ago.
For me Password Gorilla [www.fpx.de] was the product that fit all of my needs.It's Free/OSS, runs on all major platforms, can be run from a flash drive and is compatible with the Password Safe file format.LK</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</id>
	<title>Hashing Works</title>
	<author>Anonymous</author>
	<datestamp>1257865020000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>5</modscore>
	<htmltext>I use a mental hash for my less important passwords. That way all I have to do is look at the web site's name and run it through my hash function to come up with the password for that site. That way, I only have to remember the function and not the plethora of passwords.</htmltext>
<tokenext>I use a mental hash for my less important passwords .
That way all I have to do is look at the web site 's name and run it through my hash function to come up with the password for that site .
That way , I only have to remember the function and not the plethora of passwords .</tokentext>
<sentencetext>I use a mental hash for my less important passwords.
That way all I have to do is look at the web site's name and run it through my hash function to come up with the password for that site.
That way, I only have to remember the function and not the plethora of passwords.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055240</id>
	<title>Re:PasswordSafe</title>
	<author>tumutbound</author>
	<datestamp>1257867300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use PasswordSafe. I have Linux and Windows versions installed on a USB key along with the password database.
That way I can access my passwords no matter which (or whose) computer I'm on.</htmltext>
<tokenext>I use PasswordSafe .
I have Linux and Windows versions installed on a USB key along with the password database .
That way I can access my passwords no matter which ( or whose ) computer I 'm on .</tokentext>
<sentencetext>I use PasswordSafe.
I have Linux and Windows versions installed on a USB key along with the password database.
That way I can access my passwords no matter which (or whose) computer I'm on.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056778</id>
	<title>Re:Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257879660000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Agreed - Keepass (http://keepass.info/) is fantastic for this task - I would be lost without it now. Also, it's made me use better passwords with it's password generator, since I don't have the fear and loathing of having to remember another password - Keepass remembers it for me. Of course you need to be near your PC to use it - but I can live it that.</p><p>Also Keepass files work really nicely between PC/Mac/Linux with KeepassX.</p></htmltext>
<tokenext>Agreed - Keepass ( http : //keepass.info/ ) is fantastic for this task - I would be lost without it now .
Also , it 's made me use better passwords with it 's password generator , since I do n't have the fear and loathing of having to remember another password - Keepass remembers it for me .
Of course you need to be near your PC to use it - but I can live it that.Also Keepass files work really nicely between PC/Mac/Linux with KeepassX .</tokentext>
<sentencetext>Agreed - Keepass (http://keepass.info/) is fantastic for this task - I would be lost without it now.
Also, it's made me use better passwords with it's password generator, since I don't have the fear and loathing of having to remember another password - Keepass remembers it for me.
Of course you need to be near your PC to use it - but I can live it that.Also Keepass files work really nicely between PC/Mac/Linux with KeepassX.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054580</id>
	<title>Hmm</title>
	<author>Anonymous</author>
	<datestamp>1257863940000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>The ideal tool in my mind should be something that is independent of any application, browser, or computer; something that is easily carried, but which if lost poses no risk of compromise. What does the Slashdot crowd like in password tools?"</p></div><p>I've come up with an incredible solution to your problem!</p><p>Used condom wrapper: It fits in your wallet. It's easy to come by. Almost nobody will stop to pick up and investigate your used condom wrapper for secret passwords.</p><p>Pros:<br>- It's highly likely to be thrown away by a pissed-off janitor if it is found<br>- It could be infected with a disease, so people won't want to touch it<br>- It gives you "this geek may have had sex cred", and believe you-me... That comes in handy</p><p>Cons:<br>- If you keep it in your pocket and it gets washed, you might have some 'splaining to do to your committed girlfriend or wife</p><p>Other than that, it's pretty much a perfect idea.</p><p>I'll Paypal you an invoice for my time. TIA.</p></div>
	</htmltext>
<tokenext>The ideal tool in my mind should be something that is independent of any application , browser , or computer ; something that is easily carried , but which if lost poses no risk of compromise .
What does the Slashdot crowd like in password tools ?
" I 've come up with an incredible solution to your problem ! Used condom wrapper : It fits in your wallet .
It 's easy to come by .
Almost nobody will stop to pick up and investigate your used condom wrapper for secret passwords.Pros : - It 's highly likely to be thrown away by a pissed-off janitor if it is found- It could be infected with a disease , so people wo n't want to touch it- It gives you " this geek may have had sex cred " , and believe you-me... That comes in handyCons : - If you keep it in your pocket and it gets washed , you might have some 'splaining to do to your committed girlfriend or wifeOther than that , it 's pretty much a perfect idea.I 'll Paypal you an invoice for my time .
TIA .</tokentext>
<sentencetext>The ideal tool in my mind should be something that is independent of any application, browser, or computer; something that is easily carried, but which if lost poses no risk of compromise.
What does the Slashdot crowd like in password tools?
"I've come up with an incredible solution to your problem!Used condom wrapper: It fits in your wallet.
It's easy to come by.
Almost nobody will stop to pick up and investigate your used condom wrapper for secret passwords.Pros:- It's highly likely to be thrown away by a pissed-off janitor if it is found- It could be infected with a disease, so people won't want to touch it- It gives you "this geek may have had sex cred", and believe you-me... That comes in handyCons:- If you keep it in your pocket and it gets washed, you might have some 'splaining to do to your committed girlfriend or wifeOther than that, it's pretty much a perfect idea.I'll Paypal you an invoice for my time.
TIA.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056728</id>
	<title>Personal Identity Portal from Verisign</title>
	<author>geckopelli</author>
	<datestamp>1257879180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>been playing with pip.verisignlabs.com for password protection. Nifty  browser interface, multiple layers of security...</htmltext>
<tokenext>been playing with pip.verisignlabs.com for password protection .
Nifty browser interface , multiple layers of security.. .</tokentext>
<sentencetext>been playing with pip.verisignlabs.com for password protection.
Nifty  browser interface, multiple layers of security...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067856</id>
	<title>Re:1password for iPhone as well</title>
	<author>Axello</author>
	<datestamp>1257081900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>1Password not only works on the Mac, but it also syncs fairly easy with the same named application on your iPhone. So you have all your passwords encrypted with you, all the time!</htmltext>
<tokenext>1Password not only works on the Mac , but it also syncs fairly easy with the same named application on your iPhone .
So you have all your passwords encrypted with you , all the time !</tokentext>
<sentencetext>1Password not only works on the Mac, but it also syncs fairly easy with the same named application on your iPhone.
So you have all your passwords encrypted with you, all the time!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054530</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055136</id>
	<title>BRAIN</title>
	<author>Uzik2</author>
	<datestamp>1257866700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Mnemonic techniques work well, and will help you keep your brain active and healthy longer.</htmltext>
<tokenext>Mnemonic techniques work well , and will help you keep your brain active and healthy longer .</tokentext>
<sentencetext>Mnemonic techniques work well, and will help you keep your brain active and healthy longer.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056010</id>
	<title>Re:Full Disk Encryption</title>
	<author>AusIV</author>
	<datestamp>1257872340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Full disk encryption isn't a panacea for security. If someone nabs your laptop while it's off in the back seat of your car, you don't have much to worry about. If you get malware of some kind or if someone swipes your laptop while it's running, full disk encryption isn't going to help.<p>
Don't take this the wrong way, I encrypt my laptop and would encourage almost everyone to do the same, but you still have to be security conscious.</p></htmltext>
<tokenext>Full disk encryption is n't a panacea for security .
If someone nabs your laptop while it 's off in the back seat of your car , you do n't have much to worry about .
If you get malware of some kind or if someone swipes your laptop while it 's running , full disk encryption is n't going to help .
Do n't take this the wrong way , I encrypt my laptop and would encourage almost everyone to do the same , but you still have to be security conscious .</tokentext>
<sentencetext>Full disk encryption isn't a panacea for security.
If someone nabs your laptop while it's off in the back seat of your car, you don't have much to worry about.
If you get malware of some kind or if someone swipes your laptop while it's running, full disk encryption isn't going to help.
Don't take this the wrong way, I encrypt my laptop and would encourage almost everyone to do the same, but you still have to be security conscious.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054882</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30069930</id>
	<title>Secure Flash Drive.</title>
	<author>TrueBlueDreamer</author>
	<datestamp>1257104160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="https://www.ironkey.com/" title="ironkey.com" rel="nofollow">https://www.ironkey.com/</a> [ironkey.com]</htmltext>
<tokenext>https : //www.ironkey.com/ [ ironkey.com ]</tokentext>
<sentencetext>https://www.ironkey.com/ [ironkey.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054646</id>
	<title>supergenpass ?</title>
	<author>Anonymous</author>
	<datestamp>1257864240000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>no one mentioned http://supergenpass.com ?<br>supergenpass hashes the base url with your main password. you can also customize the length of the final password.<br>it works in every browser (bookmarklet) and you can also use it if you aren't on your computer with the mobile version.</p></htmltext>
<tokenext>no one mentioned http : //supergenpass.com ? supergenpass hashes the base url with your main password .
you can also customize the length of the final password.it works in every browser ( bookmarklet ) and you can also use it if you are n't on your computer with the mobile version .</tokentext>
<sentencetext>no one mentioned http://supergenpass.com ?supergenpass hashes the base url with your main password.
you can also customize the length of the final password.it works in every browser (bookmarklet) and you can also use it if you aren't on your computer with the mobile version.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472</id>
	<title>paper in your wallet</title>
	<author>Anonymous</author>
	<datestamp>1257863460000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>5</modscore>
	<htmltext><p>Keep them on a slip of paper, in your wallet.</p><p>but DONT list what each is for - you can remember that part easily enough</p></htmltext>
<tokenext>Keep them on a slip of paper , in your wallet.but DONT list what each is for - you can remember that part easily enough</tokentext>
<sentencetext>Keep them on a slip of paper, in your wallet.but DONT list what each is for - you can remember that part easily enough</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30098464</id>
	<title>Clipperz</title>
	<author>EdMcMan</author>
	<datestamp>1258221300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I like <a href="http://www.clipperz.com/" title="clipperz.com">Clipperz</a> [clipperz.com].  You don't need to have anything installed, which is nice.  They host your passwords in encrypted form.</p></htmltext>
<tokenext>I like Clipperz [ clipperz.com ] .
You do n't need to have anything installed , which is nice .
They host your passwords in encrypted form .</tokentext>
<sentencetext>I like Clipperz [clipperz.com].
You don't need to have anything installed, which is nice.
They host your passwords in encrypted form.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067748</id>
	<title>Anonymous Coward</title>
	<author>Anonymous</author>
	<datestamp>1257081120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Keep your most important papers and a list of passwords (unlabeled) in a safety deposit box at your bank</p></htmltext>
<tokenext>Keep your most important papers and a list of passwords ( unlabeled ) in a safety deposit box at your bank</tokentext>
<sentencetext>Keep your most important papers and a list of passwords (unlabeled) in a safety deposit box at your bank</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057784</id>
	<title>One strong password with a prefix</title>
	<author>fongaboo</author>
	<datestamp>1257070740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have taken to chosing one really strong password that I use for everything. But I add a two-character prefix to each one that corresponds to what the site/service/application is...

For instance, let's say my base password is 4n4lr4p3!

That means my login for Slashdot is really sd4n4lr4p3!<nobr> <wbr></nobr>...and my login for Google is go4n4lr4p3!</htmltext>
<tokenext>I have taken to chosing one really strong password that I use for everything .
But I add a two-character prefix to each one that corresponds to what the site/service/application is.. . For instance , let 's say my base password is 4n4lr4p3 !
That means my login for Slashdot is really sd4n4lr4p3 !
...and my login for Google is go4n4lr4p3 !</tokentext>
<sentencetext>I have taken to chosing one really strong password that I use for everything.
But I add a two-character prefix to each one that corresponds to what the site/service/application is...

For instance, let's say my base password is 4n4lr4p3!
That means my login for Slashdot is really sd4n4lr4p3!
...and my login for Google is go4n4lr4p3!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055390</id>
	<title>pwmd</title>
	<author>Anonymous</author>
	<datestamp>1257868140000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext>There is password manager daemon (<a href="http://bjk.sourceforge.net/pwmd/" title="sourceforge.net" rel="nofollow">pwmd</a> [sourceforge.net]). But there is no GUI. Applications that want to use it need to be patched to use libpwmd which also includes a command line client that can send passwords to stdout and then piped to xclip or whatever.</htmltext>
<tokenext>There is password manager daemon ( pwmd [ sourceforge.net ] ) .
But there is no GUI .
Applications that want to use it need to be patched to use libpwmd which also includes a command line client that can send passwords to stdout and then piped to xclip or whatever .</tokentext>
<sentencetext>There is password manager daemon (pwmd [sourceforge.net]).
But there is no GUI.
Applications that want to use it need to be patched to use libpwmd which also includes a command line client that can send passwords to stdout and then piped to xclip or whatever.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30091130</id>
	<title>My method...</title>
	<author>Anonymous</author>
	<datestamp>1258103460000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I don't turn on the 'save my password' on my notebook.  I keep all my passwords in a cloud-based file so they are available at all times on all computers should I forget them.  I need then remember only one wherever I am.  The file is not exactly encrypted, but has passwords listed in a highly personal code.  1968fire could meen MLK to me (many cities burned). But mine are even more personal than that so I think they are really just understandable as hints to my personal memory.  the sites they correpsond to are similarly encoded (but that's harder...).</p></htmltext>
<tokenext>I do n't turn on the 'save my password ' on my notebook .
I keep all my passwords in a cloud-based file so they are available at all times on all computers should I forget them .
I need then remember only one wherever I am .
The file is not exactly encrypted , but has passwords listed in a highly personal code .
1968fire could meen MLK to me ( many cities burned ) .
But mine are even more personal than that so I think they are really just understandable as hints to my personal memory .
the sites they correpsond to are similarly encoded ( but that 's harder... ) .</tokentext>
<sentencetext>I don't turn on the 'save my password' on my notebook.
I keep all my passwords in a cloud-based file so they are available at all times on all computers should I forget them.
I need then remember only one wherever I am.
The file is not exactly encrypted, but has passwords listed in a highly personal code.
1968fire could meen MLK to me (many cities burned).
But mine are even more personal than that so I think they are really just understandable as hints to my personal memory.
the sites they correpsond to are similarly encoded (but that's harder...).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060982</id>
	<title>Re:Xmarks, KeePass and Encrypted Zip combination</title>
	<author>Anonymous</author>
	<datestamp>1257094320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use <a href="http://www.foxmarks.com/" title="foxmarks.com" rel="nofollow">foxmarks</a> [foxmarks.com] (or Xmarks, as they call themselves now) for all the web passwords that I'm willing to let Firefox remember.  AES encrypted, available everywhere Firefox is.  Nice. Simple. Easy and Works.</p><p>The passwords that I put in there are variations of a few basic passwords. The passwords are simple plain english words, 3 to 8 characters long, and each letter maps to a random 2 letter assignment.  This map is generated by going to <a href="https://www.grc.com/passwords.htm" title="grc.com" rel="nofollow">GRC's password generator page</a> [grc.com] and taking the first two letters in the ascii printable list and assigning it to "a", the next two to "b" and so on.  I then follow with the numbers.  The is also a lower/alpha/number list which I do the same thing in case I run across a site that can't take special characters.</p><p>For example, when I went to the page for this post. I got the following string: "=f^9]pnLE70:uS6XYhev/ExPy\%)Ax}"  In this case a<nobr> <wbr></nobr>:= "=f"  b<nobr> <wbr></nobr>:= "^9", etc.  For the password base I would choose something like sea, which would then get translated into: DeE7=f   I would then add a simple (ie: 2-3 char plain text easy to remember), prefix or postfix to the password for the site.</p><p>At work I keep the alphabet list printed out and taped to the bottom of the center drawer of my desk.  This is secure because people would have to get past the armed guards and two locked doors to get to it.  Even if this wasn't the case, they would have to know what the base password is.</p><p>For non web based passwords I use <a href="http://keepass.info/" title="keepass.info" rel="nofollow">KeePassSafe</a> [keepass.info].  Even I don't really know what the password is for keepass, as I use both a keyfile, and a statically generated 32 character password (I use a <a href="http://www.yubico.com/products/yubikey" title="yubico.com" rel="nofollow">Yubikey</a> [yubico.com] in static mode for this.  I'm not concerned about losing the file, but if something happened to the key, I admit I'd be screwed.  Mostly I use it for the geek factor.  Before I got the yubikey, I used the above method with an 8 character base (and the keyfile)</p></htmltext>
<tokenext>I use foxmarks [ foxmarks.com ] ( or Xmarks , as they call themselves now ) for all the web passwords that I 'm willing to let Firefox remember .
AES encrypted , available everywhere Firefox is .
Nice. Simple .
Easy and Works.The passwords that I put in there are variations of a few basic passwords .
The passwords are simple plain english words , 3 to 8 characters long , and each letter maps to a random 2 letter assignment .
This map is generated by going to GRC 's password generator page [ grc.com ] and taking the first two letters in the ascii printable list and assigning it to " a " , the next two to " b " and so on .
I then follow with the numbers .
The is also a lower/alpha/number list which I do the same thing in case I run across a site that ca n't take special characters.For example , when I went to the page for this post .
I got the following string : " = f ^ 9 ] pnLE70 : uS6XYhev/ExPy \ % ) Ax } " In this case a : = " = f " b : = " ^ 9 " , etc .
For the password base I would choose something like sea , which would then get translated into : DeE7 = f I would then add a simple ( ie : 2-3 char plain text easy to remember ) , prefix or postfix to the password for the site.At work I keep the alphabet list printed out and taped to the bottom of the center drawer of my desk .
This is secure because people would have to get past the armed guards and two locked doors to get to it .
Even if this was n't the case , they would have to know what the base password is.For non web based passwords I use KeePassSafe [ keepass.info ] .
Even I do n't really know what the password is for keepass , as I use both a keyfile , and a statically generated 32 character password ( I use a Yubikey [ yubico.com ] in static mode for this .
I 'm not concerned about losing the file , but if something happened to the key , I admit I 'd be screwed .
Mostly I use it for the geek factor .
Before I got the yubikey , I used the above method with an 8 character base ( and the keyfile )</tokentext>
<sentencetext>I use foxmarks [foxmarks.com] (or Xmarks, as they call themselves now) for all the web passwords that I'm willing to let Firefox remember.
AES encrypted, available everywhere Firefox is.
Nice. Simple.
Easy and Works.The passwords that I put in there are variations of a few basic passwords.
The passwords are simple plain english words, 3 to 8 characters long, and each letter maps to a random 2 letter assignment.
This map is generated by going to GRC's password generator page [grc.com] and taking the first two letters in the ascii printable list and assigning it to "a", the next two to "b" and so on.
I then follow with the numbers.
The is also a lower/alpha/number list which I do the same thing in case I run across a site that can't take special characters.For example, when I went to the page for this post.
I got the following string: "=f^9]pnLE70:uS6XYhev/ExPy\%)Ax}"  In this case a := "=f"  b := "^9", etc.
For the password base I would choose something like sea, which would then get translated into: DeE7=f   I would then add a simple (ie: 2-3 char plain text easy to remember), prefix or postfix to the password for the site.At work I keep the alphabet list printed out and taped to the bottom of the center drawer of my desk.
This is secure because people would have to get past the armed guards and two locked doors to get to it.
Even if this wasn't the case, they would have to know what the base password is.For non web based passwords I use KeePassSafe [keepass.info].
Even I don't really know what the password is for keepass, as I use both a keyfile, and a statically generated 32 character password (I use a Yubikey [yubico.com] in static mode for this.
I'm not concerned about losing the file, but if something happened to the key, I admit I'd be screwed.
Mostly I use it for the geek factor.
Before I got the yubikey, I used the above method with an 8 character base (and the keyfile)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054488</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056110</id>
	<title>I use my Blackberry</title>
	<author>CaptainTux</author>
	<datestamp>1257873360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have an enormous amount of personal data on my Blackberry - all encrypted and all safe. If I lose my device, everything is password protected and Blackberry is known for security. I even have a remote wipe utility so I can kill it right away if it's ever stolen.  I store all my passwords there, right in the "Password Keeper" application.</htmltext>
<tokenext>I have an enormous amount of personal data on my Blackberry - all encrypted and all safe .
If I lose my device , everything is password protected and Blackberry is known for security .
I even have a remote wipe utility so I can kill it right away if it 's ever stolen .
I store all my passwords there , right in the " Password Keeper " application .</tokentext>
<sentencetext>I have an enormous amount of personal data on my Blackberry - all encrypted and all safe.
If I lose my device, everything is password protected and Blackberry is known for security.
I even have a remote wipe utility so I can kill it right away if it's ever stolen.
I store all my passwords there, right in the "Password Keeper" application.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059072</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>corbettw</author>
	<datestamp>1257085020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Except the one that takes over your webcam...</p></htmltext>
<tokenext>Except the one that takes over your webcam.. .</tokentext>
<sentencetext>Except the one that takes over your webcam...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054604</id>
	<title>Ironkey</title>
	<author>xav\_jones</author>
	<datestamp>1257864000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I've been thinking almost the same thing for a little while now. One of the solutions I think might work is an <a href="https://www.ironkey.com/" title="ironkey.com" rel="nofollow">IronKey</a> [ironkey.com]. While remembering passwords isn't so much of an issue for me it will be for my wife if, heaven forbid, something should happen to me.I'd very much like her to have easy access to important information -- things like banking passwords, insurance and retirement accounts come to mind. I'd also probably put scans of important documents on there -- not that you could use a printed copy -- but more of a database to make ordering new documents easier if there was an emergency and those documents were lost.

It is also important that it be as cross-platform as possible, since I may not be around to get it to work.<nobr> <wbr></nobr>:\ I haven't really come across a software-only solution that fulfills most of these criteria.</htmltext>
<tokenext>I 've been thinking almost the same thing for a little while now .
One of the solutions I think might work is an IronKey [ ironkey.com ] .
While remembering passwords is n't so much of an issue for me it will be for my wife if , heaven forbid , something should happen to me.I 'd very much like her to have easy access to important information -- things like banking passwords , insurance and retirement accounts come to mind .
I 'd also probably put scans of important documents on there -- not that you could use a printed copy -- but more of a database to make ordering new documents easier if there was an emergency and those documents were lost .
It is also important that it be as cross-platform as possible , since I may not be around to get it to work .
: \ I have n't really come across a software-only solution that fulfills most of these criteria .</tokentext>
<sentencetext>I've been thinking almost the same thing for a little while now.
One of the solutions I think might work is an IronKey [ironkey.com].
While remembering passwords isn't so much of an issue for me it will be for my wife if, heaven forbid, something should happen to me.I'd very much like her to have easy access to important information -- things like banking passwords, insurance and retirement accounts come to mind.
I'd also probably put scans of important documents on there -- not that you could use a printed copy -- but more of a database to make ordering new documents easier if there was an emergency and those documents were lost.
It is also important that it be as cross-platform as possible, since I may not be around to get it to work.
:\ I haven't really come across a software-only solution that fulfills most of these criteria.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054880</id>
	<title>VIM</title>
	<author>bvt</author>
	<datestamp>1257865320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I've been using a VIM password file for seven years now.  Just enable encryption on VIM, and it seems good enough; lightweight and works on any machine.</htmltext>
<tokenext>I 've been using a VIM password file for seven years now .
Just enable encryption on VIM , and it seems good enough ; lightweight and works on any machine .</tokentext>
<sentencetext>I've been using a VIM password file for seven years now.
Just enable encryption on VIM, and it seems good enough; lightweight and works on any machine.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055604</id>
	<title>Devise a scheme of your own</title>
	<author>joelpt</author>
	<datestamp>1257869640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>In order to use a unique password for every website and still be able to remember them, devise a secret scheme based on the site name.</p><p>An example scheme:</p><p>google.com -&gt; 'xgooHoo'<br>digg.com -&gt; 'xdigEig'<br>ebay.com -&gt; 'xebaFba'<br>facebook.com -&gt; 'xfacGac'<br>etc.</p><p>As long as you don't divulge your methodology to anybody, most people won't be able to "guess" your passwords between sites. I've even had friends witness me typing in some passwords in the clear, and they didn't recognize that a methodology was being used.</p><p>Of course, if a real dedicated hacker wants to crack your personal code, they would probably have enough information to do it if they had access to a small subset of your used passwords. Though if somebody's really that dedicated to cracking your passwords, most software and hardware solutions are also going to be just as easily compromised.</p><p>Given the requirements of many sites today, it's also a good idea to mix some numbers and capital letters into your scheme, so that you don't have to create any 'special case' passwords for the odd super-finicky site.</p></htmltext>
<tokenext>In order to use a unique password for every website and still be able to remember them , devise a secret scheme based on the site name.An example scheme : google.com - &gt; 'xgooHoo'digg.com - &gt; 'xdigEig'ebay.com - &gt; 'xebaFba'facebook.com - &gt; 'xfacGac'etc.As long as you do n't divulge your methodology to anybody , most people wo n't be able to " guess " your passwords between sites .
I 've even had friends witness me typing in some passwords in the clear , and they did n't recognize that a methodology was being used.Of course , if a real dedicated hacker wants to crack your personal code , they would probably have enough information to do it if they had access to a small subset of your used passwords .
Though if somebody 's really that dedicated to cracking your passwords , most software and hardware solutions are also going to be just as easily compromised.Given the requirements of many sites today , it 's also a good idea to mix some numbers and capital letters into your scheme , so that you do n't have to create any 'special case ' passwords for the odd super-finicky site .</tokentext>
<sentencetext>In order to use a unique password for every website and still be able to remember them, devise a secret scheme based on the site name.An example scheme:google.com -&gt; 'xgooHoo'digg.com -&gt; 'xdigEig'ebay.com -&gt; 'xebaFba'facebook.com -&gt; 'xfacGac'etc.As long as you don't divulge your methodology to anybody, most people won't be able to "guess" your passwords between sites.
I've even had friends witness me typing in some passwords in the clear, and they didn't recognize that a methodology was being used.Of course, if a real dedicated hacker wants to crack your personal code, they would probably have enough information to do it if they had access to a small subset of your used passwords.
Though if somebody's really that dedicated to cracking your passwords, most software and hardware solutions are also going to be just as easily compromised.Given the requirements of many sites today, it's also a good idea to mix some numbers and capital letters into your scheme, so that you don't have to create any 'special case' passwords for the odd super-finicky site.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055102</id>
	<title>password safe</title>
	<author>tbischel</author>
	<datestamp>1257866580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use <a href="http://passwordsafe.sourceforge.net/" title="sourceforge.net" rel="nofollow">password safe</a> [sourceforge.net], where I keep the encrypted password data file on a thumb drive, and backed up on my home computer.  The program helps you organize passwords with categories, one click copy-paste to the clipboard (and clears the clipboard when the program is minimized or closed), and auto-generation based on a specified password policy.</htmltext>
<tokenext>I use password safe [ sourceforge.net ] , where I keep the encrypted password data file on a thumb drive , and backed up on my home computer .
The program helps you organize passwords with categories , one click copy-paste to the clipboard ( and clears the clipboard when the program is minimized or closed ) , and auto-generation based on a specified password policy .</tokentext>
<sentencetext>I use password safe [sourceforge.net], where I keep the encrypted password data file on a thumb drive, and backed up on my home computer.
The program helps you organize passwords with categories, one click copy-paste to the clipboard (and clears the clipboard when the program is minimized or closed), and auto-generation based on a specified password policy.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055326</id>
	<title>Use Bento on the Mac</title>
	<author>Anonymous</author>
	<datestamp>1257867780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Bento - put out by Apple if you use a Mac.   It's a small personal database - so you can do a lot more with it.  But it also includes a great encrypted field - AND it will sync your password database to your iPhone if you want, and give you access almost anywhere.</p></htmltext>
<tokenext>Bento - put out by Apple if you use a Mac .
It 's a small personal database - so you can do a lot more with it .
But it also includes a great encrypted field - AND it will sync your password database to your iPhone if you want , and give you access almost anywhere .</tokentext>
<sentencetext>Bento - put out by Apple if you use a Mac.
It's a small personal database - so you can do a lot more with it.
But it also includes a great encrypted field - AND it will sync your password database to your iPhone if you want, and give you access almost anywhere.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055874</id>
	<title>HP Labs solved this</title>
	<author>Anonymous</author>
	<datestamp>1257871380000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>HP Labs has a small program called SitePass. It uses a hashing system between a master password and a public info, such as a domain name.</p><p>Example:<br>master password of qwerty<br>site name of amazon<br>generates the password of SHX9AGgvKIls</p><p>Same password every time. If you lose your computer, there is no risk to your accounts, since nothing is saved besides the actual program, and you can always recover them on a new computer by downloading the SitePass program again.</p><p>URL to website (including code and executables): http://www.hpl.hp.com/personal/Alan\_Karp/site\_password/index.html</p></htmltext>
<tokenext>HP Labs has a small program called SitePass .
It uses a hashing system between a master password and a public info , such as a domain name.Example : master password of qwertysite name of amazongenerates the password of SHX9AGgvKIlsSame password every time .
If you lose your computer , there is no risk to your accounts , since nothing is saved besides the actual program , and you can always recover them on a new computer by downloading the SitePass program again.URL to website ( including code and executables ) : http : //www.hpl.hp.com/personal/Alan \ _Karp/site \ _password/index.html</tokentext>
<sentencetext>HP Labs has a small program called SitePass.
It uses a hashing system between a master password and a public info, such as a domain name.Example:master password of qwertysite name of amazongenerates the password of SHX9AGgvKIlsSame password every time.
If you lose your computer, there is no risk to your accounts, since nothing is saved besides the actual program, and you can always recover them on a new computer by downloading the SitePass program again.URL to website (including code and executables): http://www.hpl.hp.com/personal/Alan\_Karp/site\_password/index.html</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056968</id>
	<title>Fingerprint Reader</title>
	<author>abelenky17</author>
	<datestamp>1257881940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I really enjoy the fingerprint readers from UPEK (http://www.upek.com/).</p><p>The device knows my passwords, and I can log into sites with just a finger swipe.<br>It is both faster and more accurate than typing a password (no typos... re-try is just another finger-swipe if it didn't read properly).</p><p>You can unplug the USB fingerprint reader and keep it separate from your computer if you want to be extra paranoid.</p></htmltext>
<tokenext>I really enjoy the fingerprint readers from UPEK ( http : //www.upek.com/ ) .The device knows my passwords , and I can log into sites with just a finger swipe.It is both faster and more accurate than typing a password ( no typos... re-try is just another finger-swipe if it did n't read properly ) .You can unplug the USB fingerprint reader and keep it separate from your computer if you want to be extra paranoid .</tokentext>
<sentencetext>I really enjoy the fingerprint readers from UPEK (http://www.upek.com/).The device knows my passwords, and I can log into sites with just a finger swipe.It is both faster and more accurate than typing a password (no typos... re-try is just another finger-swipe if it didn't read properly).You can unplug the USB fingerprint reader and keep it separate from your computer if you want to be extra paranoid.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055796</id>
	<title>Re:Never store your passwords!</title>
	<author>HamburglerJones</author>
	<datestamp>1257870840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>/*brute force attack*/
do {
check\_if\_password\_is("Wh3rzIzM!M0ny?")
} while {0}</htmltext>
<tokenext>/ * brute force attack * / do { check \ _if \ _password \ _is ( " Wh3rzIzM ! M0ny ?
" ) } while { 0 }</tokentext>
<sentencetext>/*brute force attack*/
do {
check\_if\_password\_is("Wh3rzIzM!M0ny?
")
} while {0}</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055282</id>
	<title>Firefox has the ability to set a master password</title>
	<author>PFAK</author>
	<datestamp>1257867540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I don't know why this hasn't been mentioned, but you can set a master password on your Firefox password manager to make sure that your passwords are kept secure via encryption.</p></htmltext>
<tokenext>I do n't know why this has n't been mentioned , but you can set a master password on your Firefox password manager to make sure that your passwords are kept secure via encryption .</tokentext>
<sentencetext>I don't know why this hasn't been mentioned, but you can set a master password on your Firefox password manager to make sure that your passwords are kept secure via encryption.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30066452</id>
	<title>Re:paper in your wallet</title>
	<author>jcdill</author>
	<datestamp>1257073680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p> Guard that sheet like you would your credit cards. If your wallet is lost, immediately set all your passwords to something temporary then build a new password list all over again.</p></div><p>I don't think you thought this one thru very carefully.  Once the wallet is lost, how would he login to all his accounts to reset the passwords?</p><p>Most websites have a function to email you your password, or to reset and email you your new password.  But that doesn't work if you don't remember your email password and you lost that slip of paper...</p></div>
	</htmltext>
<tokenext>Guard that sheet like you would your credit cards .
If your wallet is lost , immediately set all your passwords to something temporary then build a new password list all over again.I do n't think you thought this one thru very carefully .
Once the wallet is lost , how would he login to all his accounts to reset the passwords ? Most websites have a function to email you your password , or to reset and email you your new password .
But that does n't work if you do n't remember your email password and you lost that slip of paper.. .</tokentext>
<sentencetext> Guard that sheet like you would your credit cards.
If your wallet is lost, immediately set all your passwords to something temporary then build a new password list all over again.I don't think you thought this one thru very carefully.
Once the wallet is lost, how would he login to all his accounts to reset the passwords?Most websites have a function to email you your password, or to reset and email you your new password.
But that doesn't work if you don't remember your email password and you lost that slip of paper...
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061644</id>
	<title>I do something similar, but better.</title>
	<author>Wolfier</author>
	<datestamp>1257096840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I create a simple HTML page with a Javascript.</p><p>The HTML lets me input the site name, and a master password.  And then the Javascript will generate a password for me.</p><p>The Javascript algorithm is simple, it involves some summing, modulos, lengths, and Base 36 conversion at the end to give me an alphanumeric password.  So far works all the time.  I can specify the length of the desired password.  If a number is required and the password does not contain it, I simply append a "0" at the end.</p><p>You can also play with CSS to make your password field invisible, etc.  The only caveat is you want to copy some junk to the clipboard afterward to erase the copied-and-pasted password.</p><p>I made the algorithm so simple I could reimplement it from scratch on an Excel spreadsheet with built-in functions, no VBA.</p><p>The key to create your own algorithm is that, you're trying to make a simple hash.  Try to make it so that changing one character either in the site name or the master password would make the entire password look different, not just a single character at some corresponding position.</p><p>If you don't want to bother with your own algorithm, you can just md5sum a concatenation of the site name and master password.  I don't like this method because the master password must either be stored in a file or typed in the command line, which will be in the command line history, which may get backed up by mistake if you're at work and don't clear your history quickly.  Also, md5sum may not be available on every computer - my own algorithm is easy enough to be constructed from scratch in a minute or 2.</p></htmltext>
<tokenext>I create a simple HTML page with a Javascript.The HTML lets me input the site name , and a master password .
And then the Javascript will generate a password for me.The Javascript algorithm is simple , it involves some summing , modulos , lengths , and Base 36 conversion at the end to give me an alphanumeric password .
So far works all the time .
I can specify the length of the desired password .
If a number is required and the password does not contain it , I simply append a " 0 " at the end.You can also play with CSS to make your password field invisible , etc .
The only caveat is you want to copy some junk to the clipboard afterward to erase the copied-and-pasted password.I made the algorithm so simple I could reimplement it from scratch on an Excel spreadsheet with built-in functions , no VBA.The key to create your own algorithm is that , you 're trying to make a simple hash .
Try to make it so that changing one character either in the site name or the master password would make the entire password look different , not just a single character at some corresponding position.If you do n't want to bother with your own algorithm , you can just md5sum a concatenation of the site name and master password .
I do n't like this method because the master password must either be stored in a file or typed in the command line , which will be in the command line history , which may get backed up by mistake if you 're at work and do n't clear your history quickly .
Also , md5sum may not be available on every computer - my own algorithm is easy enough to be constructed from scratch in a minute or 2 .</tokentext>
<sentencetext>I create a simple HTML page with a Javascript.The HTML lets me input the site name, and a master password.
And then the Javascript will generate a password for me.The Javascript algorithm is simple, it involves some summing, modulos, lengths, and Base 36 conversion at the end to give me an alphanumeric password.
So far works all the time.
I can specify the length of the desired password.
If a number is required and the password does not contain it, I simply append a "0" at the end.You can also play with CSS to make your password field invisible, etc.
The only caveat is you want to copy some junk to the clipboard afterward to erase the copied-and-pasted password.I made the algorithm so simple I could reimplement it from scratch on an Excel spreadsheet with built-in functions, no VBA.The key to create your own algorithm is that, you're trying to make a simple hash.
Try to make it so that changing one character either in the site name or the master password would make the entire password look different, not just a single character at some corresponding position.If you don't want to bother with your own algorithm, you can just md5sum a concatenation of the site name and master password.
I don't like this method because the master password must either be stored in a file or typed in the command line, which will be in the command line history, which may get backed up by mistake if you're at work and don't clear your history quickly.
Also, md5sum may not be available on every computer - my own algorithm is easy enough to be constructed from scratch in a minute or 2.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055558</id>
	<title>Use effective Mnemonics</title>
	<author>originalhack</author>
	<datestamp>1257869280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Write down mnemonics that make sense to you but would be of little help to anyone else.  For example, "rabbit food" might remind you of a password like "bbl2e^s".   That would be because you based the password on "bugs bunny like to eat carrots"<br><br>If you do this right, even someone who finds your list AND knows one or two of your passwords would not be able to infer the others.</htmltext>
<tokenext>Write down mnemonics that make sense to you but would be of little help to anyone else .
For example , " rabbit food " might remind you of a password like " bbl2e ^ s " .
That would be because you based the password on " bugs bunny like to eat carrots " If you do this right , even someone who finds your list AND knows one or two of your passwords would not be able to infer the others .</tokentext>
<sentencetext>Write down mnemonics that make sense to you but would be of little help to anyone else.
For example, "rabbit food" might remind you of a password like "bbl2e^s".
That would be because you based the password on "bugs bunny like to eat carrots"If you do this right, even someone who finds your list AND knows one or two of your passwords would not be able to infer the others.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057138</id>
	<title>Re:Never store your passwords!</title>
	<author>cgenman</author>
	<datestamp>1257106080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I seriously hope that you're kidding.  Sadly <i>most</i> of us could store our passwords in a zip file on our webservers, and nobody would care enough to bother downloading it.  My FTP server has prompted people with the login password for years, yet there has not been an unauthorized access yet (despite tens of thousands of automated break-in attempts).  Even when talking about high-profile targets, people seem to either get lucky, guess passwords, or sniff them.  The idea of trying to break into your office and look for stickies on the monitor is a bit silly for 99.99\% of users.  Ultimately, you're just going to get your credit card numbers skimmed when one of your merchants downloads a copy of Office from a torrent site anyway.</p><p>If you really want something secure but useable, create a system of password generation, based on the site that you're visiting.    Take the site name with something else (say, e...2.71828182845904523536028747135266249775), munge them together, and off you go.  Say that you're at bankofamerica.com.  Password could equal 5 down and 5 back from the end... acire...  27182.... 2a7c1i8r2e.  As a password, it's completely unguessable, and it doesn't translate well between sites.  But since you know the system used to create the password (some pre-memorized sequence of numbers, and the name itself), you're generating unique passwords that don't cross sites, but that you can create on demand instead of memorizing.</p><p>Or just accept that nobody really cares, and make a KeePass database on a thumb drive somewhere.  Really, the latter is fine for nearly everybody.</p></htmltext>
<tokenext>I seriously hope that you 're kidding .
Sadly most of us could store our passwords in a zip file on our webservers , and nobody would care enough to bother downloading it .
My FTP server has prompted people with the login password for years , yet there has not been an unauthorized access yet ( despite tens of thousands of automated break-in attempts ) .
Even when talking about high-profile targets , people seem to either get lucky , guess passwords , or sniff them .
The idea of trying to break into your office and look for stickies on the monitor is a bit silly for 99.99 \ % of users .
Ultimately , you 're just going to get your credit card numbers skimmed when one of your merchants downloads a copy of Office from a torrent site anyway.If you really want something secure but useable , create a system of password generation , based on the site that you 're visiting .
Take the site name with something else ( say , e...2.71828182845904523536028747135266249775 ) , munge them together , and off you go .
Say that you 're at bankofamerica.com .
Password could equal 5 down and 5 back from the end... acire... 27182.... 2a7c1i8r2e. As a password , it 's completely unguessable , and it does n't translate well between sites .
But since you know the system used to create the password ( some pre-memorized sequence of numbers , and the name itself ) , you 're generating unique passwords that do n't cross sites , but that you can create on demand instead of memorizing.Or just accept that nobody really cares , and make a KeePass database on a thumb drive somewhere .
Really , the latter is fine for nearly everybody .</tokentext>
<sentencetext>I seriously hope that you're kidding.
Sadly most of us could store our passwords in a zip file on our webservers, and nobody would care enough to bother downloading it.
My FTP server has prompted people with the login password for years, yet there has not been an unauthorized access yet (despite tens of thousands of automated break-in attempts).
Even when talking about high-profile targets, people seem to either get lucky, guess passwords, or sniff them.
The idea of trying to break into your office and look for stickies on the monitor is a bit silly for 99.99\% of users.
Ultimately, you're just going to get your credit card numbers skimmed when one of your merchants downloads a copy of Office from a torrent site anyway.If you really want something secure but useable, create a system of password generation, based on the site that you're visiting.
Take the site name with something else (say, e...2.71828182845904523536028747135266249775), munge them together, and off you go.
Say that you're at bankofamerica.com.
Password could equal 5 down and 5 back from the end... acire...  27182.... 2a7c1i8r2e.  As a password, it's completely unguessable, and it doesn't translate well between sites.
But since you know the system used to create the password (some pre-memorized sequence of numbers, and the name itself), you're generating unique passwords that don't cross sites, but that you can create on demand instead of memorizing.Or just accept that nobody really cares, and make a KeePass database on a thumb drive somewhere.
Really, the latter is fine for nearly everybody.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055580</id>
	<title>Copy and Paste from Password Safe</title>
	<author>Gim Tom</author>
	<datestamp>1257869460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have seen Password Safe recommended in a number of comments and I use it for any "sensitive" passwords.  You still need to remember one master password for it, but that's easier than keeping track of dozens of them.

I have also found that in using Password Safe I am MUCH more likely to use a stronger password for two reasons.  One is I don't have to memorize it and even more important is I don't have to type it.  I just copy and paste from Password Safe.

Of course, like my Grandfather said about locks, passwords only keep the honest folks out.</htmltext>
<tokenext>I have seen Password Safe recommended in a number of comments and I use it for any " sensitive " passwords .
You still need to remember one master password for it , but that 's easier than keeping track of dozens of them .
I have also found that in using Password Safe I am MUCH more likely to use a stronger password for two reasons .
One is I do n't have to memorize it and even more important is I do n't have to type it .
I just copy and paste from Password Safe .
Of course , like my Grandfather said about locks , passwords only keep the honest folks out .</tokentext>
<sentencetext>I have seen Password Safe recommended in a number of comments and I use it for any "sensitive" passwords.
You still need to remember one master password for it, but that's easier than keeping track of dozens of them.
I have also found that in using Password Safe I am MUCH more likely to use a stronger password for two reasons.
One is I don't have to memorize it and even more important is I don't have to type it.
I just copy and paste from Password Safe.
Of course, like my Grandfather said about locks, passwords only keep the honest folks out.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055186</id>
	<title>SuperGenPass</title>
	<author>crasher35</author>
	<datestamp>1257867000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>As long as you have internet access, <a href="http://www.supergenpass.com/" title="supergenpass.com" rel="nofollow">SuperGenPass</a> [supergenpass.com] is a great option.  It's a little bookmarklet where you type a master password, it will account for the domain you're currently on, and then generate a random password based on both.  So, as long as you provide it with the same master password for the same website, it will always generate the same password.  And as long as you have access to the internet you can always use it (when you're on the go, try SuperGenPass.com/mobile).  I actually use it outside of the web as well.  I will just use the name of the application as the domain name.</htmltext>
<tokenext>As long as you have internet access , SuperGenPass [ supergenpass.com ] is a great option .
It 's a little bookmarklet where you type a master password , it will account for the domain you 're currently on , and then generate a random password based on both .
So , as long as you provide it with the same master password for the same website , it will always generate the same password .
And as long as you have access to the internet you can always use it ( when you 're on the go , try SuperGenPass.com/mobile ) .
I actually use it outside of the web as well .
I will just use the name of the application as the domain name .</tokentext>
<sentencetext>As long as you have internet access, SuperGenPass [supergenpass.com] is a great option.
It's a little bookmarklet where you type a master password, it will account for the domain you're currently on, and then generate a random password based on both.
So, as long as you provide it with the same master password for the same website, it will always generate the same password.
And as long as you have access to the internet you can always use it (when you're on the go, try SuperGenPass.com/mobile).
I actually use it outside of the web as well.
I will just use the name of the application as the domain name.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056488</id>
	<title>Re:Hashing Works</title>
	<author>Graff</author>
	<datestamp>1257877200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>I use a mental hash for my less important passwords. That way all I have to do is look at the web site's name and run it through my hash function to come up with the password for that site. That way, I only have to remember the function and not the plethora of passwords.</p></div><p>It's a great idea and one that I've used in the past.  What gets me are the PITA rules that some web sites use for passwords.  Some want a certain amount of characters, some allow special characters others don't and even others REQUIRE them.  My personal pet peeve: sites that force you to change passwords every so often and then don't let you re-use old ones.</p><p>I have a great idea: let ME determine if my password is secure enough.  Don't try to force me to have a secure password, either I'm smart enough to come up with a reasonably secure password or I deserve to be hacked for not making one.</p><p>With all this it's tough to come up with a universal function to generate a password on the fly.  You usually need 2 or 3 functions to adequately cover all situations and it's just too much work for me.  I ended up using Mac OS X's built-in Keychain when I'm at my computer and a memorized prefix + a written down suffix for when I'm away from my computer.</p></div>
	</htmltext>
<tokenext>I use a mental hash for my less important passwords .
That way all I have to do is look at the web site 's name and run it through my hash function to come up with the password for that site .
That way , I only have to remember the function and not the plethora of passwords.It 's a great idea and one that I 've used in the past .
What gets me are the PITA rules that some web sites use for passwords .
Some want a certain amount of characters , some allow special characters others do n't and even others REQUIRE them .
My personal pet peeve : sites that force you to change passwords every so often and then do n't let you re-use old ones.I have a great idea : let ME determine if my password is secure enough .
Do n't try to force me to have a secure password , either I 'm smart enough to come up with a reasonably secure password or I deserve to be hacked for not making one.With all this it 's tough to come up with a universal function to generate a password on the fly .
You usually need 2 or 3 functions to adequately cover all situations and it 's just too much work for me .
I ended up using Mac OS X 's built-in Keychain when I 'm at my computer and a memorized prefix + a written down suffix for when I 'm away from my computer .</tokentext>
<sentencetext>I use a mental hash for my less important passwords.
That way all I have to do is look at the web site's name and run it through my hash function to come up with the password for that site.
That way, I only have to remember the function and not the plethora of passwords.It's a great idea and one that I've used in the past.
What gets me are the PITA rules that some web sites use for passwords.
Some want a certain amount of characters, some allow special characters others don't and even others REQUIRE them.
My personal pet peeve: sites that force you to change passwords every so often and then don't let you re-use old ones.I have a great idea: let ME determine if my password is secure enough.
Don't try to force me to have a secure password, either I'm smart enough to come up with a reasonably secure password or I deserve to be hacked for not making one.With all this it's tough to come up with a universal function to generate a password on the fly.
You usually need 2 or 3 functions to adequately cover all situations and it's just too much work for me.
I ended up using Mac OS X's built-in Keychain when I'm at my computer and a memorized prefix + a written down suffix for when I'm away from my computer.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055044</id>
	<title>Old School</title>
	<author>pilsner.urquell</author>
	<datestamp>1257866220000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>I use a plain old spiral bound address book.  A I keep it locked in my gun safe, in the same room with with a shredder.</htmltext>
<tokenext>I use a plain old spiral bound address book .
A I keep it locked in my gun safe , in the same room with with a shredder .</tokentext>
<sentencetext>I use a plain old spiral bound address book.
A I keep it locked in my gun safe, in the same room with with a shredder.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059436</id>
	<title>Re:paper in your wallet</title>
	<author>johnlcallaway</author>
	<datestamp>1257087600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I agree<nobr> <wbr></nobr>.. keeping them in a file is a recipe for disaster.  I use a similar idea where I can figure out what the password is within the normal 3-5 try limit of most systems.  I also don't use the same username everywhere.  I do cheat and use Firefox passwords with a security passphrase on my desktop.
<br> <br>
As long as the passwords are unique enough that if someone finds one, they can't either figure out the scheme or use the one they figure out on all your social networking site.</htmltext>
<tokenext>I agree .. keeping them in a file is a recipe for disaster .
I use a similar idea where I can figure out what the password is within the normal 3-5 try limit of most systems .
I also do n't use the same username everywhere .
I do cheat and use Firefox passwords with a security passphrase on my desktop .
As long as the passwords are unique enough that if someone finds one , they ca n't either figure out the scheme or use the one they figure out on all your social networking site .</tokentext>
<sentencetext>I agree .. keeping them in a file is a recipe for disaster.
I use a similar idea where I can figure out what the password is within the normal 3-5 try limit of most systems.
I also don't use the same username everywhere.
I do cheat and use Firefox passwords with a security passphrase on my desktop.
As long as the passwords are unique enough that if someone finds one, they can't either figure out the scheme or use the one they figure out on all your social networking site.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058010</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059632</id>
	<title>Re:Truecrypt</title>
	<author>fulldecent</author>
	<datestamp>1257088380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>your recommended <a href="http://gpgauth.com/" title="gpgauth.com">http://gpgauth.com/</a> [gpgauth.com] seems to be a complete failure.</p><p>it appears vulnerable to MITM attacks (if I just follow what's on the <a href="http://gpgauth.com/#what\_how" title="gpgauth.com">http://gpgauth.com/#what\_how</a> [gpgauth.com] page) and philosophically it seems to duplicate what is available with HTTP certificates and OpenID.</p></htmltext>
<tokenext>your recommended http : //gpgauth.com/ [ gpgauth.com ] seems to be a complete failure.it appears vulnerable to MITM attacks ( if I just follow what 's on the http : //gpgauth.com/ # what \ _how [ gpgauth.com ] page ) and philosophically it seems to duplicate what is available with HTTP certificates and OpenID .</tokentext>
<sentencetext>your recommended http://gpgauth.com/ [gpgauth.com] seems to be a complete failure.it appears vulnerable to MITM attacks (if I just follow what's on the http://gpgauth.com/#what\_how [gpgauth.com] page) and philosophically it seems to duplicate what is available with HTTP certificates and OpenID.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055024</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058330</id>
	<title>Re:1Password</title>
	<author>Anonymous</author>
	<datestamp>1257077460000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use 1Password also and I completely agree. It is probably my most important and useful utility!<br>It has a iPod/iPhone app as well which is useful when you're away from the computer.</p></htmltext>
<tokenext>I use 1Password also and I completely agree .
It is probably my most important and useful utility ! It has a iPod/iPhone app as well which is useful when you 're away from the computer .</tokentext>
<sentencetext>I use 1Password also and I completely agree.
It is probably my most important and useful utility!It has a iPod/iPhone app as well which is useful when you're away from the computer.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054966</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061008</id>
	<title>Hide it on the internet</title>
	<author>formfeed</author>
	<datestamp>1257094380000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>Just hide it in <b>p</b>lain sight: if nobody knows th<b>a</b>t  there is a pa<b>s</b>sword, nobody will find it.
And if you put it on the internet, you can acce<b>s</b>s if from every<b>w</b>here. You could even hide it in s<b>o</b>me stupid text you post on some stupid fo<b>r</b>um  for <b>d</b>umb <b>13</b> year old kids.</htmltext>
<tokenext>Just hide it in plain sight : if nobody knows that there is a password , nobody will find it .
And if you put it on the internet , you can access if from everywhere .
You could even hide it in some stupid text you post on some stupid forum for dumb 13 year old kids .</tokentext>
<sentencetext>Just hide it in plain sight: if nobody knows that  there is a password, nobody will find it.
And if you put it on the internet, you can access if from everywhere.
You could even hide it in some stupid text you post on some stupid forum  for dumb 13 year old kids.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054620</id>
	<title>Can't be 100\% secure</title>
	<author>Darkness404</author>
	<datestamp>1257864060000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext>The first thing you have to realise is you can't be 100\% secure. Keeping plain text files isn't that terrible of an idea in all honesty, your situation of where someone would steal your laptop and access all your files and look for passwords is unlikely. Your hardware is much, much, much more valuable to most thieves than your data. I bet most either A) just wipe with a clean install of Windows B) just randomly checks a few sites and gives up or C) scraps your laptop for individual parts. A laptop thief is not usually a tech person. When faced with encryption they aren't going to try to break in, after all your laptop is worth at least $50 on the black market no matter what the data is on there, so long as it boots up it is sellable. <br> <br>

Similarly, few thieves are going to be looking for passwords on old sheets of paper. Most thieves if they break into a house look for A) cash B) jewellery C) expensive-looking technology. Even though it is much more important to us geeks, a thief is going to go for sellable things, chances are your plasma is more sellable than your Pentium 4 tower, your monitor more than your external HDD and your PS3 more than your stack of back-up DVDs. <br> <br>

There is a -lot- more threat from crackers, viruses, keyloggers and other malware than the run-of-the-mill thief getting your laptop.</htmltext>
<tokenext>The first thing you have to realise is you ca n't be 100 \ % secure .
Keeping plain text files is n't that terrible of an idea in all honesty , your situation of where someone would steal your laptop and access all your files and look for passwords is unlikely .
Your hardware is much , much , much more valuable to most thieves than your data .
I bet most either A ) just wipe with a clean install of Windows B ) just randomly checks a few sites and gives up or C ) scraps your laptop for individual parts .
A laptop thief is not usually a tech person .
When faced with encryption they are n't going to try to break in , after all your laptop is worth at least $ 50 on the black market no matter what the data is on there , so long as it boots up it is sellable .
Similarly , few thieves are going to be looking for passwords on old sheets of paper .
Most thieves if they break into a house look for A ) cash B ) jewellery C ) expensive-looking technology .
Even though it is much more important to us geeks , a thief is going to go for sellable things , chances are your plasma is more sellable than your Pentium 4 tower , your monitor more than your external HDD and your PS3 more than your stack of back-up DVDs .
There is a -lot- more threat from crackers , viruses , keyloggers and other malware than the run-of-the-mill thief getting your laptop .</tokentext>
<sentencetext>The first thing you have to realise is you can't be 100\% secure.
Keeping plain text files isn't that terrible of an idea in all honesty, your situation of where someone would steal your laptop and access all your files and look for passwords is unlikely.
Your hardware is much, much, much more valuable to most thieves than your data.
I bet most either A) just wipe with a clean install of Windows B) just randomly checks a few sites and gives up or C) scraps your laptop for individual parts.
A laptop thief is not usually a tech person.
When faced with encryption they aren't going to try to break in, after all your laptop is worth at least $50 on the black market no matter what the data is on there, so long as it boots up it is sellable.
Similarly, few thieves are going to be looking for passwords on old sheets of paper.
Most thieves if they break into a house look for A) cash B) jewellery C) expensive-looking technology.
Even though it is much more important to us geeks, a thief is going to go for sellable things, chances are your plasma is more sellable than your Pentium 4 tower, your monitor more than your external HDD and your PS3 more than your stack of back-up DVDs.
There is a -lot- more threat from crackers, viruses, keyloggers and other malware than the run-of-the-mill thief getting your laptop.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054670</id>
	<title>KeePass</title>
	<author>bbdd</author>
	<datestamp>1257864300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Another vote for KeePass</p></htmltext>
<tokenext>Another vote for KeePass</tokentext>
<sentencetext>Another vote for KeePass</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055472</id>
	<title>Keepassx plus Unison</title>
	<author>mdda</author>
	<datestamp>1257868740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>This is another vote for keepass(x) - but with the addition of Unison to replicate the database everywhere you need it.</p><p>Redundancy makes the 'laptop stolen' problem less severe, since you still have your passwords backed up.  I'm assuming that there's at least 1 other person here that doesn't really backup as often as they should...</p><p>Personally, I'm surprised that some people are advocating 'remembering them all' - I kind of assumed that everyone had a WiFi router, a machine with a root and root SQL pw, and a personal website, and PINs, and<nobr> <wbr></nobr>...   Also, what about the 'name of your first school teacher' questions : it's more secure if you don't answer correctly...</p></htmltext>
<tokenext>This is another vote for keepass ( x ) - but with the addition of Unison to replicate the database everywhere you need it.Redundancy makes the 'laptop stolen ' problem less severe , since you still have your passwords backed up .
I 'm assuming that there 's at least 1 other person here that does n't really backup as often as they should...Personally , I 'm surprised that some people are advocating 'remembering them all ' - I kind of assumed that everyone had a WiFi router , a machine with a root and root SQL pw , and a personal website , and PINs , and ... Also , what about the 'name of your first school teacher ' questions : it 's more secure if you do n't answer correctly.. .</tokentext>
<sentencetext>This is another vote for keepass(x) - but with the addition of Unison to replicate the database everywhere you need it.Redundancy makes the 'laptop stolen' problem less severe, since you still have your passwords backed up.
I'm assuming that there's at least 1 other person here that doesn't really backup as often as they should...Personally, I'm surprised that some people are advocating 'remembering them all' - I kind of assumed that everyone had a WiFi router, a machine with a root and root SQL pw, and a personal website, and PINs, and ...   Also, what about the 'name of your first school teacher' questions : it's more secure if you don't answer correctly...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056420</id>
	<title>Pre-generated Issues</title>
	<author>Yobgod Ababua</author>
	<datestamp>1257876540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I appreciate all the suggestions to use fixed patterns or algorithms, but the problem I (and I'm sure most of you) run into is that I need passwords for sites that both:</p><p>* Require mixed case/special characters/long length<br>* Don't accept mixed case/special characters/long length</p><p>Every pattern I've tried inevitably runs into a new website that demands more or only accepts less, leading to a menagerie of subtle variations and the need to remember whether this particular site needed "PaSSword", "password!", "password5", "PWD", etc, etc, etc.</p><p>I have a text file, stored on both disk and USB key, that lists which passwords go with which accounts... then I GPG-encrypt it.</p><p>Also, I never use a similar pattern between low-risk sites like message boards and high-risk sites like Paypal and my bank.</p></htmltext>
<tokenext>I appreciate all the suggestions to use fixed patterns or algorithms , but the problem I ( and I 'm sure most of you ) run into is that I need passwords for sites that both : * Require mixed case/special characters/long length * Do n't accept mixed case/special characters/long lengthEvery pattern I 've tried inevitably runs into a new website that demands more or only accepts less , leading to a menagerie of subtle variations and the need to remember whether this particular site needed " PaSSword " , " password !
" , " password5 " , " PWD " , etc , etc , etc.I have a text file , stored on both disk and USB key , that lists which passwords go with which accounts... then I GPG-encrypt it.Also , I never use a similar pattern between low-risk sites like message boards and high-risk sites like Paypal and my bank .</tokentext>
<sentencetext>I appreciate all the suggestions to use fixed patterns or algorithms, but the problem I (and I'm sure most of you) run into is that I need passwords for sites that both:* Require mixed case/special characters/long length* Don't accept mixed case/special characters/long lengthEvery pattern I've tried inevitably runs into a new website that demands more or only accepts less, leading to a menagerie of subtle variations and the need to remember whether this particular site needed "PaSSword", "password!
", "password5", "PWD", etc, etc, etc.I have a text file, stored on both disk and USB key, that lists which passwords go with which accounts... then I GPG-encrypt it.Also, I never use a similar pattern between low-risk sites like message boards and high-risk sites like Paypal and my bank.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055646</id>
	<title>Simple</title>
	<author>ekimd</author>
	<datestamp>1257870000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>
vim -x filename<br>
<br>
What could be simpler?  It's easy, quick, and unless your laptop is stolen by an uber hacker, it's quite safe.</p></htmltext>
<tokenext>vim -x filename What could be simpler ?
It 's easy , quick , and unless your laptop is stolen by an uber hacker , it 's quite safe .</tokentext>
<sentencetext>
vim -x filename

What could be simpler?
It's easy, quick, and unless your laptop is stolen by an uber hacker, it's quite safe.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067798</id>
	<title>Re:paper in your wallet</title>
	<author>badevlad</author>
	<datestamp>1257081420000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>100\% security is impossible. Any data you transmit or store on a physical device can be recovered, regardless of encryption.</p></div><p>Well, you are right. But if you will use strong modern encryption algorithms your data will be recovered only by your grandsons, believe me.

Additionally, there are some other methods of information protection, steganography for example. Together with encryption it reduces chances to recover your information almost to zero.

Check BDV DataHider or some similar software for example.</p></div>
	</htmltext>
<tokenext>100 \ % security is impossible .
Any data you transmit or store on a physical device can be recovered , regardless of encryption.Well , you are right .
But if you will use strong modern encryption algorithms your data will be recovered only by your grandsons , believe me .
Additionally , there are some other methods of information protection , steganography for example .
Together with encryption it reduces chances to recover your information almost to zero .
Check BDV DataHider or some similar software for example .</tokentext>
<sentencetext>100\% security is impossible.
Any data you transmit or store on a physical device can be recovered, regardless of encryption.Well, you are right.
But if you will use strong modern encryption algorithms your data will be recovered only by your grandsons, believe me.
Additionally, there are some other methods of information protection, steganography for example.
Together with encryption it reduces chances to recover your information almost to zero.
Check BDV DataHider or some similar software for example.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055078</id>
	<title>Secret sharing scheme</title>
	<author>Anonymous</author>
	<datestamp>1257866460000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>A simple and effective way may be to use a secret sharing scheme between your computer<nobr> <wbr></nobr>,a usb device that you carry on you and a third one that you keep in a secure spot (bank), the secret sharing scheme should allow you to recover the secret from any two shares , if one out of three is lost or stolen you can still recover all your passwords.</p><p>(Look for secret sharing on wikipedia)</p></htmltext>
<tokenext>A simple and effective way may be to use a secret sharing scheme between your computer ,a usb device that you carry on you and a third one that you keep in a secure spot ( bank ) , the secret sharing scheme should allow you to recover the secret from any two shares , if one out of three is lost or stolen you can still recover all your passwords .
( Look for secret sharing on wikipedia )</tokentext>
<sentencetext>A simple and effective way may be to use a secret sharing scheme between your computer ,a usb device that you carry on you and a third one that you keep in a secure spot (bank), the secret sharing scheme should allow you to recover the secret from any two shares , if one out of three is lost or stolen you can still recover all your passwords.
(Look for secret sharing on wikipedia)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058962</id>
	<title>For What It's Worth</title>
	<author>Slash.Poop</author>
	<datestamp>1257084000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use <a href="http://keepass.info/" title="keepass.info" rel="nofollow">http://keepass.info/</a> [keepass.info] <br>
Does everything I want it to do.</htmltext>
<tokenext>I use http : //keepass.info/ [ keepass.info ] Does everything I want it to do .</tokentext>
<sentencetext>I use http://keepass.info/ [keepass.info] 
Does everything I want it to do.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055002</id>
	<title>Emulation</title>
	<author>prattp</author>
	<datestamp>1257865980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Personally, I use a disk image for the emulator Mini vMac that contains the old MacPGP 2.6 and a text editor. This is easily carried on a USB stick, and can be used on Macintosh, Windows, or Linux computers (and there are other ports). Further, the disk image should work on other Mac emulators. Of course, I'm the maintainer of Mini vMac - this might not be the best solution for other people.</htmltext>
<tokenext>Personally , I use a disk image for the emulator Mini vMac that contains the old MacPGP 2.6 and a text editor .
This is easily carried on a USB stick , and can be used on Macintosh , Windows , or Linux computers ( and there are other ports ) .
Further , the disk image should work on other Mac emulators .
Of course , I 'm the maintainer of Mini vMac - this might not be the best solution for other people .</tokentext>
<sentencetext>Personally, I use a disk image for the emulator Mini vMac that contains the old MacPGP 2.6 and a text editor.
This is easily carried on a USB stick, and can be used on Macintosh, Windows, or Linux computers (and there are other ports).
Further, the disk image should work on other Mac emulators.
Of course, I'm the maintainer of Mini vMac - this might not be the best solution for other people.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055144</id>
	<title>Salt base password with a context abbrv salt</title>
	<author>fuzzylollipop</author>
	<datestamp>1257866760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Create a 6 character base password like qaJdkW5 and use it as a base for everything.
Then add a suffix for each particular use like quJdkW5G for Google quJdkW5sd for slashdot.
You can then add digits to "version" them for applications that require changing passwords on a regular basis.
Then all you have to do is remember the base and you can derive the rest.</htmltext>
<tokenext>Create a 6 character base password like qaJdkW5 and use it as a base for everything .
Then add a suffix for each particular use like quJdkW5G for Google quJdkW5sd for slashdot .
You can then add digits to " version " them for applications that require changing passwords on a regular basis .
Then all you have to do is remember the base and you can derive the rest .</tokentext>
<sentencetext>Create a 6 character base password like qaJdkW5 and use it as a base for everything.
Then add a suffix for each particular use like quJdkW5G for Google quJdkW5sd for slashdot.
You can then add digits to "version" them for applications that require changing passwords on a regular basis.
Then all you have to do is remember the base and you can derive the rest.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055458</id>
	<title>Re:KeePass - fantastic software.</title>
	<author>Anonymous</author>
	<datestamp>1257868680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Don't use Firefox's password storage! They are all stored in plain text! Anyone can view them!!</p></div><p>They are encrypted if you bother to create a master password.</p></div>
	</htmltext>
<tokenext>Do n't use Firefox 's password storage !
They are all stored in plain text !
Anyone can view them !
! They are encrypted if you bother to create a master password .</tokentext>
<sentencetext>Don't use Firefox's password storage!
They are all stored in plain text!
Anyone can view them!
!They are encrypted if you bother to create a master password.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065344</id>
	<title>Re:paper in your wallet</title>
	<author>srjoshi</author>
	<datestamp>1257068460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If you lose your wallet with your passwords, I really wonder how you would reset your passwords when you cannot even log on.</p><p>I use passwordsafe and keep a copy of the *safe* and the application online. Unless a key logger is watching me, I think I should be safe enough, no?</p></htmltext>
<tokenext>If you lose your wallet with your passwords , I really wonder how you would reset your passwords when you can not even log on.I use passwordsafe and keep a copy of the * safe * and the application online .
Unless a key logger is watching me , I think I should be safe enough , no ?</tokentext>
<sentencetext>If you lose your wallet with your passwords, I really wonder how you would reset your passwords when you cannot even log on.I use passwordsafe and keep a copy of the *safe* and the application online.
Unless a key logger is watching me, I think I should be safe enough, no?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055720</id>
	<title>Passpack</title>
	<author>Anonymous</author>
	<datestamp>1257870480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I'm a big fan of Passpack but some people are paranoid enough to think it's a conspiracy to collect passwords...</p><p>They at least released the key to their backend as open source.</p></htmltext>
<tokenext>I 'm a big fan of Passpack but some people are paranoid enough to think it 's a conspiracy to collect passwords...They at least released the key to their backend as open source .</tokentext>
<sentencetext>I'm a big fan of Passpack but some people are paranoid enough to think it's a conspiracy to collect passwords...They at least released the key to their backend as open source.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056300</id>
	<title>Seems simple to me...</title>
	<author>VanessaE</author>
	<datestamp>1257875340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Just put everything in a flat, tab-formatted text file and encrypt it with a decent algorithm, against a strong "line noise" password.</p><p>Make a number of copies of the file and put them all on memory cards.  Each card should carry several copies of the file (to protect against corruption), and the file should never be stored on any computer. Distribute those cards to safe places around your local area (i.e. one at work, one at a trusted friend's house, etc).  Put several copies on a CD or DVD and store that along with another memory card in a safe deposit box, and keep the key to that box somewhere safe but innocuous (hell, your normal keychain is probably enough).  Don't tell anyone where that box is kept.</p><p>Write the password down, without context, and store it in a safe place well away from any copies of the encrypted file - maybe in your wallet as someone else suggested.  Anyone who finds it will probably assume it's just a system password anyway.</p></htmltext>
<tokenext>Just put everything in a flat , tab-formatted text file and encrypt it with a decent algorithm , against a strong " line noise " password.Make a number of copies of the file and put them all on memory cards .
Each card should carry several copies of the file ( to protect against corruption ) , and the file should never be stored on any computer .
Distribute those cards to safe places around your local area ( i.e .
one at work , one at a trusted friend 's house , etc ) .
Put several copies on a CD or DVD and store that along with another memory card in a safe deposit box , and keep the key to that box somewhere safe but innocuous ( hell , your normal keychain is probably enough ) .
Do n't tell anyone where that box is kept.Write the password down , without context , and store it in a safe place well away from any copies of the encrypted file - maybe in your wallet as someone else suggested .
Anyone who finds it will probably assume it 's just a system password anyway .</tokentext>
<sentencetext>Just put everything in a flat, tab-formatted text file and encrypt it with a decent algorithm, against a strong "line noise" password.Make a number of copies of the file and put them all on memory cards.
Each card should carry several copies of the file (to protect against corruption), and the file should never be stored on any computer.
Distribute those cards to safe places around your local area (i.e.
one at work, one at a trusted friend's house, etc).
Put several copies on a CD or DVD and store that along with another memory card in a safe deposit box, and keep the key to that box somewhere safe but innocuous (hell, your normal keychain is probably enough).
Don't tell anyone where that box is kept.Write the password down, without context, and store it in a safe place well away from any copies of the encrypted file - maybe in your wallet as someone else suggested.
Anyone who finds it will probably assume it's just a system password anyway.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574</id>
	<title>KeePass - fantastic software.</title>
	<author>clockwise\_music</author>
	<datestamp>1257863940000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><a href="http://keepass.info/" title="keepass.info">KeePass</a> [keepass.info].<br> <br>

* Stores all of your passwords in a secure encrypted file<br> <br>

* Has auto-type so you don't have to type or remember your passwords<br> <br>

* Has a great password generator tool, so that you can reset all of your passwords to something secure<br> <br>

* Easily transferable password database.<br> <br>

* Can run off a USB stick<br> <br>

I checked it out a month ago on the recommendation of a mate, and have been using it ever since.<br> <br>

It has everything that you need. Fantastic program and has been serving me brilliantly for the past month. I have now gone through all of the sites that I use regularly and have been resetting my passwords to something random. If any of those passwords are leaked then it won't be the disaster it could have been!<br> <br>

And on the plus side, for the sites that I login to very occasionally (eg, once every six months) I don't have to scrounge around in my memory trying to figure out what my username+password is. <br> <br>

And for those horrible sites that have mandatory minimum password requirements, it makes it really easy to generate a password that fits their bizarre criteria. (Eg, only 6-10 characters long, certain characters not allowed, must contain upper and lower case etc etc etc).<br> <br>

Don't use Firefox's password storage! They are all stored in plain text! Anyone can view them!!</htmltext>
<tokenext>KeePass [ keepass.info ] .
* Stores all of your passwords in a secure encrypted file * Has auto-type so you do n't have to type or remember your passwords * Has a great password generator tool , so that you can reset all of your passwords to something secure * Easily transferable password database .
* Can run off a USB stick I checked it out a month ago on the recommendation of a mate , and have been using it ever since .
It has everything that you need .
Fantastic program and has been serving me brilliantly for the past month .
I have now gone through all of the sites that I use regularly and have been resetting my passwords to something random .
If any of those passwords are leaked then it wo n't be the disaster it could have been !
And on the plus side , for the sites that I login to very occasionally ( eg , once every six months ) I do n't have to scrounge around in my memory trying to figure out what my username + password is .
And for those horrible sites that have mandatory minimum password requirements , it makes it really easy to generate a password that fits their bizarre criteria .
( Eg , only 6-10 characters long , certain characters not allowed , must contain upper and lower case etc etc etc ) .
Do n't use Firefox 's password storage !
They are all stored in plain text !
Anyone can view them !
!</tokentext>
<sentencetext>KeePass [keepass.info].
* Stores all of your passwords in a secure encrypted file 

* Has auto-type so you don't have to type or remember your passwords 

* Has a great password generator tool, so that you can reset all of your passwords to something secure 

* Easily transferable password database.
* Can run off a USB stick 

I checked it out a month ago on the recommendation of a mate, and have been using it ever since.
It has everything that you need.
Fantastic program and has been serving me brilliantly for the past month.
I have now gone through all of the sites that I use regularly and have been resetting my passwords to something random.
If any of those passwords are leaked then it won't be the disaster it could have been!
And on the plus side, for the sites that I login to very occasionally (eg, once every six months) I don't have to scrounge around in my memory trying to figure out what my username+password is.
And for those horrible sites that have mandatory minimum password requirements, it makes it really easy to generate a password that fits their bizarre criteria.
(Eg, only 6-10 characters long, certain characters not allowed, must contain upper and lower case etc etc etc).
Don't use Firefox's password storage!
They are all stored in plain text!
Anyone can view them!
!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057744</id>
	<title>Re:Truecrypt</title>
	<author>pilybaby</author>
	<datestamp>1257070260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I keep my keePass file in a truecrypt file and use a password and file for the KeePass unlocking method.  That way I have to uncrypt the truecrypt file, open the KeePass file, know my KeePass password and point KeePass to a file that exists on a removable USB stick.  Then I can get in.  For a lot of sites I let KeePass generate massive complicated passwords so I really cannot type them in accidentally.
<br> <br>
I like how you can copy the usernames and passwords to the clipboard and have them automatically removed from the clipboard after a few seconds.</htmltext>
<tokenext>I keep my keePass file in a truecrypt file and use a password and file for the KeePass unlocking method .
That way I have to uncrypt the truecrypt file , open the KeePass file , know my KeePass password and point KeePass to a file that exists on a removable USB stick .
Then I can get in .
For a lot of sites I let KeePass generate massive complicated passwords so I really can not type them in accidentally .
I like how you can copy the usernames and passwords to the clipboard and have them automatically removed from the clipboard after a few seconds .</tokentext>
<sentencetext>I keep my keePass file in a truecrypt file and use a password and file for the KeePass unlocking method.
That way I have to uncrypt the truecrypt file, open the KeePass file, know my KeePass password and point KeePass to a file that exists on a removable USB stick.
Then I can get in.
For a lot of sites I let KeePass generate massive complicated passwords so I really cannot type them in accidentally.
I like how you can copy the usernames and passwords to the clipboard and have them automatically removed from the clipboard after a few seconds.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057676</id>
	<title>Re:vim gpg</title>
	<author>Anonymous</author>
	<datestamp>1257069480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Me too. My passwords are in plain text file, encrypted with my PGP key. There's a vim plugin that will automatically un/-encrypt the file on open/close. It also takes care to not write a swap file, etc.</p><p>And if you don't want to move around your private key, use openssl(1) and a symmetric cipher for the file.</p></htmltext>
<tokenext>Me too .
My passwords are in plain text file , encrypted with my PGP key .
There 's a vim plugin that will automatically un/-encrypt the file on open/close .
It also takes care to not write a swap file , etc.And if you do n't want to move around your private key , use openssl ( 1 ) and a symmetric cipher for the file .</tokentext>
<sentencetext>Me too.
My passwords are in plain text file, encrypted with my PGP key.
There's a vim plugin that will automatically un/-encrypt the file on open/close.
It also takes care to not write a swap file, etc.And if you don't want to move around your private key, use openssl(1) and a symmetric cipher for the file.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054886</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067090</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>ZeissIcon</author>
	<datestamp>1257076860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use a similar method, but then apply an additional layer of obfuscation by putting my password that I've generated with my algorithm through something like an MD5 hash. If I can't remember the password, I can always recreate it, but the chances of anyone stumbling across it with anything other than brute force are miniscule. You could even write your passwords down and it wouldn't make a difference. All you're giving them is the seed.  You can also apply simple encryption to them, such as having a deviation pattern from the password you've written down (i.e. first character is to the left of the one I've written down, second one two characters up on the keyboard, etc. I've also had success just keeping a list well hidden such as making a file called<nobr> <wbr></nobr>.nothing\_interesting\_in\_here (for example) and hiding it down in<nobr> <wbr></nobr>/var or<nobr> <wbr></nobr>/etc somewhere. The chances of some miscellaneous laptop thief getting root and going ls-la through all of your config directories is relatively small. You just have to remember where you put the file.</p></htmltext>
<tokenext>I use a similar method , but then apply an additional layer of obfuscation by putting my password that I 've generated with my algorithm through something like an MD5 hash .
If I ca n't remember the password , I can always recreate it , but the chances of anyone stumbling across it with anything other than brute force are miniscule .
You could even write your passwords down and it would n't make a difference .
All you 're giving them is the seed .
You can also apply simple encryption to them , such as having a deviation pattern from the password you 've written down ( i.e .
first character is to the left of the one I 've written down , second one two characters up on the keyboard , etc .
I 've also had success just keeping a list well hidden such as making a file called .nothing \ _interesting \ _in \ _here ( for example ) and hiding it down in /var or /etc somewhere .
The chances of some miscellaneous laptop thief getting root and going ls-la through all of your config directories is relatively small .
You just have to remember where you put the file .</tokentext>
<sentencetext>I use a similar method, but then apply an additional layer of obfuscation by putting my password that I've generated with my algorithm through something like an MD5 hash.
If I can't remember the password, I can always recreate it, but the chances of anyone stumbling across it with anything other than brute force are miniscule.
You could even write your passwords down and it wouldn't make a difference.
All you're giving them is the seed.
You can also apply simple encryption to them, such as having a deviation pattern from the password you've written down (i.e.
first character is to the left of the one I've written down, second one two characters up on the keyboard, etc.
I've also had success just keeping a list well hidden such as making a file called .nothing\_interesting\_in\_here (for example) and hiding it down in /var or /etc somewhere.
The chances of some miscellaneous laptop thief getting root and going ls-la through all of your config directories is relatively small.
You just have to remember where you put the file.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060812</id>
	<title>Best Tool..</title>
	<author>Anonymous</author>
	<datestamp>1257093600000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>How about that big lump of greyish jelly inside your cranium? I hear it's really a hyperdimensional storage array capable of holding incredibly vast amount of information. Like passwords.</p><p>Or.. You could all ways use the first 5 letters of the site or company or whatever, capitalized as you prefer, followed by your favorite 3 digits, and a symbol, like</p><p>Slash266@<br>Micro766&amp;<br>Amazo166!</p><p>(see the pattern?)</p><p>Or.. you could do what my Mom does: She doesn't have any passwords because she doesn't do anything electronically. She doesn't own a computer. She doesn't own a cell phone. She has a cat, and a bottle of Scotch.</p></htmltext>
<tokenext>How about that big lump of greyish jelly inside your cranium ?
I hear it 's really a hyperdimensional storage array capable of holding incredibly vast amount of information .
Like passwords.Or.. You could all ways use the first 5 letters of the site or company or whatever , capitalized as you prefer , followed by your favorite 3 digits , and a symbol , likeSlash266 @ Micro766&amp;Amazo166 !
( see the pattern ? ) Or. .
you could do what my Mom does : She does n't have any passwords because she does n't do anything electronically .
She does n't own a computer .
She does n't own a cell phone .
She has a cat , and a bottle of Scotch .</tokentext>
<sentencetext>How about that big lump of greyish jelly inside your cranium?
I hear it's really a hyperdimensional storage array capable of holding incredibly vast amount of information.
Like passwords.Or.. You could all ways use the first 5 letters of the site or company or whatever, capitalized as you prefer, followed by your favorite 3 digits, and a symbol, likeSlash266@Micro766&amp;Amazo166!
(see the pattern?)Or..
you could do what my Mom does: She doesn't have any passwords because she doesn't do anything electronically.
She doesn't own a computer.
She doesn't own a cell phone.
She has a cat, and a bottle of Scotch.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055934</id>
	<title>A great use for Opera Unite</title>
	<author>corigo</author>
	<datestamp>1257871800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I agree with the TrueCrypt plain text file, but would only encrypt the file, and instead use Opera Unite to share it between all my web enabled devices. Of course using a fairly simple cipher and a favorite author, band name, song name, etc. it is relatively easy to make a memorable and secure password.</htmltext>
<tokenext>I agree with the TrueCrypt plain text file , but would only encrypt the file , and instead use Opera Unite to share it between all my web enabled devices .
Of course using a fairly simple cipher and a favorite author , band name , song name , etc .
it is relatively easy to make a memorable and secure password .</tokentext>
<sentencetext>I agree with the TrueCrypt plain text file, but would only encrypt the file, and instead use Opera Unite to share it between all my web enabled devices.
Of course using a fairly simple cipher and a favorite author, band name, song name, etc.
it is relatively easy to make a memorable and secure password.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057494</id>
	<title>Re:Hashing Works</title>
	<author>mal0rd</author>
	<datestamp>1257067380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I see a dozen comments applauding your idea, but I think we need some counter arguments.  Unless your hashing function is time consuming or you're a robot, it must be simple enough that a few examples and brute forcing would allowing guessing other passwords.</p><p>Just use the same set of passwords for all sites - it's simpler and as secure, more or less.</p></htmltext>
<tokenext>I see a dozen comments applauding your idea , but I think we need some counter arguments .
Unless your hashing function is time consuming or you 're a robot , it must be simple enough that a few examples and brute forcing would allowing guessing other passwords.Just use the same set of passwords for all sites - it 's simpler and as secure , more or less .</tokentext>
<sentencetext>I see a dozen comments applauding your idea, but I think we need some counter arguments.
Unless your hashing function is time consuming or you're a robot, it must be simple enough that a few examples and brute forcing would allowing guessing other passwords.Just use the same set of passwords for all sites - it's simpler and as secure, more or less.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057242</id>
	<title>Re:The most secure place</title>
	<author>cgenman</author>
	<datestamp>1257107400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If it's simple enough to remember, it's probably simple enough to dictionary attack.</p></htmltext>
<tokenext>If it 's simple enough to remember , it 's probably simple enough to dictionary attack .</tokentext>
<sentencetext>If it's simple enough to remember, it's probably simple enough to dictionary attack.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055508</id>
	<title>Trivial password modifications</title>
	<author>Myopic</author>
	<datestamp>1257868920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I have a uniform base password which mixes letters and numbers and punctuation, then for each different password I modify it in a predictable way. From time to time, maybe once a year, I change the base password and the form of modification. I actually picked up that habit after reading it from a comment on Slashdot.</p><p>For instance, if the base password is p@ssw0rd, then the password at slashdot might be SLp@ssw0rd and the password at Digg might be DIp@ssw0rd.</p><p>For me that's a medium-security way to partially obfuscate a shared password.</p></htmltext>
<tokenext>I have a uniform base password which mixes letters and numbers and punctuation , then for each different password I modify it in a predictable way .
From time to time , maybe once a year , I change the base password and the form of modification .
I actually picked up that habit after reading it from a comment on Slashdot.For instance , if the base password is p @ ssw0rd , then the password at slashdot might be SLp @ ssw0rd and the password at Digg might be DIp @ ssw0rd.For me that 's a medium-security way to partially obfuscate a shared password .</tokentext>
<sentencetext>I have a uniform base password which mixes letters and numbers and punctuation, then for each different password I modify it in a predictable way.
From time to time, maybe once a year, I change the base password and the form of modification.
I actually picked up that habit after reading it from a comment on Slashdot.For instance, if the base password is p@ssw0rd, then the password at slashdot might be SLp@ssw0rd and the password at Digg might be DIp@ssw0rd.For me that's a medium-security way to partially obfuscate a shared password.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055532</id>
	<title>Online</title>
	<author>Anonymous</author>
	<datestamp>1257869160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>just a few days ago Jon Udell was suggesting this site: http://www.clipperz.com/. Seems interesting.</p></htmltext>
<tokenext>just a few days ago Jon Udell was suggesting this site : http : //www.clipperz.com/ .
Seems interesting .</tokentext>
<sentencetext>just a few days ago Jon Udell was suggesting this site: http://www.clipperz.com/.
Seems interesting.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056752</id>
	<title>Old School</title>
	<author>Anonymous</author>
	<datestamp>1257879360000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Carve your passwords onto a stone tablet. By the time you DO manage to get the task done, odds are you'll likely have them memorized, anyway. And if you don't, you'll have a painfully heavy reminder to lug around.</p></htmltext>
<tokenext>Carve your passwords onto a stone tablet .
By the time you DO manage to get the task done , odds are you 'll likely have them memorized , anyway .
And if you do n't , you 'll have a painfully heavy reminder to lug around .</tokentext>
<sentencetext>Carve your passwords onto a stone tablet.
By the time you DO manage to get the task done, odds are you'll likely have them memorized, anyway.
And if you don't, you'll have a painfully heavy reminder to lug around.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059410</id>
	<title>Re:1Password</title>
	<author>An anonymous Frank</author>
	<datestamp>1257087480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>What's wrong with depending on OS X's keychain?</p></htmltext>
<tokenext>What 's wrong with depending on OS X 's keychain ?</tokentext>
<sentencetext>What's wrong with depending on OS X's keychain?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054966</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061112</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>Anonymous</author>
	<datestamp>1257094800000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>What do you when password complexity rules invalidate the result of your algorithm? Ie, you must use more than 5 characters but fewer than 10, must have a number but no 'special characters' or punctuation allowed, etc.</p></htmltext>
<tokenext>What do you when password complexity rules invalidate the result of your algorithm ?
Ie , you must use more than 5 characters but fewer than 10 , must have a number but no 'special characters ' or punctuation allowed , etc .</tokentext>
<sentencetext>What do you when password complexity rules invalidate the result of your algorithm?
Ie, you must use more than 5 characters but fewer than 10, must have a number but no 'special characters' or punctuation allowed, etc.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055826</id>
	<title>Re:Roboform - ubiquitous, multi-device viewable, e</title>
	<author>CreamyG31337</author>
	<datestamp>1257871140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Yeah I agree roboform is the best, it's updated every few weeks for the last 5 years or whatever. The online sync is great, has plugins for all the browsers and even a special build of chrome (chrome doesn't usually support plugins so it's nice to see they recompiled the whole thing with plugins enabled and this preinstalled). Lots of useful features like a configurable password generator, selective form filling... It supports multiple users, you can choose the encryption algorithm, it can auto-logoff by timer or screensaver or whatever you want. I used to review software in my spare time and this one really beat out everything else, it does have a free trial so you can see for yourself. I guess, out of all the software I have, this is my 2nd favorite. I rarely "pay" for software but this one is just updated too often for me to waste time pirating, plus I actually want to support the development.</p></htmltext>
<tokenext>Yeah I agree roboform is the best , it 's updated every few weeks for the last 5 years or whatever .
The online sync is great , has plugins for all the browsers and even a special build of chrome ( chrome does n't usually support plugins so it 's nice to see they recompiled the whole thing with plugins enabled and this preinstalled ) .
Lots of useful features like a configurable password generator , selective form filling... It supports multiple users , you can choose the encryption algorithm , it can auto-logoff by timer or screensaver or whatever you want .
I used to review software in my spare time and this one really beat out everything else , it does have a free trial so you can see for yourself .
I guess , out of all the software I have , this is my 2nd favorite .
I rarely " pay " for software but this one is just updated too often for me to waste time pirating , plus I actually want to support the development .</tokentext>
<sentencetext>Yeah I agree roboform is the best, it's updated every few weeks for the last 5 years or whatever.
The online sync is great, has plugins for all the browsers and even a special build of chrome (chrome doesn't usually support plugins so it's nice to see they recompiled the whole thing with plugins enabled and this preinstalled).
Lots of useful features like a configurable password generator, selective form filling... It supports multiple users, you can choose the encryption algorithm, it can auto-logoff by timer or screensaver or whatever you want.
I used to review software in my spare time and this one really beat out everything else, it does have a free trial so you can see for yourself.
I guess, out of all the software I have, this is my 2nd favorite.
I rarely "pay" for software but this one is just updated too often for me to waste time pirating, plus I actually want to support the development.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055042</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057146</id>
	<title>Salt and Pepper</title>
	<author>os2fan</author>
	<datestamp>1257106200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Two tricks i use to hide passwords is to use short forms, eg "A7" might expand as "ABD968017", and a general "salt and pepper" table.  These are all unrelated to what is typically discussed.  Note also that a7 expands to "abd968017", so some case can be preserved.

</p><p>In a salt and pepper table, one uses an intermediate table that is easy to recall, but no need to be written, and not common knowledge.  An example might be "husbands and wives", so a password displayed as "John" might be entered as "Yoko".  Another kind of table might be "middle names", so "John" would elicit the response of "Winston".    Note eg, jOhn gives yOko or wInston, so you can hide case in here too.

</p><p>The less obvious you make the salt and pepper table, or the more unobvious the abbreviations, the more secure the table, even if the reminders are kept in plain text (plain text in an unobvious application also deters automatic gathering.  Who would look for something like a<nobr> <wbr></nobr>.DOC file, might have some fun when the downloaded document is a multimate doc!</p></htmltext>
<tokenext>Two tricks i use to hide passwords is to use short forms , eg " A7 " might expand as " ABD968017 " , and a general " salt and pepper " table .
These are all unrelated to what is typically discussed .
Note also that a7 expands to " abd968017 " , so some case can be preserved .
In a salt and pepper table , one uses an intermediate table that is easy to recall , but no need to be written , and not common knowledge .
An example might be " husbands and wives " , so a password displayed as " John " might be entered as " Yoko " .
Another kind of table might be " middle names " , so " John " would elicit the response of " Winston " .
Note eg , jOhn gives yOko or wInston , so you can hide case in here too .
The less obvious you make the salt and pepper table , or the more unobvious the abbreviations , the more secure the table , even if the reminders are kept in plain text ( plain text in an unobvious application also deters automatic gathering .
Who would look for something like a .DOC file , might have some fun when the downloaded document is a multimate doc !</tokentext>
<sentencetext>Two tricks i use to hide passwords is to use short forms, eg "A7" might expand as "ABD968017", and a general "salt and pepper" table.
These are all unrelated to what is typically discussed.
Note also that a7 expands to "abd968017", so some case can be preserved.
In a salt and pepper table, one uses an intermediate table that is easy to recall, but no need to be written, and not common knowledge.
An example might be "husbands and wives", so a password displayed as "John" might be entered as "Yoko".
Another kind of table might be "middle names", so "John" would elicit the response of "Winston".
Note eg, jOhn gives yOko or wInston, so you can hide case in here too.
The less obvious you make the salt and pepper table, or the more unobvious the abbreviations, the more secure the table, even if the reminders are kept in plain text (plain text in an unobvious application also deters automatic gathering.
Who would look for something like a .DOC file, might have some fun when the downloaded document is a multimate doc!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056342</id>
	<title>IronKey</title>
	<author>Anonymous</author>
	<datestamp>1257875640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>www.ironkey.com</p></htmltext>
<tokenext>www.ironkey.com</tokentext>
<sentencetext>www.ironkey.com</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056710</id>
	<title>Generate your passwords algorithmically</title>
	<author>Anonymous</author>
	<datestamp>1257879060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use an algorithm to generate my passwords.  The function is F(master keyword, login keyword).  My S.O. and I both know the algorithm and the master keyword.  I just have to write down the login keyword for each site. If I ever die, she can access anything, yet the passwords are not stored anywhere.  The master keyword and algorithm are memorized.</p><p>The only problem with the system is that so many places have arbitrary password rules: No special characters, no more than 8 characters, must have 2 digits and two uppercase, etc.  That makes it a pain to pick the login keyword since it has to produce an output that meets the site's rules.  Curse them x100 when they make you randomly rotate it!</p></htmltext>
<tokenext>I use an algorithm to generate my passwords .
The function is F ( master keyword , login keyword ) .
My S.O .
and I both know the algorithm and the master keyword .
I just have to write down the login keyword for each site .
If I ever die , she can access anything , yet the passwords are not stored anywhere .
The master keyword and algorithm are memorized.The only problem with the system is that so many places have arbitrary password rules : No special characters , no more than 8 characters , must have 2 digits and two uppercase , etc .
That makes it a pain to pick the login keyword since it has to produce an output that meets the site 's rules .
Curse them x100 when they make you randomly rotate it !</tokentext>
<sentencetext>I use an algorithm to generate my passwords.
The function is F(master keyword, login keyword).
My S.O.
and I both know the algorithm and the master keyword.
I just have to write down the login keyword for each site.
If I ever die, she can access anything, yet the passwords are not stored anywhere.
The master keyword and algorithm are memorized.The only problem with the system is that so many places have arbitrary password rules: No special characters, no more than 8 characters, must have 2 digits and two uppercase, etc.
That makes it a pain to pick the login keyword since it has to produce an output that meets the site's rules.
Curse them x100 when they make you randomly rotate it!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058194</id>
	<title>Re:Use the master password feature and stop worryi</title>
	<author>bazorg</author>
	<datestamp>1257075840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>or the other way around: if you use Firefox without a master password, you should be worried because it's very easy to go to the menu and see all your user/passwd combinations.</htmltext>
<tokenext>or the other way around : if you use Firefox without a master password , you should be worried because it 's very easy to go to the menu and see all your user/passwd combinations .</tokentext>
<sentencetext>or the other way around: if you use Firefox without a master password, you should be worried because it's very easy to go to the menu and see all your user/passwd combinations.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063608</id>
	<title>Re:paper in your wallet</title>
	<author>Anonymous</author>
	<datestamp>1257104820000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>...if your wallet is lost, how are you going to change all your passwords?</p></htmltext>
<tokenext>...if your wallet is lost , how are you going to change all your passwords ?</tokentext>
<sentencetext>...if your wallet is lost, how are you going to change all your passwords?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054982</id>
	<title>FORMULA! Aren't we supposed to be geeks?</title>
	<author>DoninIN</author>
	<datestamp>1257865920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I do it like this.<br>
I use a super-secret, my wife doesn't know it password for the mission critical life-changing passwords. <br>
For web sites and forums there's a formula in my head, based on the web site name, truncated and a mathematical operation.<br>
If you were to somehow aquire
In the IT part of your job only remember the one's you have to, don't try to store or remember your users e-mail password etc, just the one you need to reset their password.<br>
You can use the same formula, for your work related passwords. Keeping a paper list of them in your locked fire-file or safe at work isn't crazy, and the risks of you getting hit by a bus are probably greater than the risk of ninjas breaking in to steal your login info.</htmltext>
<tokenext>I do it like this .
I use a super-secret , my wife does n't know it password for the mission critical life-changing passwords .
For web sites and forums there 's a formula in my head , based on the web site name , truncated and a mathematical operation .
If you were to somehow aquire In the IT part of your job only remember the one 's you have to , do n't try to store or remember your users e-mail password etc , just the one you need to reset their password .
You can use the same formula , for your work related passwords .
Keeping a paper list of them in your locked fire-file or safe at work is n't crazy , and the risks of you getting hit by a bus are probably greater than the risk of ninjas breaking in to steal your login info .</tokentext>
<sentencetext>I do it like this.
I use a super-secret, my wife doesn't know it password for the mission critical life-changing passwords.
For web sites and forums there's a formula in my head, based on the web site name, truncated and a mathematical operation.
If you were to somehow aquire
In the IT part of your job only remember the one's you have to, don't try to store or remember your users e-mail password etc, just the one you need to reset their password.
You can use the same formula, for your work related passwords.
Keeping a paper list of them in your locked fire-file or safe at work isn't crazy, and the risks of you getting hit by a bus are probably greater than the risk of ninjas breaking in to steal your login info.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055926</id>
	<title>If you have a WinMo phone . . .</title>
	<author>Anonymous</author>
	<datestamp>1257871740000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I know -- I'm likely to get laughed off Slashdot, but I've been on the WinMo platform for years -- anyway, check out SPB Wallet (http://www.spbsoftwarehouse.com).  It's not free, but it offers AES-256 encryption, integrates with IE and FireFox, has random password generation, and most importantly syncs with your phone so you always have a backup copy with you.  I love it and rely on it.  The phone sync has saved my bacon on many occasions, especially when travelling.</p></htmltext>
<tokenext>I know -- I 'm likely to get laughed off Slashdot , but I 've been on the WinMo platform for years -- anyway , check out SPB Wallet ( http : //www.spbsoftwarehouse.com ) .
It 's not free , but it offers AES-256 encryption , integrates with IE and FireFox , has random password generation , and most importantly syncs with your phone so you always have a backup copy with you .
I love it and rely on it .
The phone sync has saved my bacon on many occasions , especially when travelling .</tokentext>
<sentencetext>I know -- I'm likely to get laughed off Slashdot, but I've been on the WinMo platform for years -- anyway, check out SPB Wallet (http://www.spbsoftwarehouse.com).
It's not free, but it offers AES-256 encryption, integrates with IE and FireFox, has random password generation, and most importantly syncs with your phone so you always have a backup copy with you.
I love it and rely on it.
The phone sync has saved my bacon on many occasions, especially when travelling.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054926</id>
	<title>PasswordSafe</title>
	<author>al0ha</author>
	<datestamp>1257865560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Created by Bruce Schneier and perhaps the best app available.
<br>
<br>
<a href="http://passwordsafe.sourceforge.net/" title="sourceforge.net">http://passwordsafe.sourceforge.net/</a> [sourceforge.net]</htmltext>
<tokenext>Created by Bruce Schneier and perhaps the best app available .
http : //passwordsafe.sourceforge.net/ [ sourceforge.net ]</tokentext>
<sentencetext>Created by Bruce Schneier and perhaps the best app available.
http://passwordsafe.sourceforge.net/ [sourceforge.net]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056290</id>
	<title>Password Composer</title>
	<author>fwarren</author>
	<datestamp>1257875220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://www.xs4all.nl/~jlpoutre/BoT/Javascript/PasswordComposer/" title="xs4all.nl">http://www.xs4all.nl/~jlpoutre/BoT/Javascript/PasswordComposer/</a> [xs4all.nl]</p><p>It is a greasemonkey userscript for firefox. But you can also bookmark their page and use it in IE or Opera.</p><p>They have a bash script. There are lots of improvements as well. With zenity you can make a gui for it in linux. There is a Visual Basic program so you can keep it on a memory stick as well.</p><p>In a pinch you can even use MD5 and do it yourself take the first 8 chars of md5("password:url")</p></htmltext>
<tokenext>http : //www.xs4all.nl/ ~ jlpoutre/BoT/Javascript/PasswordComposer/ [ xs4all.nl ] It is a greasemonkey userscript for firefox .
But you can also bookmark their page and use it in IE or Opera.They have a bash script .
There are lots of improvements as well .
With zenity you can make a gui for it in linux .
There is a Visual Basic program so you can keep it on a memory stick as well.In a pinch you can even use MD5 and do it yourself take the first 8 chars of md5 ( " password : url " )</tokentext>
<sentencetext>http://www.xs4all.nl/~jlpoutre/BoT/Javascript/PasswordComposer/ [xs4all.nl]It is a greasemonkey userscript for firefox.
But you can also bookmark their page and use it in IE or Opera.They have a bash script.
There are lots of improvements as well.
With zenity you can make a gui for it in linux.
There is a Visual Basic program so you can keep it on a memory stick as well.In a pinch you can even use MD5 and do it yourself take the first 8 chars of md5("password:url")</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055524</id>
	<title>Store it on the iPhone</title>
	<author>68882</author>
	<datestamp>1257869040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Obviously you could setup something on the iPhone or some other smart phone to record the passwords then cough them up when needed to type into the browser</p></htmltext>
<tokenext>Obviously you could setup something on the iPhone or some other smart phone to record the passwords then cough them up when needed to type into the browser</tokentext>
<sentencetext>Obviously you could setup something on the iPhone or some other smart phone to record the passwords then cough them up when needed to type into the browser</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055430</id>
	<title>Encypted text file</title>
	<author>itamblyn</author>
	<datestamp>1257868440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I keep all of my passwords in a file that I encrypt using PGP type software (http://www.gnupg.org/). This means all you need to remember is one password. I found an add-on to vim that makes opening this file seamless when I'm in the terminal. This isn't necessary, but I find it useful. If you're more of a mouse type person, there are lots of free tools for encrypting / decrypting text files using the PGP standard. While it isn't the most fancy solution, it's pretty flexible and there is no risk of lock in, OS limitations, etc.</htmltext>
<tokenext>I keep all of my passwords in a file that I encrypt using PGP type software ( http : //www.gnupg.org/ ) .
This means all you need to remember is one password .
I found an add-on to vim that makes opening this file seamless when I 'm in the terminal .
This is n't necessary , but I find it useful .
If you 're more of a mouse type person , there are lots of free tools for encrypting / decrypting text files using the PGP standard .
While it is n't the most fancy solution , it 's pretty flexible and there is no risk of lock in , OS limitations , etc .</tokentext>
<sentencetext>I keep all of my passwords in a file that I encrypt using PGP type software (http://www.gnupg.org/).
This means all you need to remember is one password.
I found an add-on to vim that makes opening this file seamless when I'm in the terminal.
This isn't necessary, but I find it useful.
If you're more of a mouse type person, there are lots of free tools for encrypting / decrypting text files using the PGP standard.
While it isn't the most fancy solution, it's pretty flexible and there is no risk of lock in, OS limitations, etc.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056602</id>
	<title>Re:Prepended or Appended Passphrase</title>
	<author>pky666</author>
	<datestamp>1257878280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use the same, just adding the first few letters of the webpage title or program to my passphrase (which is itself fairly strong) and alternate upper/lower case for these added letters.</htmltext>
<tokenext>I use the same , just adding the first few letters of the webpage title or program to my passphrase ( which is itself fairly strong ) and alternate upper/lower case for these added letters .</tokentext>
<sentencetext>I use the same, just adding the first few letters of the webpage title or program to my passphrase (which is itself fairly strong) and alternate upper/lower case for these added letters.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057202</id>
	<title>Re:Truecrypt</title>
	<author>CarpetShark</author>
	<datestamp>1257106920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Do what I set up for my father</p></div></blockquote><p>Luke?  Is that you?</p></div>
	</htmltext>
<tokenext>Do what I set up for my fatherLuke ?
Is that you ?</tokentext>
<sentencetext>Do what I set up for my fatherLuke?
Is that you?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056104</id>
	<title>mobile</title>
	<author>Anonymous</author>
	<datestamp>1257873300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>There are apps for storing passwords safely on a mobile (cell) phone (iPhone, nokia n and e series etc) on the media card. Gonna try on soon.</p></htmltext>
<tokenext>There are apps for storing passwords safely on a mobile ( cell ) phone ( iPhone , nokia n and e series etc ) on the media card .
Gon na try on soon .</tokentext>
<sentencetext>There are apps for storing passwords safely on a mobile (cell) phone (iPhone, nokia n and e series etc) on the media card.
Gonna try on soon.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058744</id>
	<title>KeePass</title>
	<author>Anonymous</author>
	<datestamp>1257082140000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>KeePass:<br>http://www.keepass.info/</p></htmltext>
<tokenext>KeePass : http : //www.keepass.info/</tokentext>
<sentencetext>KeePass:http://www.keepass.info/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057548</id>
	<title>Re:LastPass MOD parent up</title>
	<author>Khenke</author>
	<datestamp>1257068040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Talking about passwords and LastPass is not in a Score 5 comment is insane.<br>
<br>
Used several password solutions over the year like a password like SlashDotIsGod*****, where ***** is something unique about the site like first 5 chars of the web address. That way you don't have to remember really long unique passwords but still have a long unique password for every place.<br>
After that I tried KeePass and others like it. The bad thing is that if I go away from my computer I have to sync it to a USB stick. And in some places you cant use it (like public libraries, iPhone).<br>
So I found LastPass. And its insane how easy my life has become. It can auto fill (and auto login) on sites, it automatically recognize forms and logins. It works in multiple browsers, IE, FF, Chrome. And if you cant have a plugin you can access it by a webpage to receive the passwords.<br>
<br>
It's extremely easy to use but still as powerful as any other solution. Even my mother, that cant remember from one day to another if instructed how to do things on a computer, can use it. Still I have it to generate 12-20 long passwords (depending on place) with numbers,  special chars if needed.<br>
<br>
I just sync the passwords to my KeePass once in the while to be on the safe side (never trust a single point of failure).<br>
<br>
For a ton of more information visit <a href="https://lastpass.com/" title="lastpass.com" rel="nofollow">lastpass.com</a> [lastpass.com]</htmltext>
<tokenext>Talking about passwords and LastPass is not in a Score 5 comment is insane .
Used several password solutions over the year like a password like SlashDotIsGod * * * * * , where * * * * * is something unique about the site like first 5 chars of the web address .
That way you do n't have to remember really long unique passwords but still have a long unique password for every place .
After that I tried KeePass and others like it .
The bad thing is that if I go away from my computer I have to sync it to a USB stick .
And in some places you cant use it ( like public libraries , iPhone ) .
So I found LastPass .
And its insane how easy my life has become .
It can auto fill ( and auto login ) on sites , it automatically recognize forms and logins .
It works in multiple browsers , IE , FF , Chrome .
And if you cant have a plugin you can access it by a webpage to receive the passwords .
It 's extremely easy to use but still as powerful as any other solution .
Even my mother , that cant remember from one day to another if instructed how to do things on a computer , can use it .
Still I have it to generate 12-20 long passwords ( depending on place ) with numbers , special chars if needed .
I just sync the passwords to my KeePass once in the while to be on the safe side ( never trust a single point of failure ) .
For a ton of more information visit lastpass.com [ lastpass.com ]</tokentext>
<sentencetext>Talking about passwords and LastPass is not in a Score 5 comment is insane.
Used several password solutions over the year like a password like SlashDotIsGod*****, where ***** is something unique about the site like first 5 chars of the web address.
That way you don't have to remember really long unique passwords but still have a long unique password for every place.
After that I tried KeePass and others like it.
The bad thing is that if I go away from my computer I have to sync it to a USB stick.
And in some places you cant use it (like public libraries, iPhone).
So I found LastPass.
And its insane how easy my life has become.
It can auto fill (and auto login) on sites, it automatically recognize forms and logins.
It works in multiple browsers, IE, FF, Chrome.
And if you cant have a plugin you can access it by a webpage to receive the passwords.
It's extremely easy to use but still as powerful as any other solution.
Even my mother, that cant remember from one day to another if instructed how to do things on a computer, can use it.
Still I have it to generate 12-20 long passwords (depending on place) with numbers,  special chars if needed.
I just sync the passwords to my KeePass once in the while to be on the safe side (never trust a single point of failure).
For a ton of more information visit lastpass.com [lastpass.com]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054978</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056694</id>
	<title>Re:Keepass</title>
	<author>technocolor</author>
	<datestamp>1257878940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Keepass is great and I would definitely recommend it.
<br> <br>
A suggestion on use:  Your master password should really be a passphrase.  Pick your favorite 40 letter sentence and type it without spaces.  Length is still the greatest barrier (26^40 &gt;&gt; 62^20)  (lower case vs mixed-case and numbers)</htmltext>
<tokenext>Keepass is great and I would definitely recommend it .
A suggestion on use : Your master password should really be a passphrase .
Pick your favorite 40 letter sentence and type it without spaces .
Length is still the greatest barrier ( 26 ^ 40 &gt; &gt; 62 ^ 20 ) ( lower case vs mixed-case and numbers )</tokentext>
<sentencetext>Keepass is great and I would definitely recommend it.
A suggestion on use:  Your master password should really be a passphrase.
Pick your favorite 40 letter sentence and type it without spaces.
Length is still the greatest barrier (26^40 &gt;&gt; 62^20)  (lower case vs mixed-case and numbers)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054708</id>
	<title>Do you have a Blackberry?</title>
	<author>Anonymous</author>
	<datestamp>1257864420000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I encrypt <b>everything</b> about myself in SplashID (passwords, credit cards, account info), and sync my home computer to my Blackberry.  I have been doing this for years (first with my Palm), and it has always been a reliable method to carry all my secret data.  All I have to do is never forget that *one* password.</p></htmltext>
<tokenext>I encrypt everything about myself in SplashID ( passwords , credit cards , account info ) , and sync my home computer to my Blackberry .
I have been doing this for years ( first with my Palm ) , and it has always been a reliable method to carry all my secret data .
All I have to do is never forget that * one * password .</tokentext>
<sentencetext>I encrypt everything about myself in SplashID (passwords, credit cards, account info), and sync my home computer to my Blackberry.
I have been doing this for years (first with my Palm), and it has always been a reliable method to carry all my secret data.
All I have to do is never forget that *one* password.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056052</id>
	<title>Re:Opera Password Manager</title>
	<author>LordLimecat</author>
	<datestamp>1257872880000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Firefox does this as well.</htmltext>
<tokenext>Firefox does this as well .</tokentext>
<sentencetext>Firefox does this as well.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054610</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057980</id>
	<title>Allow me to quote the poster.</title>
	<author>jotaeleemeese</author>
	<datestamp>1257073620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>"Keeping them in my brain is a prescription for disaster, as my brain is increasingly leaky"</p><p>Which other helpful advice do you have in offer?</p></htmltext>
<tokenext>" Keeping them in my brain is a prescription for disaster , as my brain is increasingly leaky " Which other helpful advice do you have in offer ?</tokentext>
<sentencetext>"Keeping them in my brain is a prescription for disaster, as my brain is increasingly leaky"Which other helpful advice do you have in offer?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056884</id>
	<title>Use a crypto solution on your mobile phone or PDA</title>
	<author>dovgr</author>
	<datestamp>1257880920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>My preferred password solution is still KeyRing (http://gnukeyring.sourceforge.net/ ). It satisfies the requirement that it is a non-connected device and that the data is stored in strong encryption. A similar application for a mobile phone would be a next best. At least until someone writes a keylogging virus for the mobile phones and then steals your data. But that is much more likely to happen on Windows.</htmltext>
<tokenext>My preferred password solution is still KeyRing ( http : //gnukeyring.sourceforge.net/ ) .
It satisfies the requirement that it is a non-connected device and that the data is stored in strong encryption .
A similar application for a mobile phone would be a next best .
At least until someone writes a keylogging virus for the mobile phones and then steals your data .
But that is much more likely to happen on Windows .</tokentext>
<sentencetext>My preferred password solution is still KeyRing (http://gnukeyring.sourceforge.net/ ).
It satisfies the requirement that it is a non-connected device and that the data is stored in strong encryption.
A similar application for a mobile phone would be a next best.
At least until someone writes a keylogging virus for the mobile phones and then steals your data.
But that is much more likely to happen on Windows.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057020</id>
	<title>Kind of Helps...</title>
	<author>BJ\_Covert\_Action</author>
	<datestamp>1257882360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>One thing I started doing was using passwords from languages that were not my native tongue, and then L337 encrypting them mentally. That is, there are a few particular phrases I find in latin to be absolutely wonderful to say. Same thing goes for a few sayings I know in Navajo, Roman, Spanish, and Greek. I don't know the full languages by any means, just some cool sayings and phrases I picked up from literature and poems and the like over the years. By ensuring that I use non-native language (read non English) passwords, I ensure that there are only so many options that I could have used for the password. Since the words come from less than common-place languages, they are very rarely found in any dictionary files. All I have to do is transcribe some of the common letter, mentally, like a = @ or S = 5 and before I know it I have all sorts of permutations on a very small set of base words that are not common enough for most people to try to guess.
<br> <br>
I know it's not a password tracking system like to asked per say. But by knowing that there are only a few base words that I use (from a few dead languages and a few live languages) I can easily track that base set and go from there. It's also a fine mental exercise....</htmltext>
<tokenext>One thing I started doing was using passwords from languages that were not my native tongue , and then L337 encrypting them mentally .
That is , there are a few particular phrases I find in latin to be absolutely wonderful to say .
Same thing goes for a few sayings I know in Navajo , Roman , Spanish , and Greek .
I do n't know the full languages by any means , just some cool sayings and phrases I picked up from literature and poems and the like over the years .
By ensuring that I use non-native language ( read non English ) passwords , I ensure that there are only so many options that I could have used for the password .
Since the words come from less than common-place languages , they are very rarely found in any dictionary files .
All I have to do is transcribe some of the common letter , mentally , like a = @ or S = 5 and before I know it I have all sorts of permutations on a very small set of base words that are not common enough for most people to try to guess .
I know it 's not a password tracking system like to asked per say .
But by knowing that there are only a few base words that I use ( from a few dead languages and a few live languages ) I can easily track that base set and go from there .
It 's also a fine mental exercise... .</tokentext>
<sentencetext>One thing I started doing was using passwords from languages that were not my native tongue, and then L337 encrypting them mentally.
That is, there are a few particular phrases I find in latin to be absolutely wonderful to say.
Same thing goes for a few sayings I know in Navajo, Roman, Spanish, and Greek.
I don't know the full languages by any means, just some cool sayings and phrases I picked up from literature and poems and the like over the years.
By ensuring that I use non-native language (read non English) passwords, I ensure that there are only so many options that I could have used for the password.
Since the words come from less than common-place languages, they are very rarely found in any dictionary files.
All I have to do is transcribe some of the common letter, mentally, like a = @ or S = 5 and before I know it I have all sorts of permutations on a very small set of base words that are not common enough for most people to try to guess.
I know it's not a password tracking system like to asked per say.
But by knowing that there are only a few base words that I use (from a few dead languages and a few live languages) I can easily track that base set and go from there.
It's also a fine mental exercise....</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056334</id>
	<title>Easy to remember, hard to guess</title>
	<author>gmuslera</author>
	<datestamp>1257875580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Try to pick passwords that are easy to remember to you, and hard to guess/crack by someone else. Pick something you remember, a song title, a verse, a murphy law, whatever. Then do a simple and easy to remember transformation on it, like picking initials, uppercasing every third letter, or things like that. And if you can put into the mix something related to the site you are using it, better. Who knows how much people have as password for Slashdot something like "S:nfn,stm".<br><br>And btw, if you have to store them somewhere, you can store only one of the components (i.e. the seed, but not the transformation algorithm), or the start of the phrase or even something that suggest it to you (i.e. "Spock died" to suggest the password ST2:TwoK)</htmltext>
<tokenext>Try to pick passwords that are easy to remember to you , and hard to guess/crack by someone else .
Pick something you remember , a song title , a verse , a murphy law , whatever .
Then do a simple and easy to remember transformation on it , like picking initials , uppercasing every third letter , or things like that .
And if you can put into the mix something related to the site you are using it , better .
Who knows how much people have as password for Slashdot something like " S : nfn,stm " .And btw , if you have to store them somewhere , you can store only one of the components ( i.e .
the seed , but not the transformation algorithm ) , or the start of the phrase or even something that suggest it to you ( i.e .
" Spock died " to suggest the password ST2 : TwoK )</tokentext>
<sentencetext>Try to pick passwords that are easy to remember to you, and hard to guess/crack by someone else.
Pick something you remember, a song title, a verse, a murphy law, whatever.
Then do a simple and easy to remember transformation on it, like picking initials, uppercasing every third letter, or things like that.
And if you can put into the mix something related to the site you are using it, better.
Who knows how much people have as password for Slashdot something like "S:nfn,stm".And btw, if you have to store them somewhere, you can store only one of the components (i.e.
the seed, but not the transformation algorithm), or the start of the phrase or even something that suggest it to you (i.e.
"Spock died" to suggest the password ST2:TwoK)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058778</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>Anonymous</author>
	<datestamp>1257082380000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>2) Count letters in the website name: eg : slashdot = '6'</p></div><p>Vowels are letters too.... slashdot = '8'</p></div>
	</htmltext>
<tokenext>2 ) Count letters in the website name : eg : slashdot = '6'Vowels are letters too.... slashdot = '8 '</tokentext>
<sentencetext>2) Count letters in the website name: eg : slashdot = '6'Vowels are letters too.... slashdot = '8'
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054526</id>
	<title>Hashapass</title>
	<author>PercentSevenC</author>
	<datestamp>1257863700000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>Generates reasonably strong passwords that I don't have to worry about forgetting or storing. Works well for me.

<a href="http://www.hashapass.com/" title="hashapass.com" rel="nofollow">http://www.hashapass.com/</a> [hashapass.com]</htmltext>
<tokenext>Generates reasonably strong passwords that I do n't have to worry about forgetting or storing .
Works well for me .
http : //www.hashapass.com/ [ hashapass.com ]</tokentext>
<sentencetext>Generates reasonably strong passwords that I don't have to worry about forgetting or storing.
Works well for me.
http://www.hashapass.com/ [hashapass.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056456</id>
	<title>OBZVault - cross-platform, secure, and easy to use</title>
	<author>asadeghi</author>
	<datestamp>1257877020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I had this problem myself for many years, additionally compounded by the fact that I used many different operating systems. However I still wanted a safe and secure central place to keep all my passwords and important details. In the end I helped write one myself -&gt; <a href="http://www.offbyzero.com/obzvault" title="offbyzero.com" rel="nofollow">OBZVault</a> [offbyzero.com].

<a href="http://www.offbyzero.com/obzvault" title="offbyzero.com" rel="nofollow">OBZVault is cross-platform, very easy to use, and secure</a> [offbyzero.com]. You can install it on your machine, or even a keychain and take it everywhere with you. Hope that helps.</htmltext>
<tokenext>I had this problem myself for many years , additionally compounded by the fact that I used many different operating systems .
However I still wanted a safe and secure central place to keep all my passwords and important details .
In the end I helped write one myself - &gt; OBZVault [ offbyzero.com ] .
OBZVault is cross-platform , very easy to use , and secure [ offbyzero.com ] .
You can install it on your machine , or even a keychain and take it everywhere with you .
Hope that helps .</tokentext>
<sentencetext>I had this problem myself for many years, additionally compounded by the fact that I used many different operating systems.
However I still wanted a safe and secure central place to keep all my passwords and important details.
In the end I helped write one myself -&gt; OBZVault [offbyzero.com].
OBZVault is cross-platform, very easy to use, and secure [offbyzero.com].
You can install it on your machine, or even a keychain and take it everywhere with you.
Hope that helps.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054942</id>
	<title>master password</title>
	<author>Anonymous</author>
	<datestamp>1257865680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>add a master password to firefox. that way, you (or the thief) will have to key in the master password before ff fills in the password. ff only asks for the master password the first time the password manager is used, so its actually not that much of a hassle. (although this security measure backfires in the unlikely event that the thief steals ur laptop when ff is running)</p></htmltext>
<tokenext>add a master password to firefox .
that way , you ( or the thief ) will have to key in the master password before ff fills in the password .
ff only asks for the master password the first time the password manager is used , so its actually not that much of a hassle .
( although this security measure backfires in the unlikely event that the thief steals ur laptop when ff is running )</tokentext>
<sentencetext>add a master password to firefox.
that way, you (or the thief) will have to key in the master password before ff fills in the password.
ff only asks for the master password the first time the password manager is used, so its actually not that much of a hassle.
(although this security measure backfires in the unlikely event that the thief steals ur laptop when ff is running)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055942</id>
	<title>Passwordsafe with Dropbox</title>
	<author>Anonymous</author>
	<datestamp>1257871860000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Use PasswordSafe with DropBox for synchronizing across computers</p></htmltext>
<tokenext>Use PasswordSafe with DropBox for synchronizing across computers</tokentext>
<sentencetext>Use PasswordSafe with DropBox for synchronizing across computers</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065952</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>virg\_mattes</author>
	<datestamp>1257071760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><i>&gt; slashdot has 6 letters?</i> <br>
<br>
He pulled a dopey.  He meant to say that in step two, he counts the number of consonants in the web site name.<br>
<br>
Virg</htmltext>
<tokenext>&gt; slashdot has 6 letters ?
He pulled a dopey .
He meant to say that in step two , he counts the number of consonants in the web site name .
Virg</tokentext>
<sentencetext>&gt; slashdot has 6 letters?
He pulled a dopey.
He meant to say that in step two, he counts the number of consonants in the web site name.
Virg</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056872</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055350</id>
	<title>Re:PasswordSafe</title>
	<author>m46037</author>
	<datestamp>1257867900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I've been using password safe for several years. very hand for keeping passwords in groups like home, work, web, shoping,etc</htmltext>
<tokenext>I 've been using password safe for several years .
very hand for keeping passwords in groups like home , work , web , shoping,etc</tokentext>
<sentencetext>I've been using password safe for several years.
very hand for keeping passwords in groups like home, work, web, shoping,etc</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056282</id>
	<title>Re:PasswordSafe</title>
	<author>Anonymous</author>
	<datestamp>1257875160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Ditto. I really like the convenience of remembering not only passwords but also username, URL, and notes. It's not only more secure but it's easier too.</p></htmltext>
<tokenext>Ditto .
I really like the convenience of remembering not only passwords but also username , URL , and notes .
It 's not only more secure but it 's easier too .</tokentext>
<sentencetext>Ditto.
I really like the convenience of remembering not only passwords but also username, URL, and notes.
It's not only more secure but it's easier too.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056226</id>
	<title>On Windows</title>
	<author>Anonymous</author>
	<datestamp>1257874560000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Roboform (www.roboform.com)</p><p>I'm not a shill about this... been using Roboform for years. It supports multiple profiles, encrypted notes, password generation according to the rules you supply, and a full ability to specify settings for encryption type and strength, how often and what ways it reauthenticates you, etc. They've also started an online synch service so that you can keep a central online repository and synch them down to a new machine. Lastly they have a portable version. Each login has log, pass, and url. You can "Go and Fill" in IE or FF, and it stands alone to reference, in the system tray. They've made a Chromium/Roboform and will be porting it for Chrome when Google makes the new add-on framework available.  They have a "bookmarklet" feature for accessing booksmarks on Mac, Linux, etc.</p><p>I sound like an ad for the company, but I really do like the program and have recommended it for years to friends, and recently introduced to my new company.</p></htmltext>
<tokenext>Roboform ( www.roboform.com ) I 'm not a shill about this... been using Roboform for years .
It supports multiple profiles , encrypted notes , password generation according to the rules you supply , and a full ability to specify settings for encryption type and strength , how often and what ways it reauthenticates you , etc .
They 've also started an online synch service so that you can keep a central online repository and synch them down to a new machine .
Lastly they have a portable version .
Each login has log , pass , and url .
You can " Go and Fill " in IE or FF , and it stands alone to reference , in the system tray .
They 've made a Chromium/Roboform and will be porting it for Chrome when Google makes the new add-on framework available .
They have a " bookmarklet " feature for accessing booksmarks on Mac , Linux , etc.I sound like an ad for the company , but I really do like the program and have recommended it for years to friends , and recently introduced to my new company .</tokentext>
<sentencetext>Roboform (www.roboform.com)I'm not a shill about this... been using Roboform for years.
It supports multiple profiles, encrypted notes, password generation according to the rules you supply, and a full ability to specify settings for encryption type and strength, how often and what ways it reauthenticates you, etc.
They've also started an online synch service so that you can keep a central online repository and synch them down to a new machine.
Lastly they have a portable version.
Each login has log, pass, and url.
You can "Go and Fill" in IE or FF, and it stands alone to reference, in the system tray.
They've made a Chromium/Roboform and will be porting it for Chrome when Google makes the new add-on framework available.
They have a "bookmarklet" feature for accessing booksmarks on Mac, Linux, etc.I sound like an ad for the company, but I really do like the program and have recommended it for years to friends, and recently introduced to my new company.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055540</id>
	<title>Another vote for KEEPASS</title>
	<author>Anonymous</author>
	<datestamp>1257869160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Keepass Password Safe should be the first tool you check out.  It's superb.  I *highly* recommend it.  I see that plenty of other<nobr> <wbr></nobr>/.ers share my opinion.</p><p><a href="http://keepass.info/" title="keepass.info" rel="nofollow">http://keepass.info/</a> [keepass.info]</p></htmltext>
<tokenext>Keepass Password Safe should be the first tool you check out .
It 's superb .
I * highly * recommend it .
I see that plenty of other /.ers share my opinion.http : //keepass.info/ [ keepass.info ]</tokentext>
<sentencetext>Keepass Password Safe should be the first tool you check out.
It's superb.
I *highly* recommend it.
I see that plenty of other /.ers share my opinion.http://keepass.info/ [keepass.info]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065004</id>
	<title>Password Dragon</title>
	<author>Hexmaster</author>
	<datestamp>1257066960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use Password Dragon written by Ramesh Natarajan. The publisher says the files are encrypted using BlowFishJ. It can be resident on a USB flash memory device. I have been using it for over a year with both XP and Vista, and have had no problems. their website is http://www.passworddragon.com/.</p><p>Note to FTC: I am in NO WAY compensated by the author or publisher!</p><p>BTW: The best part is that it is FREE!  As in beer.</p></htmltext>
<tokenext>I use Password Dragon written by Ramesh Natarajan .
The publisher says the files are encrypted using BlowFishJ .
It can be resident on a USB flash memory device .
I have been using it for over a year with both XP and Vista , and have had no problems .
their website is http : //www.passworddragon.com/.Note to FTC : I am in NO WAY compensated by the author or publisher ! BTW : The best part is that it is FREE !
As in beer .</tokentext>
<sentencetext>I use Password Dragon written by Ramesh Natarajan.
The publisher says the files are encrypted using BlowFishJ.
It can be resident on a USB flash memory device.
I have been using it for over a year with both XP and Vista, and have had no problems.
their website is http://www.passworddragon.com/.Note to FTC: I am in NO WAY compensated by the author or publisher!BTW: The best part is that it is FREE!
As in beer.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054614</id>
	<title>Text File w/ hints</title>
	<author>beernutmark</author>
	<datestamp>1257864060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use a variation of the plain text file. I use a file but instead of listing the actual passwords I write memory hints to remind me what the passwords are and not the actual passwords. This does have the flaw that I am using many variations of a few passwords for most of my needs.  The hints help me remember what variation of the password is for that site.  If someone else got that file they wouldn't be able to make much use of it.
<br> <br>
I also use simple throw away passwords combined with mailinator.com for websites/forums that I don't really care about security wise. If I forget the password I have it resent to mailinator.
 <br> <br>
--<br>
Placeholder for future witty sig.</htmltext>
<tokenext>I use a variation of the plain text file .
I use a file but instead of listing the actual passwords I write memory hints to remind me what the passwords are and not the actual passwords .
This does have the flaw that I am using many variations of a few passwords for most of my needs .
The hints help me remember what variation of the password is for that site .
If someone else got that file they would n't be able to make much use of it .
I also use simple throw away passwords combined with mailinator.com for websites/forums that I do n't really care about security wise .
If I forget the password I have it resent to mailinator .
-- Placeholder for future witty sig .</tokentext>
<sentencetext>I use a variation of the plain text file.
I use a file but instead of listing the actual passwords I write memory hints to remind me what the passwords are and not the actual passwords.
This does have the flaw that I am using many variations of a few passwords for most of my needs.
The hints help me remember what variation of the password is for that site.
If someone else got that file they wouldn't be able to make much use of it.
I also use simple throw away passwords combined with mailinator.com for websites/forums that I don't really care about security wise.
If I forget the password I have it resent to mailinator.
--
Placeholder for future witty sig.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890</id>
	<title>Use the master password feature and stop worrying</title>
	<author>tomhudson</author>
	<datestamp>1257865440000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext>Firefox has a <a href="http://support.mozilla.com/en-US/kb/Protecting+stored+passwords+using+a+master+password" title="mozilla.com">"master password"</a> [mozilla.com] feature.  Use it, and remember just one password.  It'll prompt you for the master password the first time it visits a site that has a saved password.</htmltext>
<tokenext>Firefox has a " master password " [ mozilla.com ] feature .
Use it , and remember just one password .
It 'll prompt you for the master password the first time it visits a site that has a saved password .</tokentext>
<sentencetext>Firefox has a "master password" [mozilla.com] feature.
Use it, and remember just one password.
It'll prompt you for the master password the first time it visits a site that has a saved password.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055466</id>
	<title>Passphrases from books</title>
	<author>Potor</author>
	<datestamp>1257868740000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>What's so wrong with using the opening sentences of books, with a bit of 1337 speak? Take the the first part of the opening sentence from James Joyce's "Ulysses":</p><blockquote><div><p>Stately, plump Buck Mulligan came from the stairhead</p></div></blockquote><p>Change a few letters to numbers, or introduce a misspelling. Even add different punctuation if you want. That'll be pretty stong. Then you can even email yourself a password hint: Joyce, or Dublin, or Stephen, or anything really. You'll remember it, if you're not an idiot. Follow the same pattern with different books for different important sites, and unless the CIA or Mossad is after you, you'll do fine.</p><p>/not my password<nobr> <wbr></nobr>... or is it?</p></div>
	</htmltext>
<tokenext>What 's so wrong with using the opening sentences of books , with a bit of 1337 speak ?
Take the the first part of the opening sentence from James Joyce 's " Ulysses " : Stately , plump Buck Mulligan came from the stairheadChange a few letters to numbers , or introduce a misspelling .
Even add different punctuation if you want .
That 'll be pretty stong .
Then you can even email yourself a password hint : Joyce , or Dublin , or Stephen , or anything really .
You 'll remember it , if you 're not an idiot .
Follow the same pattern with different books for different important sites , and unless the CIA or Mossad is after you , you 'll do fine./not my password ... or is it ?</tokentext>
<sentencetext>What's so wrong with using the opening sentences of books, with a bit of 1337 speak?
Take the the first part of the opening sentence from James Joyce's "Ulysses":Stately, plump Buck Mulligan came from the stairheadChange a few letters to numbers, or introduce a misspelling.
Even add different punctuation if you want.
That'll be pretty stong.
Then you can even email yourself a password hint: Joyce, or Dublin, or Stephen, or anything really.
You'll remember it, if you're not an idiot.
Follow the same pattern with different books for different important sites, and unless the CIA or Mossad is after you, you'll do fine./not my password ... or is it?
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054780</id>
	<title>Re:Simple</title>
	<author>Lord Kano</author>
	<datestamp>1257864780000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Lazy ass. Even President Skroob used one more digit.</p><p>LK</p></htmltext>
<tokenext>Lazy ass .
Even President Skroob used one more digit.LK</tokentext>
<sentencetext>Lazy ass.
Even President Skroob used one more digit.LK</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056508</id>
	<title>use gmail.</title>
	<author>bronney</author>
	<datestamp>1257877500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>type your passwords and send to your own gmail.  But instead of subjecting it with "passwords", call it kimJong1L.  Which acts as a strong password for searching in gmail.</p><p>With over 500,000 mails in your account, no one will find it in time even if they have your gmail password.  But fo you it's just 1 click.  No need for paper.  The only time you need your password is when you have internet access, and when you have access, you can gmail.</p><p>tata.</p></htmltext>
<tokenext>type your passwords and send to your own gmail .
But instead of subjecting it with " passwords " , call it kimJong1L .
Which acts as a strong password for searching in gmail.With over 500,000 mails in your account , no one will find it in time even if they have your gmail password .
But fo you it 's just 1 click .
No need for paper .
The only time you need your password is when you have internet access , and when you have access , you can gmail.tata .</tokentext>
<sentencetext>type your passwords and send to your own gmail.
But instead of subjecting it with "passwords", call it kimJong1L.
Which acts as a strong password for searching in gmail.With over 500,000 mails in your account, no one will find it in time even if they have your gmail password.
But fo you it's just 1 click.
No need for paper.
The only time you need your password is when you have internet access, and when you have access, you can gmail.tata.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054900</id>
	<title>Learn a foreign keyboard</title>
	<author>flabbergast</author>
	<datestamp>1257865440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I haven't actually done this, but if I had to pick my passwords all over again, I would use a foreign keyboard (my choice would be some type of hangul keyboard), and just pick words that make sense in the foreign language.  For instance, if you need an alphanumeric password, you could do something "11tlqdlf" where t = "siot", l = "ee", q = "bieup", d = "digeut" and f = "rieul".  Its "11eleven" in Korean.
<br> <br>
Or if its one of those bank question/response things, you could do something like "What did the truck say to the bread?"  Your response would be "Qkd Qkd" or "bbang bbang".
<br>
Or, "What did the bus driver say to the egg?"  "rp fks" = "ge-ran" or "get on".</htmltext>
<tokenext>I have n't actually done this , but if I had to pick my passwords all over again , I would use a foreign keyboard ( my choice would be some type of hangul keyboard ) , and just pick words that make sense in the foreign language .
For instance , if you need an alphanumeric password , you could do something " 11tlqdlf " where t = " siot " , l = " ee " , q = " bieup " , d = " digeut " and f = " rieul " .
Its " 11eleven " in Korean .
Or if its one of those bank question/response things , you could do something like " What did the truck say to the bread ?
" Your response would be " Qkd Qkd " or " bbang bbang " .
Or , " What did the bus driver say to the egg ?
" " rp fks " = " ge-ran " or " get on " .</tokentext>
<sentencetext>I haven't actually done this, but if I had to pick my passwords all over again, I would use a foreign keyboard (my choice would be some type of hangul keyboard), and just pick words that make sense in the foreign language.
For instance, if you need an alphanumeric password, you could do something "11tlqdlf" where t = "siot", l = "ee", q = "bieup", d = "digeut" and f = "rieul".
Its "11eleven" in Korean.
Or if its one of those bank question/response things, you could do something like "What did the truck say to the bread?
"  Your response would be "Qkd Qkd" or "bbang bbang".
Or, "What did the bus driver say to the egg?
"  "rp fks" = "ge-ran" or "get on".</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062558</id>
	<title>KeyPass and Encryption</title>
	<author>Vrtigo1</author>
	<datestamp>1257100620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Try using a password vaulting app such as KeyPass, and encrypting the password database on your laptop.  I'd suggest not trusting the encryption built-in to the password vaulting app and using multiple layers of encryption such as a TrueCrypt volume, whole disk encryption, etc.  You can determine the level of security/usability that's right for you.  You could also look at hosting the password database online so you can access it from anywhere.  You could use an online backup/file hosting service for that purpose.

Keep in mind that security is inversely proportional to usability, so you'll have to make some sacrifices in terms of usability for good security.  If you're not willing to make those trade-offs, then this whole exercise is probably pointless.</htmltext>
<tokenext>Try using a password vaulting app such as KeyPass , and encrypting the password database on your laptop .
I 'd suggest not trusting the encryption built-in to the password vaulting app and using multiple layers of encryption such as a TrueCrypt volume , whole disk encryption , etc .
You can determine the level of security/usability that 's right for you .
You could also look at hosting the password database online so you can access it from anywhere .
You could use an online backup/file hosting service for that purpose .
Keep in mind that security is inversely proportional to usability , so you 'll have to make some sacrifices in terms of usability for good security .
If you 're not willing to make those trade-offs , then this whole exercise is probably pointless .</tokentext>
<sentencetext>Try using a password vaulting app such as KeyPass, and encrypting the password database on your laptop.
I'd suggest not trusting the encryption built-in to the password vaulting app and using multiple layers of encryption such as a TrueCrypt volume, whole disk encryption, etc.
You can determine the level of security/usability that's right for you.
You could also look at hosting the password database online so you can access it from anywhere.
You could use an online backup/file hosting service for that purpose.
Keep in mind that security is inversely proportional to usability, so you'll have to make some sacrifices in terms of usability for good security.
If you're not willing to make those trade-offs, then this whole exercise is probably pointless.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30072010</id>
	<title>PalmOS: Strip</title>
	<author>bjb</author>
	<datestamp>1258038480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If you have PalmOS, I suggest <a href="http://www.zetetic.net/products/strip/palm" title="zetetic.net">Strip</a> [zetetic.net]. There is also an iPhone version, but I don't know that platform very well.</htmltext>
<tokenext>If you have PalmOS , I suggest Strip [ zetetic.net ] .
There is also an iPhone version , but I do n't know that platform very well .</tokentext>
<sentencetext>If you have PalmOS, I suggest Strip [zetetic.net].
There is also an iPhone version, but I don't know that platform very well.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059824</id>
	<title>eWallet</title>
	<author>Anonymous</author>
	<datestamp>1257089160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use eWallet, which runs on both Windows PCs and Mobile Phones, syncs between the two, and encrypts.</p></htmltext>
<tokenext>I use eWallet , which runs on both Windows PCs and Mobile Phones , syncs between the two , and encrypts .</tokentext>
<sentencetext>I use eWallet, which runs on both Windows PCs and Mobile Phones, syncs between the two, and encrypts.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058010</id>
	<title>Re:paper in your wallet</title>
	<author>dtml-try MyNick</author>
	<datestamp>1257073920000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>A while ago I decided I needed a new password system. I had 9 or 10 different passwords I used for basicly everything.<br>It became increasingly anoying to remember which password I used where. And with the increasing number of password protected sites and apps I also started using the same passwords over and over.So I needed a new scheme.<br><br>My requirements were that:<br>it had to be long (14 chars minimum),<br>had to contain letters and digits,<br>should not be guessable, or at least parts of it (duh!),<br>must be unique for every application or website, so it wouldnt create a domino effect if compromised<br>must be easy to remember or memorize<br><br>I decided that the key was to categorise everything.<br><br>So I came up with about 10 or 12 different categories. (e.g. forums, social networks, design, workrelated, etc)<br>Then I started to fidle arround to get 2 combinations of keys, 5 chars long, that were very fast to type and random (as in, not a existing word)<br>For the numbers I took 3 chars of the app or site. You could take the first or last three, of make a offset (start + 2 (so char 3, 4 &amp; 5) whatever works.. and translated those 3 chars in digits.. for example a = 11, b = 22 etc.. or make a scheme for that  a = 26, b = 25, a = 2., b = 3. etc.. whatever works again<nobr> <wbr></nobr>:)<br><br>Then I threw all of that in a mix. So I ended up with something like &lt;random fasttypechars&gt;&lt;category acronym&gt;&lt;random fasttypechars&gt; &lt;coded app/sitename&gt;<br>Of course you can think of several other options to make such a scheme.<br><br>It's certainly not flawless but I think it's good enough for everything non-mission critical.<br>Every pass is unique and can easily remember them as long as I recognise the right category</htmltext>
<tokenext>A while ago I decided I needed a new password system .
I had 9 or 10 different passwords I used for basicly everything.It became increasingly anoying to remember which password I used where .
And with the increasing number of password protected sites and apps I also started using the same passwords over and over.So I needed a new scheme.My requirements were that : it had to be long ( 14 chars minimum ) ,had to contain letters and digits,should not be guessable , or at least parts of it ( duh !
) ,must be unique for every application or website , so it wouldnt create a domino effect if compromisedmust be easy to remember or memorizeI decided that the key was to categorise everything.So I came up with about 10 or 12 different categories .
( e.g. forums , social networks , design , workrelated , etc ) Then I started to fidle arround to get 2 combinations of keys , 5 chars long , that were very fast to type and random ( as in , not a existing word ) For the numbers I took 3 chars of the app or site .
You could take the first or last three , of make a offset ( start + 2 ( so char 3 , 4 &amp; 5 ) whatever works.. and translated those 3 chars in digits.. for example a = 11 , b = 22 etc.. or make a scheme for that a = 26 , b = 25 , a = 2. , b = 3. etc.. whatever works again : ) Then I threw all of that in a mix .
So I ended up with something like Of course you can think of several other options to make such a scheme.It 's certainly not flawless but I think it 's good enough for everything non-mission critical.Every pass is unique and can easily remember them as long as I recognise the right category</tokentext>
<sentencetext>A while ago I decided I needed a new password system.
I had 9 or 10 different passwords I used for basicly everything.It became increasingly anoying to remember which password I used where.
And with the increasing number of password protected sites and apps I also started using the same passwords over and over.So I needed a new scheme.My requirements were that:it had to be long (14 chars minimum),had to contain letters and digits,should not be guessable, or at least parts of it (duh!
),must be unique for every application or website, so it wouldnt create a domino effect if compromisedmust be easy to remember or memorizeI decided that the key was to categorise everything.So I came up with about 10 or 12 different categories.
(e.g. forums, social networks, design, workrelated, etc)Then I started to fidle arround to get 2 combinations of keys, 5 chars long, that were very fast to type and random (as in, not a existing word)For the numbers I took 3 chars of the app or site.
You could take the first or last three, of make a offset (start + 2 (so char 3, 4 &amp; 5) whatever works.. and translated those 3 chars in digits.. for example a = 11, b = 22 etc.. or make a scheme for that  a = 26, b = 25, a = 2., b = 3. etc.. whatever works again :)Then I threw all of that in a mix.
So I ended up with something like  Of course you can think of several other options to make such a scheme.It's certainly not flawless but I think it's good enough for everything non-mission critical.Every pass is unique and can easily remember them as long as I recognise the right category</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518</id>
	<title>The most secure place</title>
	<author>areusche</author>
	<datestamp>1257863700000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext>Is your head. Plain and simple. Never write a password down on your hand and NEVER on a sticky note on your monitor. Make at least two or three passwords. One for forum and slashdot and another for banking and secure sites. Use firefox's "master password" lock and set that password to your third password.</htmltext>
<tokenext>Is your head .
Plain and simple .
Never write a password down on your hand and NEVER on a sticky note on your monitor .
Make at least two or three passwords .
One for forum and slashdot and another for banking and secure sites .
Use firefox 's " master password " lock and set that password to your third password .</tokentext>
<sentencetext>Is your head.
Plain and simple.
Never write a password down on your hand and NEVER on a sticky note on your monitor.
Make at least two or three passwords.
One for forum and slashdot and another for banking and secure sites.
Use firefox's "master password" lock and set that password to your third password.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055228</id>
	<title>Use Trucrypt . . .</title>
	<author>Anonymous</author>
	<datestamp>1257867180000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>And encrypt a data partition.  Install Firefox and it's profile on this parition, use a master password in Firefox. Install KeePass ( http://keepass.info/ ) onto the encrypted partition to hold other passwords, license numbers etc.  Store all your data on this partition and like the Firefox install I mentioned above, if it contains any personal information or data install it to the encrypted partition.  In Windows you can use TweakUI to move your Documents folder to this partition too.</p></htmltext>
<tokenext>And encrypt a data partition .
Install Firefox and it 's profile on this parition , use a master password in Firefox .
Install KeePass ( http : //keepass.info/ ) onto the encrypted partition to hold other passwords , license numbers etc .
Store all your data on this partition and like the Firefox install I mentioned above , if it contains any personal information or data install it to the encrypted partition .
In Windows you can use TweakUI to move your Documents folder to this partition too .</tokentext>
<sentencetext>And encrypt a data partition.
Install Firefox and it's profile on this parition, use a master password in Firefox.
Install KeePass ( http://keepass.info/ ) onto the encrypted partition to hold other passwords, license numbers etc.
Store all your data on this partition and like the Firefox install I mentioned above, if it contains any personal information or data install it to the encrypted partition.
In Windows you can use TweakUI to move your Documents folder to this partition too.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054934</id>
	<title>RoboForm and RoboForm2Go</title>
	<author>Anonymous</author>
	<datestamp>1257865620000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use RoboForm and have never turned back.  It adds an (optional) toolbar to Firefox and IE that has drop-downs for form-filling, including password filling.  There's also a password generator where you can choose complexity.</p><p>If you move between computers (say home + work PC) then RoboForm2Go runs on a USB key and will autosync your passwords.</p><p>You stick it in the USB drive and your existing IE/FF window automagically adds the RoboForm toolbar.  Once you take it out, the toolbar is gone -- no need to close the window.</p></htmltext>
<tokenext>I use RoboForm and have never turned back .
It adds an ( optional ) toolbar to Firefox and IE that has drop-downs for form-filling , including password filling .
There 's also a password generator where you can choose complexity.If you move between computers ( say home + work PC ) then RoboForm2Go runs on a USB key and will autosync your passwords.You stick it in the USB drive and your existing IE/FF window automagically adds the RoboForm toolbar .
Once you take it out , the toolbar is gone -- no need to close the window .</tokentext>
<sentencetext>I use RoboForm and have never turned back.
It adds an (optional) toolbar to Firefox and IE that has drop-downs for form-filling, including password filling.
There's also a password generator where you can choose complexity.If you move between computers (say home + work PC) then RoboForm2Go runs on a USB key and will autosync your passwords.You stick it in the USB drive and your existing IE/FF window automagically adds the RoboForm toolbar.
Once you take it out, the toolbar is gone -- no need to close the window.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30079116</id>
	<title>Re:paper in your wallet</title>
	<author>hmar</author>
	<datestamp>1258021140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I keep them in my blackberry, which is also password protected and set to wipe after 5 failures. Works well enough for me, as I access the blackberry so often I almost can't forget that password. Not sure if other smart phones have the auto wipe feature.</htmltext>
<tokenext>I keep them in my blackberry , which is also password protected and set to wipe after 5 failures .
Works well enough for me , as I access the blackberry so often I almost ca n't forget that password .
Not sure if other smart phones have the auto wipe feature .</tokentext>
<sentencetext>I keep them in my blackberry, which is also password protected and set to wipe after 5 failures.
Works well enough for me, as I access the blackberry so often I almost can't forget that password.
Not sure if other smart phones have the auto wipe feature.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058862</id>
	<title>Best Tool For Remembering Passwords?</title>
	<author>Anonymous</author>
	<datestamp>1257083040000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Brain. Best if it's yours.<br>Lately memory is really undervalued.</p></htmltext>
<tokenext>Brain .
Best if it 's yours.Lately memory is really undervalued .</tokentext>
<sentencetext>Brain.
Best if it's yours.Lately memory is really undervalued.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056112</id>
	<title>Re:1password</title>
	<author>ooglek</author>
	<datestamp>1257873360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Agreed.  1Password, if you need Mac OSX only, is the bomb.  It has a polished feel, handles generation of passwords for different sites with different size/character requirements with ease, lets you know how secure your existing and new passwords are, and allows you to sync between other OSX machines using Dropbox.

For those with Windows boxes, there are other options.  I can easily export my passwords from 1Password and import them using LastPass <a href="https://lastpass.com/" title="lastpass.com">https://lastpass.com/</a> [lastpass.com] (Free), but that's only for my wife who uses my passwords occasionally, and it would suck for normal day to day use.

So, if you have OS X only, 1Password is fantastic.  If not, there are a few other options that are cross platform and will do the job.

Writing them down seems like a bad idea.</htmltext>
<tokenext>Agreed .
1Password , if you need Mac OSX only , is the bomb .
It has a polished feel , handles generation of passwords for different sites with different size/character requirements with ease , lets you know how secure your existing and new passwords are , and allows you to sync between other OSX machines using Dropbox .
For those with Windows boxes , there are other options .
I can easily export my passwords from 1Password and import them using LastPass https : //lastpass.com/ [ lastpass.com ] ( Free ) , but that 's only for my wife who uses my passwords occasionally , and it would suck for normal day to day use .
So , if you have OS X only , 1Password is fantastic .
If not , there are a few other options that are cross platform and will do the job .
Writing them down seems like a bad idea .</tokentext>
<sentencetext>Agreed.
1Password, if you need Mac OSX only, is the bomb.
It has a polished feel, handles generation of passwords for different sites with different size/character requirements with ease, lets you know how secure your existing and new passwords are, and allows you to sync between other OSX machines using Dropbox.
For those with Windows boxes, there are other options.
I can easily export my passwords from 1Password and import them using LastPass https://lastpass.com/ [lastpass.com] (Free), but that's only for my wife who uses my passwords occasionally, and it would suck for normal day to day use.
So, if you have OS X only, 1Password is fantastic.
If not, there are a few other options that are cross platform and will do the job.
Writing them down seems like a bad idea.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054598</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054606</id>
	<title>Mnemonics</title>
	<author>dandart</author>
	<datestamp>1257864000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Do as I say, not as I do! :
<br>Da15,naId!
<br>This and other security practices at <a href="http://tuxtor.blogspot.com/2009/11/best-security-practices-for-your.html" title="blogspot.com" rel="nofollow">my blog</a> [blogspot.com] . Hope you find it useful here!</htmltext>
<tokenext>Do as I say , not as I do !
: Da15,naId !
This and other security practices at my blog [ blogspot.com ] .
Hope you find it useful here !</tokentext>
<sentencetext>Do as I say, not as I do!
:
Da15,naId!
This and other security practices at my blog [blogspot.com] .
Hope you find it useful here!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054882</id>
	<title>Full Disk Encryption</title>
	<author>Anonymous</author>
	<datestamp>1257865320000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Once you start using a full disk encryption solution like Truecrypt or others, all the "insecure" electronic methods you discussed suddenly become secure.</p></htmltext>
<tokenext>Once you start using a full disk encryption solution like Truecrypt or others , all the " insecure " electronic methods you discussed suddenly become secure .</tokentext>
<sentencetext>Once you start using a full disk encryption solution like Truecrypt or others, all the "insecure" electronic methods you discussed suddenly become secure.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058110</id>
	<title>Lastpass Password Manager for Firefox</title>
	<author>Anonymous</author>
	<datestamp>1257074880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I'm surprised that no one has mentioned this great add-on yet. It keeps all the passwords encrypted and all communications are encrypted as well. You need a master password to login and then it will prompt/autologin (if you choose) you into websites for that browsing session. It also automatically detects when you are trying to create a new account at a site and can generate a 'hard' password which it automatically stores. The nice thing is that since it is centralized you can login at work using Firefox and have all your passwords accessible to you there too.</p></htmltext>
<tokenext>I 'm surprised that no one has mentioned this great add-on yet .
It keeps all the passwords encrypted and all communications are encrypted as well .
You need a master password to login and then it will prompt/autologin ( if you choose ) you into websites for that browsing session .
It also automatically detects when you are trying to create a new account at a site and can generate a 'hard ' password which it automatically stores .
The nice thing is that since it is centralized you can login at work using Firefox and have all your passwords accessible to you there too .</tokentext>
<sentencetext>I'm surprised that no one has mentioned this great add-on yet.
It keeps all the passwords encrypted and all communications are encrypted as well.
You need a master password to login and then it will prompt/autologin (if you choose) you into websites for that browsing session.
It also automatically detects when you are trying to create a new account at a site and can generate a 'hard' password which it automatically stores.
The nice thing is that since it is centralized you can login at work using Firefox and have all your passwords accessible to you there too.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054500</id>
	<title>if you use a mac...</title>
	<author>Anonymous</author>
	<datestamp>1257863580000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>1password for mac and iPhone/iTouch is a good product</htmltext>
<tokenext>1password for mac and iPhone/iTouch is a good product</tokentext>
<sentencetext>1password for mac and iPhone/iTouch is a good product</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055850</id>
	<title>Re:Hashing Works</title>
	<author>Anonymous</author>
	<datestamp>1257871320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>That's what I do but couldn't think of a way to describe it. Hashing.</p><p>Generate passwords mentally from a combination of a constant character string, a numeric component that you regularly change (and/or move its position in the password), and a component generated from the URL in a way known only to you. That way you can have a different password on every site and be able to recall each one.</p><p>Maybe have a card in your wallet with a note decipherable only by you that reminds you of how the hash works.</p></htmltext>
<tokenext>That 's what I do but could n't think of a way to describe it .
Hashing.Generate passwords mentally from a combination of a constant character string , a numeric component that you regularly change ( and/or move its position in the password ) , and a component generated from the URL in a way known only to you .
That way you can have a different password on every site and be able to recall each one.Maybe have a card in your wallet with a note decipherable only by you that reminds you of how the hash works .</tokentext>
<sentencetext>That's what I do but couldn't think of a way to describe it.
Hashing.Generate passwords mentally from a combination of a constant character string, a numeric component that you regularly change (and/or move its position in the password), and a component generated from the URL in a way known only to you.
That way you can have a different password on every site and be able to recall each one.Maybe have a card in your wallet with a note decipherable only by you that reminds you of how the hash works.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055328</id>
	<title>Get a Mac.</title>
	<author>iliketrash</author>
	<datestamp>1257867780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Get a Mac. It has had a keychain manager, Keychain Access, since 1995. It works with \_all\_ password-using programs, not just browsers, and it is beautifully integrated across the system like more and more of OS X.</p></htmltext>
<tokenext>Get a Mac .
It has had a keychain manager , Keychain Access , since 1995 .
It works with \ _all \ _ password-using programs , not just browsers , and it is beautifully integrated across the system like more and more of OS X .</tokentext>
<sentencetext>Get a Mac.
It has had a keychain manager, Keychain Access, since 1995.
It works with \_all\_ password-using programs, not just browsers, and it is beautifully integrated across the system like more and more of OS X.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055284</id>
	<title>SuperGenPass</title>
	<author>Anonymous</author>
	<datestamp>1257867540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>SuperGenPass (http://supergenpass.com/) solves a lot of problems for me... you remember one (or more if you like) master password and use the domain name + the master password to generate the site password. There are several advantages to doing this:</p><p>1) Your master password never gets transmitted or recorded, so even if one site is compromised no other site is. (One way hash makes recovering master pass from site pass basically impossible)<br>2) The generated site passwords are very secure as they are a pseudo-random string of upper- and lower-case characters and numbers, and can be any length you'd like, in other words not vulnerable to a dictionary attack as most memorable passwords.<br>3) It's a bookmarklet - a javascript script that runs from a bookmark completely locally. Works with any browser and all the hashing is completely local to your computer with nothing stored. Or you can also use the mobile version on the site if you're away from your computer.</p><p>For an added measure of obscurity, I've added a keyboard shortcut using Ctrl + last letter of my password to activate the hash. so even if someone was watching me type the password, they would not necessarily be able to access the site unless they knew i was using SPG. I know obscurity is not security, but it makes me feel better<nobr> <wbr></nobr>:)</p><p>Overall, SGP gives you the convenience of remembering only one or few passwords and the security of many highly difficult to guess site passwords.</p></htmltext>
<tokenext>SuperGenPass ( http : //supergenpass.com/ ) solves a lot of problems for me... you remember one ( or more if you like ) master password and use the domain name + the master password to generate the site password .
There are several advantages to doing this : 1 ) Your master password never gets transmitted or recorded , so even if one site is compromised no other site is .
( One way hash makes recovering master pass from site pass basically impossible ) 2 ) The generated site passwords are very secure as they are a pseudo-random string of upper- and lower-case characters and numbers , and can be any length you 'd like , in other words not vulnerable to a dictionary attack as most memorable passwords.3 ) It 's a bookmarklet - a javascript script that runs from a bookmark completely locally .
Works with any browser and all the hashing is completely local to your computer with nothing stored .
Or you can also use the mobile version on the site if you 're away from your computer.For an added measure of obscurity , I 've added a keyboard shortcut using Ctrl + last letter of my password to activate the hash .
so even if someone was watching me type the password , they would not necessarily be able to access the site unless they knew i was using SPG .
I know obscurity is not security , but it makes me feel better : ) Overall , SGP gives you the convenience of remembering only one or few passwords and the security of many highly difficult to guess site passwords .</tokentext>
<sentencetext>SuperGenPass (http://supergenpass.com/) solves a lot of problems for me... you remember one (or more if you like) master password and use the domain name + the master password to generate the site password.
There are several advantages to doing this:1) Your master password never gets transmitted or recorded, so even if one site is compromised no other site is.
(One way hash makes recovering master pass from site pass basically impossible)2) The generated site passwords are very secure as they are a pseudo-random string of upper- and lower-case characters and numbers, and can be any length you'd like, in other words not vulnerable to a dictionary attack as most memorable passwords.3) It's a bookmarklet - a javascript script that runs from a bookmark completely locally.
Works with any browser and all the hashing is completely local to your computer with nothing stored.
Or you can also use the mobile version on the site if you're away from your computer.For an added measure of obscurity, I've added a keyboard shortcut using Ctrl + last letter of my password to activate the hash.
so even if someone was watching me type the password, they would not necessarily be able to access the site unless they knew i was using SPG.
I know obscurity is not security, but it makes me feel better :)Overall, SGP gives you the convenience of remembering only one or few passwords and the security of many highly difficult to guess site passwords.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057794</id>
	<title>Some ideas</title>
	<author>alantus</author>
	<datestamp>1257070920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>1. As everybody suggested, KeePass is a good option.<br>2. text or html file encrypted with gnupg (use symmetric key encryption, and then remember a passphrase/password). This is what I use.<br>3. firefox has a built in password manager, so you only have to remember one password<br>4. KDE 3 has kwallet, a password manager that integrates to KDE applications.  I don't know if KDE 4 has it, as I'm trying to stay away from that.<br>5. There are several applications for PDAs/mobiles for password management.  Have a backup somewhere else in case you drop your cellphone in the toilet.</p></htmltext>
<tokenext>1 .
As everybody suggested , KeePass is a good option.2 .
text or html file encrypted with gnupg ( use symmetric key encryption , and then remember a passphrase/password ) .
This is what I use.3 .
firefox has a built in password manager , so you only have to remember one password4 .
KDE 3 has kwallet , a password manager that integrates to KDE applications .
I do n't know if KDE 4 has it , as I 'm trying to stay away from that.5 .
There are several applications for PDAs/mobiles for password management .
Have a backup somewhere else in case you drop your cellphone in the toilet .</tokentext>
<sentencetext>1.
As everybody suggested, KeePass is a good option.2.
text or html file encrypted with gnupg (use symmetric key encryption, and then remember a passphrase/password).
This is what I use.3.
firefox has a built in password manager, so you only have to remember one password4.
KDE 3 has kwallet, a password manager that integrates to KDE applications.
I don't know if KDE 4 has it, as I'm trying to stay away from that.5.
There are several applications for PDAs/mobiles for password management.
Have a backup somewhere else in case you drop your cellphone in the toilet.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30069450</id>
	<title>SplashID</title>
	<author>Vastad</author>
	<datestamp>1257097800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've been using <a href="http://www.splashdata.com/splashid/index.asp" title="splashdata.com" rel="nofollow">SplashID</a> [splashdata.com] for the last 5 years or so. One of the best apps I ever paid for. It exists on pretty much any major OS you might be using on a PC <i>or</i> - and here's the selling point - any mobile phone.</p><p>I've had it successfully synchronize between my PC and Nokia E61i. Before that it was syncing with my Sony Ericsson P990i and P910i. There is an Android version of it out, but unfortunately Android Market is not available in Singapore. I was forced to use SlideME to use the very barebones but still functional <a href="http://slideme.org/application/gbasafe" title="slideme.org" rel="nofollow">gbaSafe</a> [slideme.org].</p><p>SplashID uses the 256bit <a href="http://en.wikipedia.org/wiki/Blowfish\_(cipher)" title="wikipedia.org" rel="nofollow">Blowfish</a> [wikipedia.org] encryption method and comes with a built in password generator, with quite a few options like limiting the password to lowercase and numbers and even checks for "pronounceability". It comes with a nice set of icons, you can create custom templates with multiple masked fields and the layout is intuitive. There are several export options, with some compatibility with other formats as well as the standard unencrypted CSV excel file.</p></htmltext>
<tokenext>I 've been using SplashID [ splashdata.com ] for the last 5 years or so .
One of the best apps I ever paid for .
It exists on pretty much any major OS you might be using on a PC or - and here 's the selling point - any mobile phone.I 've had it successfully synchronize between my PC and Nokia E61i .
Before that it was syncing with my Sony Ericsson P990i and P910i .
There is an Android version of it out , but unfortunately Android Market is not available in Singapore .
I was forced to use SlideME to use the very barebones but still functional gbaSafe [ slideme.org ] .SplashID uses the 256bit Blowfish [ wikipedia.org ] encryption method and comes with a built in password generator , with quite a few options like limiting the password to lowercase and numbers and even checks for " pronounceability " .
It comes with a nice set of icons , you can create custom templates with multiple masked fields and the layout is intuitive .
There are several export options , with some compatibility with other formats as well as the standard unencrypted CSV excel file .</tokentext>
<sentencetext>I've been using SplashID [splashdata.com] for the last 5 years or so.
One of the best apps I ever paid for.
It exists on pretty much any major OS you might be using on a PC or - and here's the selling point - any mobile phone.I've had it successfully synchronize between my PC and Nokia E61i.
Before that it was syncing with my Sony Ericsson P990i and P910i.
There is an Android version of it out, but unfortunately Android Market is not available in Singapore.
I was forced to use SlideME to use the very barebones but still functional gbaSafe [slideme.org].SplashID uses the 256bit Blowfish [wikipedia.org] encryption method and comes with a built in password generator, with quite a few options like limiting the password to lowercase and numbers and even checks for "pronounceability".
It comes with a nice set of icons, you can create custom templates with multiple masked fields and the layout is intuitive.
There are several export options, with some compatibility with other formats as well as the standard unencrypted CSV excel file.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054664</id>
	<title>gjots2 + ccrypt</title>
	<author>bhepple</author>
	<datestamp>1257864300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>gjots2: <a href="http://sourceforge.net/projects/gjots2/" title="sourceforge.net" rel="nofollow">http://sourceforge.net/projects/gjots2/</a> [sourceforge.net] (full disclosure: written by me under GPL)
<p>
ccrypt: <a href="http://ccrypt.sourceforge.net/" title="sourceforge.net" rel="nofollow">http://ccrypt.sourceforge.net/</a> [sourceforge.net]</p></htmltext>
<tokenext>gjots2 : http : //sourceforge.net/projects/gjots2/ [ sourceforge.net ] ( full disclosure : written by me under GPL ) ccrypt : http : //ccrypt.sourceforge.net/ [ sourceforge.net ]</tokentext>
<sentencetext>gjots2: http://sourceforge.net/projects/gjots2/ [sourceforge.net] (full disclosure: written by me under GPL)

ccrypt: http://ccrypt.sourceforge.net/ [sourceforge.net]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055468</id>
	<title>Re:Password Safe</title>
	<author>deathbird</author>
	<datestamp>1257868740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I'll vouch for this one. It stores passwords in a small encrypted file, has an autotype feature, generates strong passwords, pronounceable passwords, lets you store notes in a given entry, and can run off a USB drive.
And the password file doesn't have to be a particular extension, so you can obscure it, and it's small, so it's really easy to back-up. Mine has hundreds of passwords with notes and is still under 50kb.</htmltext>
<tokenext>I 'll vouch for this one .
It stores passwords in a small encrypted file , has an autotype feature , generates strong passwords , pronounceable passwords , lets you store notes in a given entry , and can run off a USB drive .
And the password file does n't have to be a particular extension , so you can obscure it , and it 's small , so it 's really easy to back-up .
Mine has hundreds of passwords with notes and is still under 50kb .</tokentext>
<sentencetext>I'll vouch for this one.
It stores passwords in a small encrypted file, has an autotype feature, generates strong passwords, pronounceable passwords, lets you store notes in a given entry, and can run off a USB drive.
And the password file doesn't have to be a particular extension, so you can obscure it, and it's small, so it's really easy to back-up.
Mine has hundreds of passwords with notes and is still under 50kb.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054660</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054730</id>
	<title>3 steps</title>
	<author>Anonymous</author>
	<datestamp>1257864540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>1: Pick 3 six digit passwords that are not dictionary words (one should have some numbers in it)<br>
2: Use the simplest one for your low level password for sites that require one.<br>
3: For other sites use a combination of the 3 passwords, either the same one repeated or 2 or 3 of them together as a group.  Mix&amp;Match, if you forget a password for a site, it is one of the combinations of those three.<br>
extra credit: if you want, give each password a NAME that has nothing to do with the actual password.  Then feel free to write down the NAMES of the passwords anywhere you want!
<br> <br>
This has worked for me for a long time with no problems, I have had problems with the replacement passwords assigned to me like 7qyR&amp;8T .  I just forget them and have to write them down or save the email.  someone once got into my email and got those passwords!  Never again.<br>If I REALLY have to save info in a text file, I do that, but I add<nobr> <wbr></nobr>.jpg to the end of the file name.  Casually clicking on it won't open the file, you get an error.  If I open it from within the Text Editor program it then opens fine.  Security through obscurity works well enough for me.<br>
I also have a safe in my house.  Everyone knows I have a safe. There is nothing in it.<br>
I hide my valuables in a fireproof box elsewhere.</htmltext>
<tokenext>1 : Pick 3 six digit passwords that are not dictionary words ( one should have some numbers in it ) 2 : Use the simplest one for your low level password for sites that require one .
3 : For other sites use a combination of the 3 passwords , either the same one repeated or 2 or 3 of them together as a group .
Mix&amp;Match , if you forget a password for a site , it is one of the combinations of those three .
extra credit : if you want , give each password a NAME that has nothing to do with the actual password .
Then feel free to write down the NAMES of the passwords anywhere you want !
This has worked for me for a long time with no problems , I have had problems with the replacement passwords assigned to me like 7qyR&amp;8T .
I just forget them and have to write them down or save the email .
someone once got into my email and got those passwords !
Never again.If I REALLY have to save info in a text file , I do that , but I add .jpg to the end of the file name .
Casually clicking on it wo n't open the file , you get an error .
If I open it from within the Text Editor program it then opens fine .
Security through obscurity works well enough for me .
I also have a safe in my house .
Everyone knows I have a safe .
There is nothing in it .
I hide my valuables in a fireproof box elsewhere .</tokentext>
<sentencetext>1: Pick 3 six digit passwords that are not dictionary words (one should have some numbers in it)
2: Use the simplest one for your low level password for sites that require one.
3: For other sites use a combination of the 3 passwords, either the same one repeated or 2 or 3 of them together as a group.
Mix&amp;Match, if you forget a password for a site, it is one of the combinations of those three.
extra credit: if you want, give each password a NAME that has nothing to do with the actual password.
Then feel free to write down the NAMES of the passwords anywhere you want!
This has worked for me for a long time with no problems, I have had problems with the replacement passwords assigned to me like 7qyR&amp;8T .
I just forget them and have to write them down or save the email.
someone once got into my email and got those passwords!
Never again.If I REALLY have to save info in a text file, I do that, but I add .jpg to the end of the file name.
Casually clicking on it won't open the file, you get an error.
If I open it from within the Text Editor program it then opens fine.
Security through obscurity works well enough for me.
I also have a safe in my house.
Everyone knows I have a safe.
There is nothing in it.
I hide my valuables in a fireproof box elsewhere.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055706</id>
	<title>Brain</title>
	<author>Argon</author>
	<datestamp>1257870420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If you're using a tool, you're no longer "remembering"<nobr> <wbr></nobr>:-)</p></htmltext>
<tokenext>If you 're using a tool , you 're no longer " remembering " : - )</tokentext>
<sentencetext>If you're using a tool, you're no longer "remembering" :-)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054584</id>
	<title>Try using your brain.</title>
	<author>Anonymous</author>
	<datestamp>1257863940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Best tool I can recommend is the brain.  It has an amazing capacity for remembering passwords when properly exercised.  And if it's lost, well, then there's no reason to be concerned.</p></htmltext>
<tokenext>Best tool I can recommend is the brain .
It has an amazing capacity for remembering passwords when properly exercised .
And if it 's lost , well , then there 's no reason to be concerned .</tokentext>
<sentencetext>Best tool I can recommend is the brain.
It has an amazing capacity for remembering passwords when properly exercised.
And if it's lost, well, then there's no reason to be concerned.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061606</id>
	<title>Acronyms++</title>
	<author>Anonymous</author>
	<datestamp>1257096660000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Usually what I suggest to people is to think of a simple sentence they can remember easily such as:</p><p>I have a White car</p><p>then proceed to take the first letter of each word<br>ihawc</p><p>then proceed to change letters into numbers or capitalize them<br>1H4wc</p><p>then proceed to add special characters to the end, such as an exclamation mark.<br>1H4wc!</p><p>there is now a complex password that is easy to remember: "i Have a white car!</p><p>keynotes: the complexity will vary for different people as some people can recognize a 4 as an A, or a 1 as an i or l.</p><p>Overkill maybe?</p></htmltext>
<tokenext>Usually what I suggest to people is to think of a simple sentence they can remember easily such as : I have a White carthen proceed to take the first letter of each wordihawcthen proceed to change letters into numbers or capitalize them1H4wcthen proceed to add special characters to the end , such as an exclamation mark.1H4wc ! there is now a complex password that is easy to remember : " i Have a white car ! keynotes : the complexity will vary for different people as some people can recognize a 4 as an A , or a 1 as an i or l.Overkill maybe ?</tokentext>
<sentencetext>Usually what I suggest to people is to think of a simple sentence they can remember easily such as:I have a White carthen proceed to take the first letter of each wordihawcthen proceed to change letters into numbers or capitalize them1H4wcthen proceed to add special characters to the end, such as an exclamation mark.1H4wc!there is now a complex password that is easy to remember: "i Have a white car!keynotes: the complexity will vary for different people as some people can recognize a 4 as an A, or a 1 as an i or l.Overkill maybe?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057448</id>
	<title>Re:Keepass</title>
	<author>Anonymous</author>
	<datestamp>1257066660000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I'm sorry, but anything with the name "keep ass" is a bit suspect...</p></htmltext>
<tokenext>I 'm sorry , but anything with the name " keep ass " is a bit suspect.. .</tokentext>
<sentencetext>I'm sorry, but anything with the name "keep ass" is a bit suspect...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054542</id>
	<title>Try Keepassx</title>
	<author>willyg</author>
	<datestamp>1257863820000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>I've used Keepassx for a few years now.  It's cross platform (Windows / Linux) and stores the files encrypted.  I tried one of Bruce Schneier's public domain solutions previously, but the Linux install (Password Gorilla ???) was rather painful on some systems if I recall correctly.</p><p>Just be sure to use a substantial password for the database...</p></htmltext>
<tokenext>I 've used Keepassx for a few years now .
It 's cross platform ( Windows / Linux ) and stores the files encrypted .
I tried one of Bruce Schneier 's public domain solutions previously , but the Linux install ( Password Gorilla ? ? ?
) was rather painful on some systems if I recall correctly.Just be sure to use a substantial password for the database.. .</tokentext>
<sentencetext>I've used Keepassx for a few years now.
It's cross platform (Windows / Linux) and stores the files encrypted.
I tried one of Bruce Schneier's public domain solutions previously, but the Linux install (Password Gorilla ???
) was rather painful on some systems if I recall correctly.Just be sure to use a substantial password for the database...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055250</id>
	<title>Best Solution 100\% Guarantee</title>
	<author>Anonymous</author>
	<datestamp>1257867300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Best way to remember password is a just us a Hint and keep it in plain text. The best place to store the hints for you logon ID and Password is on the Cloud. The cloud is perfect location because you never need to sync and its accessible on Any computer or smart phone. Also, since I log into my accounts generally by clicking the URL on my bookmarks, I keep all my account passwords are stored in the Title of the URL on my google bookmarks (my bookmarks are stored on the google website so only I can get into them but I can still access them any computer or cell phone, with no syncing required). Example: The title of the bookmark to my Amazon account would show: Amazon.com - ID\_Hint  Password\_Hint.  For my hint I would use a very cryptic combination of Letters, Numbers, and Symbols.  Say my ID for this account is  Syphony123456!  then my ID hint would be S16! which tells me to type my favorite word (since I like music) using a capital letter with number range 1 to 6 followed by ! Most of my hints are a bit more complex but it works. I've asked people to figure out my hints and they can't, unless I explain it to them then it's simple. I have over 50 different hints and even my wife can remember all of them easily)</p></htmltext>
<tokenext>Best way to remember password is a just us a Hint and keep it in plain text .
The best place to store the hints for you logon ID and Password is on the Cloud .
The cloud is perfect location because you never need to sync and its accessible on Any computer or smart phone .
Also , since I log into my accounts generally by clicking the URL on my bookmarks , I keep all my account passwords are stored in the Title of the URL on my google bookmarks ( my bookmarks are stored on the google website so only I can get into them but I can still access them any computer or cell phone , with no syncing required ) .
Example : The title of the bookmark to my Amazon account would show : Amazon.com - ID \ _Hint Password \ _Hint .
For my hint I would use a very cryptic combination of Letters , Numbers , and Symbols .
Say my ID for this account is Syphony123456 !
then my ID hint would be S16 !
which tells me to type my favorite word ( since I like music ) using a capital letter with number range 1 to 6 followed by !
Most of my hints are a bit more complex but it works .
I 've asked people to figure out my hints and they ca n't , unless I explain it to them then it 's simple .
I have over 50 different hints and even my wife can remember all of them easily )</tokentext>
<sentencetext>Best way to remember password is a just us a Hint and keep it in plain text.
The best place to store the hints for you logon ID and Password is on the Cloud.
The cloud is perfect location because you never need to sync and its accessible on Any computer or smart phone.
Also, since I log into my accounts generally by clicking the URL on my bookmarks, I keep all my account passwords are stored in the Title of the URL on my google bookmarks (my bookmarks are stored on the google website so only I can get into them but I can still access them any computer or cell phone, with no syncing required).
Example: The title of the bookmark to my Amazon account would show: Amazon.com - ID\_Hint  Password\_Hint.
For my hint I would use a very cryptic combination of Letters, Numbers, and Symbols.
Say my ID for this account is  Syphony123456!
then my ID hint would be S16!
which tells me to type my favorite word (since I like music) using a capital letter with number range 1 to 6 followed by !
Most of my hints are a bit more complex but it works.
I've asked people to figure out my hints and they can't, unless I explain it to them then it's simple.
I have over 50 different hints and even my wife can remember all of them easily)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055892</id>
	<title>Re:PasswordSafe</title>
	<author>atomic-penguin</author>
	<datestamp>1257871500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've convinced everyone in our Systems Admin team (there is about 7 of us) to use password safe.  We have one group safe with approximately 100 to 200 passwords, out on a CIFS share.  There are front-ends for password safe that run on both Linux and Windows, so neither the Linux or Windows administrators are left out.  Most of us keep a separate personal password safe.</p><p>I've used PGP encrypted spreadsheets in the past.  That becomes unmanageable as you add more people to a group safe.  If you have to add a half a dozen, or more, PGP recipients then it becomes a huge problem.  Plus you have to check the last time stamp to make sure you're not overwriting another person's changes.</p><p>Of the password safe front-ends which I have used.  Each front-end is pretty good about locking the file in read-only mode anytime a second person opens the file.  We had a bad experience with a bug in an older version of the MyPasswordSafe front-end.  The bug would cause a crash upon saving the file on AMD64 architectures, corrupting the password safe.  This bug had something to do with address space layout randomization, if I'm not mistaken.  Even though that bug was present, the front-end would save a backup of the safe in the event of a crash.  So even if your password safe was corrupted, there was always a backup copy present.  This bug has since been patched.</p><p>Overall, it has been a handy program for all of us.  The front-end programs make it a much easier format to use than PGP encrypting a file for multiple recipients.  Although, you could accomplish the same purpose by using one recipient key for which the entire group shared the master pass phrase.  I still wouldn't go back to our old way of sharing group passwords.  I guess I must be spoiled by the password safe format, its versatility, and the ease of use of the various front-end programs.</p></htmltext>
<tokenext>I 've convinced everyone in our Systems Admin team ( there is about 7 of us ) to use password safe .
We have one group safe with approximately 100 to 200 passwords , out on a CIFS share .
There are front-ends for password safe that run on both Linux and Windows , so neither the Linux or Windows administrators are left out .
Most of us keep a separate personal password safe.I 've used PGP encrypted spreadsheets in the past .
That becomes unmanageable as you add more people to a group safe .
If you have to add a half a dozen , or more , PGP recipients then it becomes a huge problem .
Plus you have to check the last time stamp to make sure you 're not overwriting another person 's changes.Of the password safe front-ends which I have used .
Each front-end is pretty good about locking the file in read-only mode anytime a second person opens the file .
We had a bad experience with a bug in an older version of the MyPasswordSafe front-end .
The bug would cause a crash upon saving the file on AMD64 architectures , corrupting the password safe .
This bug had something to do with address space layout randomization , if I 'm not mistaken .
Even though that bug was present , the front-end would save a backup of the safe in the event of a crash .
So even if your password safe was corrupted , there was always a backup copy present .
This bug has since been patched.Overall , it has been a handy program for all of us .
The front-end programs make it a much easier format to use than PGP encrypting a file for multiple recipients .
Although , you could accomplish the same purpose by using one recipient key for which the entire group shared the master pass phrase .
I still would n't go back to our old way of sharing group passwords .
I guess I must be spoiled by the password safe format , its versatility , and the ease of use of the various front-end programs .</tokentext>
<sentencetext>I've convinced everyone in our Systems Admin team (there is about 7 of us) to use password safe.
We have one group safe with approximately 100 to 200 passwords, out on a CIFS share.
There are front-ends for password safe that run on both Linux and Windows, so neither the Linux or Windows administrators are left out.
Most of us keep a separate personal password safe.I've used PGP encrypted spreadsheets in the past.
That becomes unmanageable as you add more people to a group safe.
If you have to add a half a dozen, or more, PGP recipients then it becomes a huge problem.
Plus you have to check the last time stamp to make sure you're not overwriting another person's changes.Of the password safe front-ends which I have used.
Each front-end is pretty good about locking the file in read-only mode anytime a second person opens the file.
We had a bad experience with a bug in an older version of the MyPasswordSafe front-end.
The bug would cause a crash upon saving the file on AMD64 architectures, corrupting the password safe.
This bug had something to do with address space layout randomization, if I'm not mistaken.
Even though that bug was present, the front-end would save a backup of the safe in the event of a crash.
So even if your password safe was corrupted, there was always a backup copy present.
This bug has since been patched.Overall, it has been a handy program for all of us.
The front-end programs make it a much easier format to use than PGP encrypting a file for multiple recipients.
Although, you could accomplish the same purpose by using one recipient key for which the entire group shared the master pass phrase.
I still wouldn't go back to our old way of sharing group passwords.
I guess I must be spoiled by the password safe format, its versatility, and the ease of use of the various front-end programs.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054926</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055518</id>
	<title>Re:Simple</title>
	<author>stms</author>
	<datestamp>1257868980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>that's the same as my pin #.</htmltext>
<tokenext>that 's the same as my pin # .</tokentext>
<sentencetext>that's the same as my pin #.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055004</id>
	<title>Variations On A Strong Password</title>
	<author>bennigoetz</author>
	<datestamp>1257865980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I am no security expert, but for what it's worth, I use a pretty strong base password, which is a couple characters in the middle which vary based on the name of the account. The base password is multiple permutations of some very personal information. So even if forgot my passwords, I could probably figure them out eventually.</p></htmltext>
<tokenext>I am no security expert , but for what it 's worth , I use a pretty strong base password , which is a couple characters in the middle which vary based on the name of the account .
The base password is multiple permutations of some very personal information .
So even if forgot my passwords , I could probably figure them out eventually .</tokentext>
<sentencetext>I am no security expert, but for what it's worth, I use a pretty strong base password, which is a couple characters in the middle which vary based on the name of the account.
The base password is multiple permutations of some very personal information.
So even if forgot my passwords, I could probably figure them out eventually.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059000</id>
	<title>The Best Tool is..</title>
	<author>awest5</author>
	<datestamp>1257084480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The best tool for remembering passwords I thought would be obvious: your own memory. This is an article about the second best tool for remembering passwords.

Unless of course folks don't trust that there aren't mind readers out there lurking in the shadows, waiting for you to think of your password. Of course there is software you can learn to encrypt the passwords in your mind...</htmltext>
<tokenext>The best tool for remembering passwords I thought would be obvious : your own memory .
This is an article about the second best tool for remembering passwords .
Unless of course folks do n't trust that there are n't mind readers out there lurking in the shadows , waiting for you to think of your password .
Of course there is software you can learn to encrypt the passwords in your mind.. .</tokentext>
<sentencetext>The best tool for remembering passwords I thought would be obvious: your own memory.
This is an article about the second best tool for remembering passwords.
Unless of course folks don't trust that there aren't mind readers out there lurking in the shadows, waiting for you to think of your password.
Of course there is software you can learn to encrypt the passwords in your mind...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059272</id>
	<title>Keepass</title>
	<author>thedaego</author>
	<datestamp>1257086460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I also use KeePass. If you're feeling adventurous check out <a href="http://passpack.com./" title="passpack.com." rel="nofollow">http://passpack.com./</a> [passpack.com.] passpack is good for passwords you might need when you just don't have access to a keepass program but do have access to a browser and internet connection.</htmltext>
<tokenext>I also use KeePass .
If you 're feeling adventurous check out http : //passpack.com./ [ passpack.com .
] passpack is good for passwords you might need when you just do n't have access to a keepass program but do have access to a browser and internet connection .</tokentext>
<sentencetext>I also use KeePass.
If you're feeling adventurous check out http://passpack.com./ [passpack.com.
] passpack is good for passwords you might need when you just don't have access to a keepass program but do have access to a browser and internet connection.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059222</id>
	<title>Password suggestion</title>
	<author>Anonymous</author>
	<datestamp>1257086100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I recently had similar thoughts. The solution that was recommended to me was KeePass. There are windows, OSX, and linux versions. I use DropBox to store the password database. I was also able to install dropbox on windows, OSX, and linux (ubuntu). This has proven itself to be very convenient. Note: The 2.x series of KeePass doesnt run on OSX or linux yet. Use the 1.x series. The 1.x series can't read the 2.x password database files. There is also 'standalone' versions for windows. I have been using it for about a month, and  have had zero problems with it.</p></htmltext>
<tokenext>I recently had similar thoughts .
The solution that was recommended to me was KeePass .
There are windows , OSX , and linux versions .
I use DropBox to store the password database .
I was also able to install dropbox on windows , OSX , and linux ( ubuntu ) .
This has proven itself to be very convenient .
Note : The 2.x series of KeePass doesnt run on OSX or linux yet .
Use the 1.x series .
The 1.x series ca n't read the 2.x password database files .
There is also 'standalone ' versions for windows .
I have been using it for about a month , and have had zero problems with it .</tokentext>
<sentencetext>I recently had similar thoughts.
The solution that was recommended to me was KeePass.
There are windows, OSX, and linux versions.
I use DropBox to store the password database.
I was also able to install dropbox on windows, OSX, and linux (ubuntu).
This has proven itself to be very convenient.
Note: The 2.x series of KeePass doesnt run on OSX or linux yet.
Use the 1.x series.
The 1.x series can't read the 2.x password database files.
There is also 'standalone' versions for windows.
I have been using it for about a month, and  have had zero problems with it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065690</id>
	<title>Gpasman, w. the pw safe in an encfs crypto'd dir.</title>
	<author>turbobug</author>
	<datestamp>1257070320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Mmmph - I have a couple hundred to keep track of - I use gpasman, and keep the<nobr> <wbr></nobr>.gpasman file in an encfs encrypted directory (symlinked back to<nobr> <wbr></nobr>.gpasman in my home directory).

Seems reasonably secure.</htmltext>
<tokenext>Mmmph - I have a couple hundred to keep track of - I use gpasman , and keep the .gpasman file in an encfs encrypted directory ( symlinked back to .gpasman in my home directory ) .
Seems reasonably secure .</tokentext>
<sentencetext>Mmmph - I have a couple hundred to keep track of - I use gpasman, and keep the .gpasman file in an encfs encrypted directory (symlinked back to .gpasman in my home directory).
Seems reasonably secure.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055748</id>
	<title>Site Specific &amp; standard stuff</title>
	<author>boogahboogah</author>
	<datestamp>1257870600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Passwords I use are different for each site. Something site related, then a standard piece with Upper/lower/special characters, a non-dictionary combo. I checked with a couple of password crackers until I came up with a pretty tough combo to crack. Good enough for me, they're never written down or saved inside a machine. I know the tinfoil hat crowd might take issue but I feel they're pretty secure &amp; they won't be found anywhere except in my brain. I only have to remember the combo &amp; the rule per site.</p></htmltext>
<tokenext>Passwords I use are different for each site .
Something site related , then a standard piece with Upper/lower/special characters , a non-dictionary combo .
I checked with a couple of password crackers until I came up with a pretty tough combo to crack .
Good enough for me , they 're never written down or saved inside a machine .
I know the tinfoil hat crowd might take issue but I feel they 're pretty secure &amp; they wo n't be found anywhere except in my brain .
I only have to remember the combo &amp; the rule per site .</tokentext>
<sentencetext>Passwords I use are different for each site.
Something site related, then a standard piece with Upper/lower/special characters, a non-dictionary combo.
I checked with a couple of password crackers until I came up with a pretty tough combo to crack.
Good enough for me, they're never written down or saved inside a machine.
I know the tinfoil hat crowd might take issue but I feel they're pretty secure &amp; they won't be found anywhere except in my brain.
I only have to remember the combo &amp; the rule per site.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055094</id>
	<title>Favorite password holder</title>
	<author>UncleAndy</author>
	<datestamp>1257866520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I like ewallet by Iliumsoft. Much more than passwords, basically a little encrypted database app. syncs to iphone, windows mobile, blackberry etc...  I use it on a U3 drive for portability.

And hallelujah it works under parallels on my macs too!</htmltext>
<tokenext>I like ewallet by Iliumsoft .
Much more than passwords , basically a little encrypted database app .
syncs to iphone , windows mobile , blackberry etc... I use it on a U3 drive for portability .
And hallelujah it works under parallels on my macs too !</tokentext>
<sentencetext>I like ewallet by Iliumsoft.
Much more than passwords, basically a little encrypted database app.
syncs to iphone, windows mobile, blackberry etc...  I use it on a U3 drive for portability.
And hallelujah it works under parallels on my macs too!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054576</id>
	<title>MyPasswordSafe</title>
	<author>Anonymous</author>
	<datestamp>1257863940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>on Linux, aka PasswordSafe on Windows (I think). Bruce Schneier first did the Windows version, and it's all open source, so it's should be safe and easy.</p></htmltext>
<tokenext>on Linux , aka PasswordSafe on Windows ( I think ) .
Bruce Schneier first did the Windows version , and it 's all open source , so it 's should be safe and easy .</tokentext>
<sentencetext>on Linux, aka PasswordSafe on Windows (I think).
Bruce Schneier first did the Windows version, and it's all open source, so it's should be safe and easy.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057746</id>
	<title>Re:Prepended or Appended Passphrase</title>
	<author>PMBjornerud</author>
	<datestamp>1257070380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I agree with the common + site-specific approach.</p><p>3 standard prefixes (short for junk sites, long for important stuff)</p><p>Site-specific suffixes. slashdot could be "Slash", "SD", "Nerdy", "Slack" or anything else. This will stick in memory and can be written down as long as you keep the prefix in a different place.</p><p>This will throw any virus off the trail, though I assume you would still be vulnerable for a professional attack directed at you as an individual.</p><p>Convenience: Memorizing the 3 strong prefixes allows me to use different passwords everywhere and easily remember 90\% without having to look them up.</p></htmltext>
<tokenext>I agree with the common + site-specific approach.3 standard prefixes ( short for junk sites , long for important stuff ) Site-specific suffixes .
slashdot could be " Slash " , " SD " , " Nerdy " , " Slack " or anything else .
This will stick in memory and can be written down as long as you keep the prefix in a different place.This will throw any virus off the trail , though I assume you would still be vulnerable for a professional attack directed at you as an individual.Convenience : Memorizing the 3 strong prefixes allows me to use different passwords everywhere and easily remember 90 \ % without having to look them up .</tokentext>
<sentencetext>I agree with the common + site-specific approach.3 standard prefixes (short for junk sites, long for important stuff)Site-specific suffixes.
slashdot could be "Slash", "SD", "Nerdy", "Slack" or anything else.
This will stick in memory and can be written down as long as you keep the prefix in a different place.This will throw any virus off the trail, though I assume you would still be vulnerable for a professional attack directed at you as an individual.Convenience: Memorizing the 3 strong prefixes allows me to use different passwords everywhere and easily remember 90\% without having to look them up.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058104</id>
	<title>Password keeper</title>
	<author>StarterHat</author>
	<datestamp>1257074760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use the password keeper application on my blackberry. It allows you to create entries for each of the sites, for which you want
to store the password. You can store the website name,URL, username and password. Access to the application is
password protected. So you have to remember only one password.</htmltext>
<tokenext>I use the password keeper application on my blackberry .
It allows you to create entries for each of the sites , for which you want to store the password .
You can store the website name,URL , username and password .
Access to the application is password protected .
So you have to remember only one password .</tokentext>
<sentencetext>I use the password keeper application on my blackberry.
It allows you to create entries for each of the sites, for which you want
to store the password.
You can store the website name,URL, username and password.
Access to the application is
password protected.
So you have to remember only one password.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30068824</id>
	<title>Re:Use the master password feature and stop worryi</title>
	<author>brucemcdon</author>
	<datestamp>1257090540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>It doesn't work that way.  The Firefox "Master Password" just protects the vault of saved passwords.  The saved passwords still appear automatically (without entering a master pw) on any site where you have OK'd the saving of a pw.</htmltext>
<tokenext>It does n't work that way .
The Firefox " Master Password " just protects the vault of saved passwords .
The saved passwords still appear automatically ( without entering a master pw ) on any site where you have OK 'd the saving of a pw .</tokentext>
<sentencetext>It doesn't work that way.
The Firefox "Master Password" just protects the vault of saved passwords.
The saved passwords still appear automatically (without entering a master pw) on any site where you have OK'd the saving of a pw.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30081718</id>
	<title>Use visual memory aids</title>
	<author>CertifiedSpaceCadet</author>
	<datestamp>1258031940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I have this problem where I work.  Last spring they upped the requirement to 12 characters, which must include numbers and special characters.  They do not yet require squirrel noises, but that is certainly next.</p><p>I did a study of memory aids and came up with a system that has worked fairly well for me.</p><p>Here are the tricks:</p><p>1. I remember pictures but not words.  I can remember the first three letters of the name of many  animals that I can picture in my mind.<br>2. Silly stories are much easier to remember than reasonable ones, so string animal pictures and action verbs together into a foolish story.<br>3. The special characters can be used to make simple picture or represent action verbs:  ^ jump over, and || wall becomes ^|| jumped over the wall.<br>4. I know a few strong visual nouns that come with numbers attached:  ME109, P38, 56Chev, V8, 03Flyer, 707, 747.</p><p>Putting this all together you get:</p><p>The elephant jumped over the wall and landed on the flea.  The elephant had four legs; the wall had no legs, and the flea had six legs.   Ele^||Fle+406</p><p>The Frog in his ME109 shot the shield of the Walrus:  FroME109()Wal</p><p>It is also easy to leave yourself an effective hint:  Kermit in his WWII fighter did what?</p><p>You can also progress the story a little every time you need a new password:  Then the Whale in his P38 caught the Frog hiding behind the wall with his six shooter:  WhaP38||Fog6</p><p>Of course, if too many people start using this scheme it will not remain secure very long.</p></htmltext>
<tokenext>I have this problem where I work .
Last spring they upped the requirement to 12 characters , which must include numbers and special characters .
They do not yet require squirrel noises , but that is certainly next.I did a study of memory aids and came up with a system that has worked fairly well for me.Here are the tricks : 1 .
I remember pictures but not words .
I can remember the first three letters of the name of many animals that I can picture in my mind.2 .
Silly stories are much easier to remember than reasonable ones , so string animal pictures and action verbs together into a foolish story.3 .
The special characters can be used to make simple picture or represent action verbs : ^ jump over , and | | wall becomes ^ | | jumped over the wall.4 .
I know a few strong visual nouns that come with numbers attached : ME109 , P38 , 56Chev , V8 , 03Flyer , 707 , 747.Putting this all together you get : The elephant jumped over the wall and landed on the flea .
The elephant had four legs ; the wall had no legs , and the flea had six legs .
Ele ^ | | Fle + 406The Frog in his ME109 shot the shield of the Walrus : FroME109 ( ) WalIt is also easy to leave yourself an effective hint : Kermit in his WWII fighter did what ? You can also progress the story a little every time you need a new password : Then the Whale in his P38 caught the Frog hiding behind the wall with his six shooter : WhaP38 | | Fog6Of course , if too many people start using this scheme it will not remain secure very long .</tokentext>
<sentencetext>I have this problem where I work.
Last spring they upped the requirement to 12 characters, which must include numbers and special characters.
They do not yet require squirrel noises, but that is certainly next.I did a study of memory aids and came up with a system that has worked fairly well for me.Here are the tricks:1.
I remember pictures but not words.
I can remember the first three letters of the name of many  animals that I can picture in my mind.2.
Silly stories are much easier to remember than reasonable ones, so string animal pictures and action verbs together into a foolish story.3.
The special characters can be used to make simple picture or represent action verbs:  ^ jump over, and || wall becomes ^|| jumped over the wall.4.
I know a few strong visual nouns that come with numbers attached:  ME109, P38, 56Chev, V8, 03Flyer, 707, 747.Putting this all together you get:The elephant jumped over the wall and landed on the flea.
The elephant had four legs; the wall had no legs, and the flea had six legs.
Ele^||Fle+406The Frog in his ME109 shot the shield of the Walrus:  FroME109()WalIt is also easy to leave yourself an effective hint:  Kermit in his WWII fighter did what?You can also progress the story a little every time you need a new password:  Then the Whale in his P38 caught the Frog hiding behind the wall with his six shooter:  WhaP38||Fog6Of course, if too many people start using this scheme it will not remain secure very long.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057572</id>
	<title>ThinkGeek has</title>
	<author>Anonymous</author>
	<datestamp>1257068220000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>... something that looks interesting</p><p>http://www.thinkgeek.com/gadgets/security/91a2/</p><p>Rather, they have a page that says the interesting thing is "Out of stock".</p><p>Still sounds fun:  "50 logins<nobr> <wbr></nobr>... 14 characters<nobr> <wbr></nobr>... 5 buttons<nobr> <wbr></nobr>... activated by entering a unique button sequence that is user-defined<nobr> <wbr></nobr>... including a self-destruct feature"</p></htmltext>
<tokenext>... something that looks interestinghttp : //www.thinkgeek.com/gadgets/security/91a2/Rather , they have a page that says the interesting thing is " Out of stock " .Still sounds fun : " 50 logins ... 14 characters ... 5 buttons ... activated by entering a unique button sequence that is user-defined ... including a self-destruct feature "</tokentext>
<sentencetext>... something that looks interestinghttp://www.thinkgeek.com/gadgets/security/91a2/Rather, they have a page that says the interesting thing is "Out of stock".Still sounds fun:  "50 logins ... 14 characters ... 5 buttons ... activated by entering a unique button sequence that is user-defined ... including a self-destruct feature"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060254</id>
	<title>IronKey</title>
	<author>skrimp</author>
	<datestamp>1257091140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I'm currently using an IronKey with it's built in password manager.  It's a USB key with an encryption chip built in with the memory chip, epoxied together and encased in stainless steel.</htmltext>
<tokenext>I 'm currently using an IronKey with it 's built in password manager .
It 's a USB key with an encryption chip built in with the memory chip , epoxied together and encased in stainless steel .</tokentext>
<sentencetext>I'm currently using an IronKey with it's built in password manager.
It's a USB key with an encryption chip built in with the memory chip, epoxied together and encased in stainless steel.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065816</id>
	<title>Dropbox + KeePass</title>
	<author>cavemanf16</author>
	<datestamp>1257070980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Dropbox is a great "access anywhere" secure solution across all major OS platforms, and using KeePass is a great software (as many have already mentioned) for managing all the different passwords you have. Upload KeePass - the executable and the database - to Dropbox, keep your master password verification file that KeePass creates for you on the computers you use and a USB key drive, and you will be very safe and secure, but unhindered by being tied to a particular OS or physical media. When you use dozens of different password-only websites, multiple network logins at work, and your own home computer password apps, it becomes imperative to manage it all in some sane way. The only way to do this for me before was a USB key + TrueCrypt + KeePass, but with Dropbox you eliminate the physical media to be lost accidentally. (And I thought a while back that I HAD lost my USB key, and I literally started freaking out before finding it on my car floor. Switched to Dropbox later that night, and no more freak-out sessions for me.)</htmltext>
<tokenext>Dropbox is a great " access anywhere " secure solution across all major OS platforms , and using KeePass is a great software ( as many have already mentioned ) for managing all the different passwords you have .
Upload KeePass - the executable and the database - to Dropbox , keep your master password verification file that KeePass creates for you on the computers you use and a USB key drive , and you will be very safe and secure , but unhindered by being tied to a particular OS or physical media .
When you use dozens of different password-only websites , multiple network logins at work , and your own home computer password apps , it becomes imperative to manage it all in some sane way .
The only way to do this for me before was a USB key + TrueCrypt + KeePass , but with Dropbox you eliminate the physical media to be lost accidentally .
( And I thought a while back that I HAD lost my USB key , and I literally started freaking out before finding it on my car floor .
Switched to Dropbox later that night , and no more freak-out sessions for me .
)</tokentext>
<sentencetext>Dropbox is a great "access anywhere" secure solution across all major OS platforms, and using KeePass is a great software (as many have already mentioned) for managing all the different passwords you have.
Upload KeePass - the executable and the database - to Dropbox, keep your master password verification file that KeePass creates for you on the computers you use and a USB key drive, and you will be very safe and secure, but unhindered by being tied to a particular OS or physical media.
When you use dozens of different password-only websites, multiple network logins at work, and your own home computer password apps, it becomes imperative to manage it all in some sane way.
The only way to do this for me before was a USB key + TrueCrypt + KeePass, but with Dropbox you eliminate the physical media to be lost accidentally.
(And I thought a while back that I HAD lost my USB key, and I literally started freaking out before finding it on my car floor.
Switched to Dropbox later that night, and no more freak-out sessions for me.
)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055292</id>
	<title>Re:Simple</title>
	<author>Anonymous</author>
	<datestamp>1257867540000</datestamp>
	<modclass>Troll</modclass>
	<modscore>0</modscore>
	<htmltext><b>PLEASE</b> For the love of God, either provide a "Burned Out old Meme" moderation or an automatic black ice backtrace for such worn out jokes. Please.</htmltext>
<tokenext>PLEASE For the love of God , either provide a " Burned Out old Meme " moderation or an automatic black ice backtrace for such worn out jokes .
Please .</tokentext>
<sentencetext>PLEASE For the love of God, either provide a "Burned Out old Meme" moderation or an automatic black ice backtrace for such worn out jokes.
Please.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057508</id>
	<title>Keepass and KeepassX are nice for that</title>
	<author>freaker\_TuC</author>
	<datestamp>1257067440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Check out <a href="http://www.keepass.info/" title="keepass.info">Keepass</a> [keepass.info] and <a href="http://www.keepassx.org/" title="keepassx.org">KeepassX</a> [keepassx.org] ; both open source password managers.</p><p>Remember one master password, link it with an external password file and no-one will be possible to view your gems<nobr> <wbr></nobr>.....</p><p>You can even put your pincodes, cards and other sensitive stuff in it.</p></htmltext>
<tokenext>Check out Keepass [ keepass.info ] and KeepassX [ keepassx.org ] ; both open source password managers.Remember one master password , link it with an external password file and no-one will be possible to view your gems .....You can even put your pincodes , cards and other sensitive stuff in it .</tokentext>
<sentencetext>Check out Keepass [keepass.info] and KeepassX [keepassx.org] ; both open source password managers.Remember one master password, link it with an external password file and no-one will be possible to view your gems .....You can even put your pincodes, cards and other sensitive stuff in it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058908</id>
	<title>Re:Easiest one is...</title>
	<author>margam\_rhino</author>
	<datestamp>1257083460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have a UK keyboard, you insensitive clod! My @ key resides above my right shift key.</htmltext>
<tokenext>I have a UK keyboard , you insensitive clod !
My @ key resides above my right shift key .</tokentext>
<sentencetext>I have a UK keyboard, you insensitive clod!
My @ key resides above my right shift key.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054548</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056978</id>
	<title>Re:Truecrypt</title>
	<author>cgenman</author>
	<datestamp>1257882000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Personally, I use a <a href="http://keepass.info/" title="keepass.info">KeePass</a> [keepass.info] database which is synced between multiple computers online through <a href="https://www.dropbox.com/" title="dropbox.com">DropBox</a> [dropbox.com].  As long as you're accessing from computers that you own (win/linux/OSX) or online, you should be fine.</p><p>There is also an <a href="http://ikeepass.de/" title="ikeepass.de">iphone keepass</a> [ikeepass.de] viewer available for online files, including through Drop Box (for the old 1.x format).</p></htmltext>
<tokenext>Personally , I use a KeePass [ keepass.info ] database which is synced between multiple computers online through DropBox [ dropbox.com ] .
As long as you 're accessing from computers that you own ( win/linux/OSX ) or online , you should be fine.There is also an iphone keepass [ ikeepass.de ] viewer available for online files , including through Drop Box ( for the old 1.x format ) .</tokentext>
<sentencetext>Personally, I use a KeePass [keepass.info] database which is synced between multiple computers online through DropBox [dropbox.com].
As long as you're accessing from computers that you own (win/linux/OSX) or online, you should be fine.There is also an iphone keepass [ikeepass.de] viewer available for online files, including through Drop Box (for the old 1.x format).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055534</id>
	<title>1Password</title>
	<author>WalletBoy</author>
	<datestamp>1257869160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use <a href="http://agilewebsolutions.com/products/1Password" title="agilewebsolutions.com" rel="nofollow">1Password</a> [agilewebsolutions.com] on the Mac and iPhone which works very well for me. The desktop program comes with plug-ins for several web browsers and your password data can be wirelessly sync'd to your iPhone in case you need access to your data on the go.</htmltext>
<tokenext>I use 1Password [ agilewebsolutions.com ] on the Mac and iPhone which works very well for me .
The desktop program comes with plug-ins for several web browsers and your password data can be wirelessly sync 'd to your iPhone in case you need access to your data on the go .</tokentext>
<sentencetext>I use 1Password [agilewebsolutions.com] on the Mac and iPhone which works very well for me.
The desktop program comes with plug-ins for several web browsers and your password data can be wirelessly sync'd to your iPhone in case you need access to your data on the go.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055020</id>
	<title>Use a "Rootword" System</title>
	<author>DerKlempner</author>
	<datestamp>1257866100000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>I keep track of all my passwords using a "rootword" system I devised.  I started off simply, and have made the system more complex as time passes.<br> <br>

As an example, all my passwords are based off a single, easily-remembered word.  Then I complicate the rootword -- i.e., by replacing characters with symbols or numbers so that even in the unlikely chance anyone ever does find out my rootword, they don't know which iteration of characters make up the string of said word.  If I choose "banana", then my rootword may end up being "b@Nan4" or "BAn@n@" or "b4n4n@" etc.<br> <br>

Next, I simply add extra characters as identifiers to the rootword depending on the services or sites for which it is used.  It may have something to do with the site or service name, the person that introduced me to it, or something completely random that reminds me of it.  Thus, my "b@Nan4" may end up as "g00b@Nan4" for a Gmail account.<br> <br>

You'd be surprised at how simple it is to remember a couple hundred different passwords using a system like this.</htmltext>
<tokenext>I keep track of all my passwords using a " rootword " system I devised .
I started off simply , and have made the system more complex as time passes .
As an example , all my passwords are based off a single , easily-remembered word .
Then I complicate the rootword -- i.e. , by replacing characters with symbols or numbers so that even in the unlikely chance anyone ever does find out my rootword , they do n't know which iteration of characters make up the string of said word .
If I choose " banana " , then my rootword may end up being " b @ Nan4 " or " BAn @ n @ " or " b4n4n @ " etc .
Next , I simply add extra characters as identifiers to the rootword depending on the services or sites for which it is used .
It may have something to do with the site or service name , the person that introduced me to it , or something completely random that reminds me of it .
Thus , my " b @ Nan4 " may end up as " g00b @ Nan4 " for a Gmail account .
You 'd be surprised at how simple it is to remember a couple hundred different passwords using a system like this .</tokentext>
<sentencetext>I keep track of all my passwords using a "rootword" system I devised.
I started off simply, and have made the system more complex as time passes.
As an example, all my passwords are based off a single, easily-remembered word.
Then I complicate the rootword -- i.e., by replacing characters with symbols or numbers so that even in the unlikely chance anyone ever does find out my rootword, they don't know which iteration of characters make up the string of said word.
If I choose "banana", then my rootword may end up being "b@Nan4" or "BAn@n@" or "b4n4n@" etc.
Next, I simply add extra characters as identifiers to the rootword depending on the services or sites for which it is used.
It may have something to do with the site or service name, the person that introduced me to it, or something completely random that reminds me of it.
Thus, my "b@Nan4" may end up as "g00b@Nan4" for a Gmail account.
You'd be surprised at how simple it is to remember a couple hundred different passwords using a system like this.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055162</id>
	<title>Password safe</title>
	<author>macklin01</author>
	<datestamp>1257866820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Try <a href="http://passwordsafe.sourceforge.net/" title="sourceforge.net">password safe</a> [sourceforge.net]. Choose one strong password to encrypt (via twofish) the entire data base, then choose strong random passwords for everything within. Only one password to store in memory that way.</p><p>It can run on a USB key (no registry entries), making it very portable. You can right-click entries to (1) surf to the selected logon page, (2) auto-fill username and password, and (3) hit submit, making surfing nearly as easy as the built-in firefox password manager, but much more secure. Of course, it has all the standard features, like auto-generating random passwords, database search, categories/subcategories/etc. My wife and I both use it and are pretty satisfied.</p><p>In the <a href="http://passwordsafe.sourceforge.net/relatedprojects.shtml" title="sourceforge.net">related links</a> [sourceforge.net], you can find non-windows implementations, making it very portable.</p><p>I hope this helps; good luck! -- Paul </p></htmltext>
<tokenext>Try password safe [ sourceforge.net ] .
Choose one strong password to encrypt ( via twofish ) the entire data base , then choose strong random passwords for everything within .
Only one password to store in memory that way.It can run on a USB key ( no registry entries ) , making it very portable .
You can right-click entries to ( 1 ) surf to the selected logon page , ( 2 ) auto-fill username and password , and ( 3 ) hit submit , making surfing nearly as easy as the built-in firefox password manager , but much more secure .
Of course , it has all the standard features , like auto-generating random passwords , database search , categories/subcategories/etc .
My wife and I both use it and are pretty satisfied.In the related links [ sourceforge.net ] , you can find non-windows implementations , making it very portable.I hope this helps ; good luck !
-- Paul</tokentext>
<sentencetext>Try password safe [sourceforge.net].
Choose one strong password to encrypt (via twofish) the entire data base, then choose strong random passwords for everything within.
Only one password to store in memory that way.It can run on a USB key (no registry entries), making it very portable.
You can right-click entries to (1) surf to the selected logon page, (2) auto-fill username and password, and (3) hit submit, making surfing nearly as easy as the built-in firefox password manager, but much more secure.
Of course, it has all the standard features, like auto-generating random passwords, database search, categories/subcategories/etc.
My wife and I both use it and are pretty satisfied.In the related links [sourceforge.net], you can find non-windows implementations, making it very portable.I hope this helps; good luck!
-- Paul </sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055378</id>
	<title>Re:Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257868080000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use Password Agent by Moon Software inside a Truecrypt file.  I then synch this using Dropbox to their cloud.</p></htmltext>
<tokenext>I use Password Agent by Moon Software inside a Truecrypt file .
I then synch this using Dropbox to their cloud .</tokentext>
<sentencetext>I use Password Agent by Moon Software inside a Truecrypt file.
I then synch this using Dropbox to their cloud.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30068500</id>
	<title>Re:KeePass - fantastic software.</title>
	<author>ErnieD</author>
	<datestamp>1257087360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've been using KeePass for years, and recently started using the <a href="http://portableapps.com/apps/utilities/keepass\_portable" title="portableapps.com">portable version</a> [portableapps.com] coupled with <a href="https://www.dropbox.com/" title="dropbox.com">DropBox</a> [dropbox.com] - viola, access to my passwords from anywhere, all nice and synchronized up! On my own PCs I have the DropBox client running all the time, and if I'm elsewhere and can't get a remote connection to my home PC, I can temporary download my files from the DropBox website without needing the client.</p></htmltext>
<tokenext>I 've been using KeePass for years , and recently started using the portable version [ portableapps.com ] coupled with DropBox [ dropbox.com ] - viola , access to my passwords from anywhere , all nice and synchronized up !
On my own PCs I have the DropBox client running all the time , and if I 'm elsewhere and ca n't get a remote connection to my home PC , I can temporary download my files from the DropBox website without needing the client .</tokentext>
<sentencetext>I've been using KeePass for years, and recently started using the portable version [portableapps.com] coupled with DropBox [dropbox.com] - viola, access to my passwords from anywhere, all nice and synchronized up!
On my own PCs I have the DropBox client running all the time, and if I'm elsewhere and can't get a remote connection to my home PC, I can temporary download my files from the DropBox website without needing the client.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058788</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>It doesn't come easy</author>
	<datestamp>1257082560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>And then of course, hope they never change the name of the web site...</htmltext>
<tokenext>And then of course , hope they never change the name of the web site.. .</tokentext>
<sentencetext>And then of course, hope they never change the name of the web site...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30068840</id>
	<title>Roboform</title>
	<author>RegTooLate</author>
	<datestamp>1257090720000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>I've enjoyed roboform as it works great (ahem on windows) and has nice encryption.  The random password generator and information form auto filler are tools which I use almost every day.  I was somewhat perturbed that they didn't support linux but then I found that it will install on wine if you open the installer from an IE browser so their is cross platform compatibility.</htmltext>
<tokenext>I 've enjoyed roboform as it works great ( ahem on windows ) and has nice encryption .
The random password generator and information form auto filler are tools which I use almost every day .
I was somewhat perturbed that they did n't support linux but then I found that it will install on wine if you open the installer from an IE browser so their is cross platform compatibility .</tokentext>
<sentencetext>I've enjoyed roboform as it works great (ahem on windows) and has nice encryption.
The random password generator and information form auto filler are tools which I use almost every day.
I was somewhat perturbed that they didn't support linux but then I found that it will install on wine if you open the installer from an IE browser so their is cross platform compatibility.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063908</id>
	<title>multilevel security</title>
	<author>Anonymous</author>
	<datestamp>1257105780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>You need to divide web sites that need passwords into at least 2 categories (high risk/low risk).</p><p>Any account that holds your money (banks, etrade, etc) needs to be in the highest security level.  For these accounts you should never use any laptop ever - use a desktop computer - better yet, buy a $300 netbook with linux on it that you *only* use for bank websites.  Never use this netbook for casual browsing or any other purpose.  Best of all - don't use the web for any of your banking needs.  Also consider using only banks (like Bank of America) that have higher security features such as the one that only lets you login after they send you a random pin to your cell phone (these pins tend to expire within a minute).</p><p>email accounts should have second highest security because these can often be used to get your bank password (click here to have your password sent to your email).</p><p>For your slashdot account, you can be more lax.  Maybe put the password on paper or maybe let your laptop's firefox browser store passwords.</p><p>Many people have lost their entire balance due to keyloggers - money that they never got back (as far as I know only business accounts).</p></htmltext>
<tokenext>You need to divide web sites that need passwords into at least 2 categories ( high risk/low risk ) .Any account that holds your money ( banks , etrade , etc ) needs to be in the highest security level .
For these accounts you should never use any laptop ever - use a desktop computer - better yet , buy a $ 300 netbook with linux on it that you * only * use for bank websites .
Never use this netbook for casual browsing or any other purpose .
Best of all - do n't use the web for any of your banking needs .
Also consider using only banks ( like Bank of America ) that have higher security features such as the one that only lets you login after they send you a random pin to your cell phone ( these pins tend to expire within a minute ) .email accounts should have second highest security because these can often be used to get your bank password ( click here to have your password sent to your email ) .For your slashdot account , you can be more lax .
Maybe put the password on paper or maybe let your laptop 's firefox browser store passwords.Many people have lost their entire balance due to keyloggers - money that they never got back ( as far as I know only business accounts ) .</tokentext>
<sentencetext>You need to divide web sites that need passwords into at least 2 categories (high risk/low risk).Any account that holds your money (banks, etrade, etc) needs to be in the highest security level.
For these accounts you should never use any laptop ever - use a desktop computer - better yet, buy a $300 netbook with linux on it that you *only* use for bank websites.
Never use this netbook for casual browsing or any other purpose.
Best of all - don't use the web for any of your banking needs.
Also consider using only banks (like Bank of America) that have higher security features such as the one that only lets you login after they send you a random pin to your cell phone (these pins tend to expire within a minute).email accounts should have second highest security because these can often be used to get your bank password (click here to have your password sent to your email).For your slashdot account, you can be more lax.
Maybe put the password on paper or maybe let your laptop's firefox browser store passwords.Many people have lost their entire balance due to keyloggers - money that they never got back (as far as I know only business accounts).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059880</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>highspl</author>
	<datestamp>1257089400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>What about when it has to be changed every 90 days?  Or when they expire on different intervals?  You'll end up with lots of passwords again.</htmltext>
<tokenext>What about when it has to be changed every 90 days ?
Or when they expire on different intervals ?
You 'll end up with lots of passwords again .</tokentext>
<sentencetext>What about when it has to be changed every 90 days?
Or when they expire on different intervals?
You'll end up with lots of passwords again.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057882</id>
	<title>best tool to store passwords</title>
	<author>Anonymous</author>
	<datestamp>1257072480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>my tool is called "brain". I wouldn't store a password on a computer system.</p></htmltext>
<tokenext>my tool is called " brain " .
I would n't store a password on a computer system .</tokentext>
<sentencetext>my tool is called "brain".
I wouldn't store a password on a computer system.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056236</id>
	<title>Re:Try Keepassx</title>
	<author>hedwards</author>
	<datestamp>1257874680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The only thing to really remember is that you probably want to disable autotype, as it seems to still have issues. When on Windows I'll use it with keyscrambler to reduce the likelihood of the characters being sniffed out.</htmltext>
<tokenext>The only thing to really remember is that you probably want to disable autotype , as it seems to still have issues .
When on Windows I 'll use it with keyscrambler to reduce the likelihood of the characters being sniffed out .</tokentext>
<sentencetext>The only thing to really remember is that you probably want to disable autotype, as it seems to still have issues.
When on Windows I'll use it with keyscrambler to reduce the likelihood of the characters being sniffed out.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054542</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056096</id>
	<title>chmod + plaintext + obscurity</title>
	<author>brundlefly</author>
	<datestamp>1257873180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>On some server you control, in your "projects" directory (or however you organize your hacker life), do an svn checkout of a small branch of some codebase you care nothing about.  Add somewhere a README which is chown root, chmod 600.  Maintain your stuff there.</p><p>With 99.999\% probability your machine isn't going to be stolen by a person who can find the interest to read this, or recursively seek for recently modified files blah blah, much less boot into single-user mode to read it.  If you need it remotely, you use ssh of course.</p><p>(And if you're on Windows, don't store your passwords there at all.  Not trolling -- I have several Windows clients I use daily -- but they're just not the same beast.)</p></htmltext>
<tokenext>On some server you control , in your " projects " directory ( or however you organize your hacker life ) , do an svn checkout of a small branch of some codebase you care nothing about .
Add somewhere a README which is chown root , chmod 600 .
Maintain your stuff there.With 99.999 \ % probability your machine is n't going to be stolen by a person who can find the interest to read this , or recursively seek for recently modified files blah blah , much less boot into single-user mode to read it .
If you need it remotely , you use ssh of course .
( And if you 're on Windows , do n't store your passwords there at all .
Not trolling -- I have several Windows clients I use daily -- but they 're just not the same beast .
)</tokentext>
<sentencetext>On some server you control, in your "projects" directory (or however you organize your hacker life), do an svn checkout of a small branch of some codebase you care nothing about.
Add somewhere a README which is chown root, chmod 600.
Maintain your stuff there.With 99.999\% probability your machine isn't going to be stolen by a person who can find the interest to read this, or recursively seek for recently modified files blah blah, much less boot into single-user mode to read it.
If you need it remotely, you use ssh of course.
(And if you're on Windows, don't store your passwords there at all.
Not trolling -- I have several Windows clients I use daily -- but they're just not the same beast.
)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056162</id>
	<title>What platform are you on?</title>
	<author>PhunkySchtuff</author>
	<datestamp>1257873780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If you're on a Mac, there are a couple of good options.</p><p>The first is the built-in Keychain. It can save application and website passwords, certificates, secure notes and it's all AES encrypted. As it's built-in, the support for it is pretty good with most apps and most websites. You have a normal login keychain that's automatically unlocked when you log in and remains unlocked (by default). You can have additional keychains with various levels of security over and above the login one - have them lock after a period of inactivity, have them lock when the screensaver is activated, have a different password to access them from your login keychain etc. The keychain can also be synchronised between different computers that you use, so if you create a login to a website on one, you can access the password you used on another one. As this works really well, I now use different randomly generated strong passwords for every site I need a login for - eg Bapdageshem9, negTuthsuc5 or EyHepGoyft8 ( apg -n 1 -m 10 -x 12 -M NCL -d )</p><p>If you find that the Keychain isn't up to the task there's <a href="http://agilewebsolutions.com/products/1Password" title="agilewebsolutions.com">1Password</a> [agilewebsolutions.com]. which does pretty much everything the built-in keychain does, and more...</p></htmltext>
<tokenext>If you 're on a Mac , there are a couple of good options.The first is the built-in Keychain .
It can save application and website passwords , certificates , secure notes and it 's all AES encrypted .
As it 's built-in , the support for it is pretty good with most apps and most websites .
You have a normal login keychain that 's automatically unlocked when you log in and remains unlocked ( by default ) .
You can have additional keychains with various levels of security over and above the login one - have them lock after a period of inactivity , have them lock when the screensaver is activated , have a different password to access them from your login keychain etc .
The keychain can also be synchronised between different computers that you use , so if you create a login to a website on one , you can access the password you used on another one .
As this works really well , I now use different randomly generated strong passwords for every site I need a login for - eg Bapdageshem9 , negTuthsuc5 or EyHepGoyft8 ( apg -n 1 -m 10 -x 12 -M NCL -d ) If you find that the Keychain is n't up to the task there 's 1Password [ agilewebsolutions.com ] .
which does pretty much everything the built-in keychain does , and more.. .</tokentext>
<sentencetext>If you're on a Mac, there are a couple of good options.The first is the built-in Keychain.
It can save application and website passwords, certificates, secure notes and it's all AES encrypted.
As it's built-in, the support for it is pretty good with most apps and most websites.
You have a normal login keychain that's automatically unlocked when you log in and remains unlocked (by default).
You can have additional keychains with various levels of security over and above the login one - have them lock after a period of inactivity, have them lock when the screensaver is activated, have a different password to access them from your login keychain etc.
The keychain can also be synchronised between different computers that you use, so if you create a login to a website on one, you can access the password you used on another one.
As this works really well, I now use different randomly generated strong passwords for every site I need a login for - eg Bapdageshem9, negTuthsuc5 or EyHepGoyft8 ( apg -n 1 -m 10 -x 12 -M NCL -d )If you find that the Keychain isn't up to the task there's 1Password [agilewebsolutions.com].
which does pretty much everything the built-in keychain does, and more...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056304</id>
	<title>Passwords.txt</title>
	<author>Fotograf</author>
	<datestamp>1257875340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>on my website. It is safe because there is no link to it from any of html files and is always handy. Only access to it is possible over admin.html which is also nowhere linked to, therefor safe.</htmltext>
<tokenext>on my website .
It is safe because there is no link to it from any of html files and is always handy .
Only access to it is possible over admin.html which is also nowhere linked to , therefor safe .</tokentext>
<sentencetext>on my website.
It is safe because there is no link to it from any of html files and is always handy.
Only access to it is possible over admin.html which is also nowhere linked to, therefor safe.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057260</id>
	<title>Password generation scheme</title>
	<author>Sudheer\_BV</author>
	<datestamp>1257107760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Don't write it anywhere. The only safe place to store the passwords is your brain. Make a scheme to generate a strong password using mnemonics. When you look at the screen to type the password, you should be able to determine the correct password. In your password generation scheme make associations between your 'salt' and the system that prompts for password.</htmltext>
<tokenext>Do n't write it anywhere .
The only safe place to store the passwords is your brain .
Make a scheme to generate a strong password using mnemonics .
When you look at the screen to type the password , you should be able to determine the correct password .
In your password generation scheme make associations between your 'salt ' and the system that prompts for password .</tokentext>
<sentencetext>Don't write it anywhere.
The only safe place to store the passwords is your brain.
Make a scheme to generate a strong password using mnemonics.
When you look at the screen to type the password, you should be able to determine the correct password.
In your password generation scheme make associations between your 'salt' and the system that prompts for password.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057456</id>
	<title>Re:Notecard In Wallet For Life</title>
	<author>omni123</author>
	<datestamp>1257066780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The flipside is if the wallet gets stolen and you haven't had a chance to get around to remembering those passwords yet--then you're in trouble.</htmltext>
<tokenext>The flipside is if the wallet gets stolen and you have n't had a chance to get around to remembering those passwords yet--then you 're in trouble .</tokentext>
<sentencetext>The flipside is if the wallet gets stolen and you haven't had a chance to get around to remembering those passwords yet--then you're in trouble.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055140</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057204</id>
	<title>The password formula</title>
	<author>Anonymous</author>
	<datestamp>1257106980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I have a mac with an encrypted keychain (yet another reason to have a mac), but in addition I have developed a formula for remembering passwords. Although this is not my formula, you will get the picture.</p><p>Lets pretend I am trying to remember my password for my Bank of America online banking account for my business.</p><p>First the username. Most sites these days use email address as the username. No sweat there, I just use my business email address<br>anonymous@coward.com</p><p>for the password I look to the url for inspiration<br>I take the first two after the www, in this case "w" and "e" I take onto it some gibberish that I use for all my passwords<br>"spanky123"<br>So the password is now "wespanky123" and onto that I tack on the last letter of the url and a symbol "o" and "\%"<br>thus my password is<br>wespanky123o\%<br>for my wells fargo account</p><p>for boa<br>baspanky123a\%</p><p>for slashdot</p><p>slspanky123t\%<br>
&nbsp; and so on and so forth.</p></htmltext>
<tokenext>I have a mac with an encrypted keychain ( yet another reason to have a mac ) , but in addition I have developed a formula for remembering passwords .
Although this is not my formula , you will get the picture.Lets pretend I am trying to remember my password for my Bank of America online banking account for my business.First the username .
Most sites these days use email address as the username .
No sweat there , I just use my business email addressanonymous @ coward.comfor the password I look to the url for inspirationI take the first two after the www , in this case " w " and " e " I take onto it some gibberish that I use for all my passwords " spanky123 " So the password is now " wespanky123 " and onto that I tack on the last letter of the url and a symbol " o " and " \ % " thus my password iswespanky123o \ % for my wells fargo accountfor boabaspanky123a \ % for slashdotslspanky123t \ %   and so on and so forth .</tokentext>
<sentencetext>I have a mac with an encrypted keychain (yet another reason to have a mac), but in addition I have developed a formula for remembering passwords.
Although this is not my formula, you will get the picture.Lets pretend I am trying to remember my password for my Bank of America online banking account for my business.First the username.
Most sites these days use email address as the username.
No sweat there, I just use my business email addressanonymous@coward.comfor the password I look to the url for inspirationI take the first two after the www, in this case "w" and "e" I take onto it some gibberish that I use for all my passwords"spanky123"So the password is now "wespanky123" and onto that I tack on the last letter of the url and a symbol "o" and "\%"thus my password iswespanky123o\%for my wells fargo accountfor boabaspanky123a\%for slashdotslspanky123t\%
  and so on and so forth.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055012</id>
	<title>keepass + sugarsync</title>
	<author>Anonymous</author>
	<datestamp>1257865980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use Keepass, and use SugarSync to keep it sync'ed between computers.</p><p>This way, it's also available on the web whenever I need it.  The nice thing is Keepass also has a portable apps version so you can use it anywhere.</p></htmltext>
<tokenext>I use Keepass , and use SugarSync to keep it sync'ed between computers.This way , it 's also available on the web whenever I need it .
The nice thing is Keepass also has a portable apps version so you can use it anywhere .</tokentext>
<sentencetext>I use Keepass, and use SugarSync to keep it sync'ed between computers.This way, it's also available on the web whenever I need it.
The nice thing is Keepass also has a portable apps version so you can use it anywhere.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058038</id>
	<title>IT &amp; Computing not sexist. Yeah, sure.</title>
	<author>jotaeleemeese</author>
	<datestamp>1257074160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I'll keep pointing out replies like this until people get it (i.e. maybe never)</p></htmltext>
<tokenext>I 'll keep pointing out replies like this until people get it ( i.e .
maybe never )</tokentext>
<sentencetext>I'll keep pointing out replies like this until people get it (i.e.
maybe never)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054738</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061156</id>
	<title>What I want hasn't been invented yet</title>
	<author>aminorex</author>
	<datestamp>1257094980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>This is not a job for software.  The proper solution is a device that interposes between the keyboard and the host computer, accepts signals from applications to the effect that the current entry is a password, and records the context/password pair, or alternatively accepts a keyboard signal or an application request for a password that most closely corresponds to a given context (application case, with user approval) or provides a (probability-ordered) prompt to select a known password (user case). The device is independent of operating system, portable between computers, and trivial to backup/edit/configure/restore via usb.<br>
&nbsp;</p></htmltext>
<tokenext>This is not a job for software .
The proper solution is a device that interposes between the keyboard and the host computer , accepts signals from applications to the effect that the current entry is a password , and records the context/password pair , or alternatively accepts a keyboard signal or an application request for a password that most closely corresponds to a given context ( application case , with user approval ) or provides a ( probability-ordered ) prompt to select a known password ( user case ) .
The device is independent of operating system , portable between computers , and trivial to backup/edit/configure/restore via usb .
 </tokentext>
<sentencetext>This is not a job for software.
The proper solution is a device that interposes between the keyboard and the host computer, accepts signals from applications to the effect that the current entry is a password, and records the context/password pair, or alternatively accepts a keyboard signal or an application request for a password that most closely corresponds to a given context (application case, with user approval) or provides a (probability-ordered) prompt to select a known password (user case).
The device is independent of operating system, portable between computers, and trivial to backup/edit/configure/restore via usb.
 </sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054766</id>
	<title>Re:Hashapass</title>
	<author>Anonymous</author>
	<datestamp>1257864720000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use such a method, except in my head.  I have a master half-password that I combine with a quick hash of the name of the thing it's for.</p><p>For instance, suppose your master password is "UNIQUE" and you want to use it for Google.</p><p>Further suppose you've settled on the hash of second and last leters---(o,e) in the case of Google---and always split your master into two parts.  Then you could form the password UNIoQUEe for Google.</p><p>For Yahoo, you'd pull out the (a, o) and similarly produce UNIaQUEo</p><p>For Microsoft (i,t) resulting in UNIiQUEt</p><p>etc.</p><p>Then you just have to remember that your password for anything is UNI(something)QUE(something else).</p><p>You can form this hash different ways and more complexly, of course--whatever works for you.</p></htmltext>
<tokenext>I use such a method , except in my head .
I have a master half-password that I combine with a quick hash of the name of the thing it 's for.For instance , suppose your master password is " UNIQUE " and you want to use it for Google.Further suppose you 've settled on the hash of second and last leters--- ( o,e ) in the case of Google---and always split your master into two parts .
Then you could form the password UNIoQUEe for Google.For Yahoo , you 'd pull out the ( a , o ) and similarly produce UNIaQUEoFor Microsoft ( i,t ) resulting in UNIiQUEtetc.Then you just have to remember that your password for anything is UNI ( something ) QUE ( something else ) .You can form this hash different ways and more complexly , of course--whatever works for you .</tokentext>
<sentencetext>I use such a method, except in my head.
I have a master half-password that I combine with a quick hash of the name of the thing it's for.For instance, suppose your master password is "UNIQUE" and you want to use it for Google.Further suppose you've settled on the hash of second and last leters---(o,e) in the case of Google---and always split your master into two parts.
Then you could form the password UNIoQUEe for Google.For Yahoo, you'd pull out the (a, o) and similarly produce UNIaQUEoFor Microsoft (i,t) resulting in UNIiQUEtetc.Then you just have to remember that your password for anything is UNI(something)QUE(something else).You can form this hash different ways and more complexly, of course--whatever works for you.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054526</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062494</id>
	<title>KeePass password safe</title>
	<author>Anonymous</author>
	<datestamp>1257100320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>thumb drive + KeePass Password Safe (http://keepass.info/)</p></htmltext>
<tokenext>thumb drive + KeePass Password Safe ( http : //keepass.info/ )</tokentext>
<sentencetext>thumb drive + KeePass Password Safe (http://keepass.info/)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055614</id>
	<title>Re:Truecrypt</title>
	<author>Hatta</author>
	<datestamp>1257869760000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>Why is it on a USB key?  You're not carrying around your Truecrypt volume and typing your passphrase into strange computers are you?</p></htmltext>
<tokenext>Why is it on a USB key ?
You 're not carrying around your Truecrypt volume and typing your passphrase into strange computers are you ?</tokentext>
<sentencetext>Why is it on a USB key?
You're not carrying around your Truecrypt volume and typing your passphrase into strange computers are you?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055418</id>
	<title>Re:Keepass</title>
	<author>Anonymous</author>
	<datestamp>1257868380000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Keepass works great... I use it on my blackberry, linux, vista, xp, and on a flash drive with portableapps</p></htmltext>
<tokenext>Keepass works great... I use it on my blackberry , linux , vista , xp , and on a flash drive with portableapps</tokentext>
<sentencetext>Keepass works great... I use it on my blackberry, linux, vista, xp, and on a flash drive with portableapps</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058958</id>
	<title>Re:Simple</title>
	<author>Anonymous</author>
	<datestamp>1257083940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I watched that movie recently and already forgot about it. What title was it again?</p></htmltext>
<tokenext>I watched that movie recently and already forgot about it .
What title was it again ?</tokentext>
<sentencetext>I watched that movie recently and already forgot about it.
What title was it again?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055070</id>
	<title>Don't remember your passwords</title>
	<author>Anonymous</author>
	<datestamp>1257866340000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Remember how to generate them. MD5 hashes of the base domain name plus your favorite quote you're sure to remember verbatim.</p></div>
	</htmltext>
<tokenext>Remember how to generate them .
MD5 hashes of the base domain name plus your favorite quote you 're sure to remember verbatim .</tokentext>
<sentencetext>Remember how to generate them.
MD5 hashes of the base domain name plus your favorite quote you're sure to remember verbatim.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054724</id>
	<title>Simple - a spreadsheet</title>
	<author>seifried</author>
	<datestamp>1257864480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>A spread sheet kept securely (encrypted file, not excel/etc. encryption but something like PGP or TrueCrypt). There are specific programs for this but I find a spread sheet works better.</htmltext>
<tokenext>A spread sheet kept securely ( encrypted file , not excel/etc .
encryption but something like PGP or TrueCrypt ) .
There are specific programs for this but I find a spread sheet works better .</tokentext>
<sentencetext>A spread sheet kept securely (encrypted file, not excel/etc.
encryption but something like PGP or TrueCrypt).
There are specific programs for this but I find a spread sheet works better.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060672</id>
	<title>Re:paper in your wallet</title>
	<author>Random5</author>
	<datestamp>1257093000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Simply don't store the ENTIRE password. What I do is make my passwords out of chunks with a unique starting value, then say my password is Conquer9753. I write down in my passwords file name of site/domain/app : C\_\_\_\_\_\_9\_\_\_. The only place the entire chunk exists is in my head and when I type it in.</htmltext>
<tokenext>Simply do n't store the ENTIRE password .
What I do is make my passwords out of chunks with a unique starting value , then say my password is Conquer9753 .
I write down in my passwords file name of site/domain/app : C \ _ \ _ \ _ \ _ \ _ \ _9 \ _ \ _ \ _ .
The only place the entire chunk exists is in my head and when I type it in .</tokentext>
<sentencetext>Simply don't store the ENTIRE password.
What I do is make my passwords out of chunks with a unique starting value, then say my password is Conquer9753.
I write down in my passwords file name of site/domain/app : C\_\_\_\_\_\_9\_\_\_.
The only place the entire chunk exists is in my head and when I type it in.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055944</id>
	<title>Re:The most secure place</title>
	<author>Anonymous</author>
	<datestamp>1257871860000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>&gt;   Here's an old post [slashdot.org] I did here 4 years ago on the subject</p><p>The passwords there were to an "adult site"? Maybe the users don't bother using secure passwords for those sites.</p><p>Or, intentionally do not use secure passwords for those sites...</p></htmltext>
<tokenext>&gt; Here 's an old post [ slashdot.org ] I did here 4 years ago on the subjectThe passwords there were to an " adult site " ?
Maybe the users do n't bother using secure passwords for those sites.Or , intentionally do not use secure passwords for those sites.. .</tokentext>
<sentencetext>&gt;   Here's an old post [slashdot.org] I did here 4 years ago on the subjectThe passwords there were to an "adult site"?
Maybe the users don't bother using secure passwords for those sites.Or, intentionally do not use secure passwords for those sites...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054742</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054944</id>
	<title>Patterns.</title>
	<author>Volund</author>
	<datestamp>1257865680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Come up with a system that somehow deterministically transmutates the name of the site or item you're making a password for into something else. For example, a password for Key Bank might be "K3y\_b@nk-banking\_site" or something like that. Bingo: strong password that's unique to that site, and easy to remember as long as you're consistent. Just don't tell anyone your pattern.<br> <br>

Of course, consistency is difficult when some sites don't allow passwords longer than eight characters, some don't allow special characters, and so on.</htmltext>
<tokenext>Come up with a system that somehow deterministically transmutates the name of the site or item you 're making a password for into something else .
For example , a password for Key Bank might be " K3y \ _b @ nk-banking \ _site " or something like that .
Bingo : strong password that 's unique to that site , and easy to remember as long as you 're consistent .
Just do n't tell anyone your pattern .
Of course , consistency is difficult when some sites do n't allow passwords longer than eight characters , some do n't allow special characters , and so on .</tokentext>
<sentencetext>Come up with a system that somehow deterministically transmutates the name of the site or item you're making a password for into something else.
For example, a password for Key Bank might be "K3y\_b@nk-banking\_site" or something like that.
Bingo: strong password that's unique to that site, and easy to remember as long as you're consistent.
Just don't tell anyone your pattern.
Of course, consistency is difficult when some sites don't allow passwords longer than eight characters, some don't allow special characters, and so on.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055352</id>
	<title>PasswordMaker</title>
	<author>Anonymous</author>
	<datestamp>1257867900000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>http://passwordmaker.org/<br>- remember one password<br>- easy to use firefox plugin<br>- works from anywhere from their website<br>- protects from spoofed websites</p></htmltext>
<tokenext>http : //passwordmaker.org/- remember one password- easy to use firefox plugin- works from anywhere from their website- protects from spoofed websites</tokentext>
<sentencetext>http://passwordmaker.org/- remember one password- easy to use firefox plugin- works from anywhere from their website- protects from spoofed websites</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058326</id>
	<title>SPG</title>
	<author>Anonymous</author>
	<datestamp>1257077400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>http://www.github.com/gera/spg/</p><p>Also:</p><p>http://www.theoldmonk.net/spg/</p></htmltext>
<tokenext>http : //www.github.com/gera/spg/Also : http : //www.theoldmonk.net/spg/</tokentext>
<sentencetext>http://www.github.com/gera/spg/Also:http://www.theoldmonk.net/spg/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058200</id>
	<title>simply encrypt the password file</title>
	<author>idji</author>
	<datestamp>1257075900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>on windows, just right-click on the password file and encrypt it.<br>
        C:\Users\{USER}\AppData\Roaming\Mozilla\Firefox\Profiles\XXXXXX.default\signonsX.txt<br>
Do it once and don't worry about losing your laptop.</htmltext>
<tokenext>on windows , just right-click on the password file and encrypt it .
C : \ Users \ { USER } \ AppData \ Roaming \ Mozilla \ Firefox \ Profiles \ XXXXXX.default \ signonsX.txt Do it once and do n't worry about losing your laptop .</tokentext>
<sentencetext>on windows, just right-click on the password file and encrypt it.
C:\Users\{USER}\AppData\Roaming\Mozilla\Firefox\Profiles\XXXXXX.default\signonsX.txt
Do it once and don't worry about losing your laptop.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057252</id>
	<title>Password Gorilla</title>
	<author>coaxial</author>
	<datestamp>1257107580000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I've tried doing using <a href="http://www.fpx.de/fp/Software/Gorilla/" title="www.fpx.de">Password Gorilla</a> [www.fpx.de] since it runs on all three OS's I might use (Mac, Linux, and Win), and since it's available as a TCL script, I can keep a TCL interpreter on my USB thumbdrive along with the file.</p><p>The biggest problem I have with these things isn't the tool, as much as getting myself to actually use it.  If it's not built into the browser, it's really a pain in the ass to use.  In all honesty, I just keep a bunch of plaintext files containing the username and password pairs for the sites I use.  It's terribly insecure, but it works for my laptop, and really, who wants to know my boingboing login anyway?</p></htmltext>
<tokenext>I 've tried doing using Password Gorilla [ www.fpx.de ] since it runs on all three OS 's I might use ( Mac , Linux , and Win ) , and since it 's available as a TCL script , I can keep a TCL interpreter on my USB thumbdrive along with the file.The biggest problem I have with these things is n't the tool , as much as getting myself to actually use it .
If it 's not built into the browser , it 's really a pain in the ass to use .
In all honesty , I just keep a bunch of plaintext files containing the username and password pairs for the sites I use .
It 's terribly insecure , but it works for my laptop , and really , who wants to know my boingboing login anyway ?</tokentext>
<sentencetext>I've tried doing using Password Gorilla [www.fpx.de] since it runs on all three OS's I might use (Mac, Linux, and Win), and since it's available as a TCL script, I can keep a TCL interpreter on my USB thumbdrive along with the file.The biggest problem I have with these things isn't the tool, as much as getting myself to actually use it.
If it's not built into the browser, it's really a pain in the ass to use.
In all honesty, I just keep a bunch of plaintext files containing the username and password pairs for the sites I use.
It's terribly insecure, but it works for my laptop, and really, who wants to know my boingboing login anyway?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056252</id>
	<title>Keypass</title>
	<author>Anonymous</author>
	<datestamp>1257874860000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Keypass from a usb drive.</p></htmltext>
<tokenext>Keypass from a usb drive .</tokentext>
<sentencetext>Keypass from a usb drive.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056394</id>
	<title>Re:Keepass</title>
	<author>Dadoo</author>
	<datestamp>1257876360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>That sounds like a pretty good solution, but I have to ask: is it multi-user? I'd like to have a unified database of passwords that all our IT people can access, but not all IT people should have access to all passwords. Sure, everyone could have their own database, but if we did that, everyone's database would have to be updated every time there's a password change.</p></htmltext>
<tokenext>That sounds like a pretty good solution , but I have to ask : is it multi-user ?
I 'd like to have a unified database of passwords that all our IT people can access , but not all IT people should have access to all passwords .
Sure , everyone could have their own database , but if we did that , everyone 's database would have to be updated every time there 's a password change .</tokentext>
<sentencetext>That sounds like a pretty good solution, but I have to ask: is it multi-user?
I'd like to have a unified database of passwords that all our IT people can access, but not all IT people should have access to all passwords.
Sure, everyone could have their own database, but if we did that, everyone's database would have to be updated every time there's a password change.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057122</id>
	<title>I use</title>
	<author>steinerik</author>
	<datestamp>1257105840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>RoboForm in windows
1Password for mac.</htmltext>
<tokenext>RoboForm in windows 1Password for mac .</tokentext>
<sentencetext>RoboForm in windows
1Password for mac.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30068034</id>
	<title>LastPass</title>
	<author>Anonymous</author>
	<datestamp>1257083460000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>https://lastpass.com/</p><p>Makes it incredibly easy to remember passwords and add new passwords.</p><p>I used to loath making accounts to websites until this program. I can generate random passwords and it will remember them with ease. It will auto fill in next time I visit the website.</p><p>makes life so much easier</p></htmltext>
<tokenext>https : //lastpass.com/Makes it incredibly easy to remember passwords and add new passwords.I used to loath making accounts to websites until this program .
I can generate random passwords and it will remember them with ease .
It will auto fill in next time I visit the website.makes life so much easier</tokentext>
<sentencetext>https://lastpass.com/Makes it incredibly easy to remember passwords and add new passwords.I used to loath making accounts to websites until this program.
I can generate random passwords and it will remember them with ease.
It will auto fill in next time I visit the website.makes life so much easier</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054868</id>
	<title>Like I'm gonna tel you.</title>
	<author>jazzmans</author>
	<datestamp>1257865260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Like I'm gonna tell you what I do. . .  Don't write them down, don't use the 'remember password' option for bank websites.  That is all.</p><p>jaz</p></htmltext>
<tokenext>Like I 'm gon na tell you what I do .
. .
Do n't write them down , do n't use the 'remember password ' option for bank websites .
That is all.jaz</tokentext>
<sentencetext>Like I'm gonna tell you what I do.
. .
Don't write them down, don't use the 'remember password' option for bank websites.
That is all.jaz</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054892</id>
	<title>1password</title>
	<author>Anonymous</author>
	<datestamp>1257865440000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>1password for mac is the best</p></htmltext>
<tokenext>1password for mac is the best</tokentext>
<sentencetext>1password for mac is the best</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055114</id>
	<title>I use the vault to store hints</title>
	<author>JumpDrive</author>
	<datestamp>1257866640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have multiple passwords with variations to each.  I have a code for each base password, there are 6 now and then I have hints there which tell me which one and it's variation.
Hint might be : scientist silicon doped p-type.  Which would stand for Einstein34.</htmltext>
<tokenext>I have multiple passwords with variations to each .
I have a code for each base password , there are 6 now and then I have hints there which tell me which one and it 's variation .
Hint might be : scientist silicon doped p-type .
Which would stand for Einstein34 .</tokentext>
<sentencetext>I have multiple passwords with variations to each.
I have a code for each base password, there are 6 now and then I have hints there which tell me which one and it's variation.
Hint might be : scientist silicon doped p-type.
Which would stand for Einstein34.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055338</id>
	<title>Multiple passwords of differing strengths.</title>
	<author>srothroc</author>
	<datestamp>1257867840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Make three passwords of differing strengths for various uses.

Weak: abc123 (New York Times online, random one-use sites)
Medium: m1dd13name (forums)
Strong: tw45br1ll1ggreat! (mail, bank)

Then just write them on a piece of paper and put that in your wallet. Try to remember them every time, but if you forget, consult the paper in your wallet. Eventually you won't so much remember them as your hands/fingers will remember how to type them in a given situation. Just keep trying and they'll stick.</htmltext>
<tokenext>Make three passwords of differing strengths for various uses .
Weak : abc123 ( New York Times online , random one-use sites ) Medium : m1dd13name ( forums ) Strong : tw45br1ll1ggreat !
( mail , bank ) Then just write them on a piece of paper and put that in your wallet .
Try to remember them every time , but if you forget , consult the paper in your wallet .
Eventually you wo n't so much remember them as your hands/fingers will remember how to type them in a given situation .
Just keep trying and they 'll stick .</tokentext>
<sentencetext>Make three passwords of differing strengths for various uses.
Weak: abc123 (New York Times online, random one-use sites)
Medium: m1dd13name (forums)
Strong: tw45br1ll1ggreat!
(mail, bank)

Then just write them on a piece of paper and put that in your wallet.
Try to remember them every time, but if you forget, consult the paper in your wallet.
Eventually you won't so much remember them as your hands/fingers will remember how to type them in a given situation.
Just keep trying and they'll stick.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055244</id>
	<title>1 Tool (Painfully Synched)</title>
	<author>4105</author>
	<datestamp>1257867300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The question is what tool do slashdotters use? That is part of the problem, backups are the other.
I have passwords for myself and all of my clients, so the tool I use (Password Safe) has hundreds of passwords that are not easily retrievable, or not retrievable at all. So I have to keep all of my passwords, but loosing a laptop with my passwords, would mean more than worrying if someone would get into my bank account. It would mean I have tons of customer passwords lost.
<br> <br>
I store all of my passwords on a USB key. The password files are encrypted on this device, it is also my "master copy"
When I update a password, I copy the password database to my home computer (Unencrypted I am not concerned about a theft resulting in my password tool being cracked) My home computer is backed up to Mozy.
I then copy the update to my laptop (Unencrypted)
<br> <br>
I have 4 copies of my password files. I can tolerate loosing any one of them.</htmltext>
<tokenext>The question is what tool do slashdotters use ?
That is part of the problem , backups are the other .
I have passwords for myself and all of my clients , so the tool I use ( Password Safe ) has hundreds of passwords that are not easily retrievable , or not retrievable at all .
So I have to keep all of my passwords , but loosing a laptop with my passwords , would mean more than worrying if someone would get into my bank account .
It would mean I have tons of customer passwords lost .
I store all of my passwords on a USB key .
The password files are encrypted on this device , it is also my " master copy " When I update a password , I copy the password database to my home computer ( Unencrypted I am not concerned about a theft resulting in my password tool being cracked ) My home computer is backed up to Mozy .
I then copy the update to my laptop ( Unencrypted ) I have 4 copies of my password files .
I can tolerate loosing any one of them .</tokentext>
<sentencetext>The question is what tool do slashdotters use?
That is part of the problem, backups are the other.
I have passwords for myself and all of my clients, so the tool I use (Password Safe) has hundreds of passwords that are not easily retrievable, or not retrievable at all.
So I have to keep all of my passwords, but loosing a laptop with my passwords, would mean more than worrying if someone would get into my bank account.
It would mean I have tons of customer passwords lost.
I store all of my passwords on a USB key.
The password files are encrypted on this device, it is also my "master copy"
When I update a password, I copy the password database to my home computer (Unencrypted I am not concerned about a theft resulting in my password tool being cracked) My home computer is backed up to Mozy.
I then copy the update to my laptop (Unencrypted)
 
I have 4 copies of my password files.
I can tolerate loosing any one of them.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054978</id>
	<title>LastPass</title>
	<author>phasmal</author>
	<datestamp>1257865860000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>LastPass is definitely nice - it encrypts passwords so that they're not transmitted or stored on the server in the clear.  It's also one of the best integrated pieces of software I've used - it generally just does what you want it to.</p><p>I recommended it to a non-technical user recently, and she sent me back an email later thanking me because it removed all the mess that she was dealing with before and have her a single launch off point for her web logins.</p></htmltext>
<tokenext>LastPass is definitely nice - it encrypts passwords so that they 're not transmitted or stored on the server in the clear .
It 's also one of the best integrated pieces of software I 've used - it generally just does what you want it to.I recommended it to a non-technical user recently , and she sent me back an email later thanking me because it removed all the mess that she was dealing with before and have her a single launch off point for her web logins .</tokentext>
<sentencetext>LastPass is definitely nice - it encrypts passwords so that they're not transmitted or stored on the server in the clear.
It's also one of the best integrated pieces of software I've used - it generally just does what you want it to.I recommended it to a non-technical user recently, and she sent me back an email later thanking me because it removed all the mess that she was dealing with before and have her a single launch off point for her web logins.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063410</id>
	<title>http://keepass.info/</title>
	<author>blazemonkey</author>
	<datestamp>1257104220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I've been using KeePass Password Safe for years. I keep it installed on a thumb drive and take it with me pretty much everywhere I go. The KeePass files also get backed up to my desktop every time I insert the thumb drive or modify the password file. If I lose it, no big deal, no ones going to guess the master password and I always have a backup. There are builds for just about any OS people are using these days, so you shouldn't have to worry about retrieving your passwords cross-platform.

<br> <br> <a href="http://keepass.info/download.html" title="keepass.info" rel="nofollow">http://keepass.info/download.html</a> [keepass.info]</htmltext>
<tokenext>I 've been using KeePass Password Safe for years .
I keep it installed on a thumb drive and take it with me pretty much everywhere I go .
The KeePass files also get backed up to my desktop every time I insert the thumb drive or modify the password file .
If I lose it , no big deal , no ones going to guess the master password and I always have a backup .
There are builds for just about any OS people are using these days , so you should n't have to worry about retrieving your passwords cross-platform .
http : //keepass.info/download.html [ keepass.info ]</tokentext>
<sentencetext>I've been using KeePass Password Safe for years.
I keep it installed on a thumb drive and take it with me pretty much everywhere I go.
The KeePass files also get backed up to my desktop every time I insert the thumb drive or modify the password file.
If I lose it, no big deal, no ones going to guess the master password and I always have a backup.
There are builds for just about any OS people are using these days, so you shouldn't have to worry about retrieving your passwords cross-platform.
http://keepass.info/download.html [keepass.info]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054902</id>
	<title>Um, everyone here is apparently stupid.</title>
	<author>Anonymous</author>
	<datestamp>1257865440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Everyone else here is apparently attempting to answer the question in the <b>title</b>, which is not the actual problem he's trying to solve.</p><p>
There is an easy solution to the whole 'laptop getting stolen' problem.</p><p>
It's called <b>TrueCrypt</b>. Encrypt your drive. Put in the password on boot. Use your browser like normal.</p><p>
If someone steals your laptop, tada, no stolen passwords, because they can't boot your computer to get to them.</p><p>
If you want to have a USB fob, well, sadly, keyfiles are not supported by system encryption yet in Truecrypt. But there are third party tools that will do that.</p><p>
Trying to figure out what to 'store your passwords in' is silly. Store your passwords in your damn computer. And then encrypt your <b>computer</b>.</p><p>
Incidentally, people saying 'Don't write your passwords down' are idiots living in the 1980s, where people had passwords on local files and for local networks, and that was essentially it. It was, indeed, stupid to write down a password next to a computer if the point of the password was to protect things from people physically sitting at the computer.</p><p>
It's not stupid when it's your bank password or other online passwords, next to your computer at home. Because the security risk is not people breaking into your house and finding your passwords! The security risk is people you have no contact with at all guessing the passwords, and it's much safer to make it a 20 character password that's is written down than a 10 character one that isn't.</p></htmltext>
<tokenext>Everyone else here is apparently attempting to answer the question in the title , which is not the actual problem he 's trying to solve .
There is an easy solution to the whole 'laptop getting stolen ' problem .
It 's called TrueCrypt .
Encrypt your drive .
Put in the password on boot .
Use your browser like normal .
If someone steals your laptop , tada , no stolen passwords , because they ca n't boot your computer to get to them .
If you want to have a USB fob , well , sadly , keyfiles are not supported by system encryption yet in Truecrypt .
But there are third party tools that will do that .
Trying to figure out what to 'store your passwords in ' is silly .
Store your passwords in your damn computer .
And then encrypt your computer .
Incidentally , people saying 'Do n't write your passwords down ' are idiots living in the 1980s , where people had passwords on local files and for local networks , and that was essentially it .
It was , indeed , stupid to write down a password next to a computer if the point of the password was to protect things from people physically sitting at the computer .
It 's not stupid when it 's your bank password or other online passwords , next to your computer at home .
Because the security risk is not people breaking into your house and finding your passwords !
The security risk is people you have no contact with at all guessing the passwords , and it 's much safer to make it a 20 character password that 's is written down than a 10 character one that is n't .</tokentext>
<sentencetext>Everyone else here is apparently attempting to answer the question in the title, which is not the actual problem he's trying to solve.
There is an easy solution to the whole 'laptop getting stolen' problem.
It's called TrueCrypt.
Encrypt your drive.
Put in the password on boot.
Use your browser like normal.
If someone steals your laptop, tada, no stolen passwords, because they can't boot your computer to get to them.
If you want to have a USB fob, well, sadly, keyfiles are not supported by system encryption yet in Truecrypt.
But there are third party tools that will do that.
Trying to figure out what to 'store your passwords in' is silly.
Store your passwords in your damn computer.
And then encrypt your computer.
Incidentally, people saying 'Don't write your passwords down' are idiots living in the 1980s, where people had passwords on local files and for local networks, and that was essentially it.
It was, indeed, stupid to write down a password next to a computer if the point of the password was to protect things from people physically sitting at the computer.
It's not stupid when it's your bank password or other online passwords, next to your computer at home.
Because the security risk is not people breaking into your house and finding your passwords!
The security risk is people you have no contact with at all guessing the passwords, and it's much safer to make it a 20 character password that's is written down than a 10 character one that isn't.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055386</id>
	<title>Re:1password</title>
	<author>arminw</author>
	<datestamp>1257868080000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>....If you have a mac....</p><p>Why not use the built in keychain program? Are they key chains not encrypted when locked? It has been working pretty well for me.</p></htmltext>
<tokenext>....If you have a mac....Why not use the built in keychain program ?
Are they key chains not encrypted when locked ?
It has been working pretty well for me .</tokentext>
<sentencetext>....If you have a mac....Why not use the built in keychain program?
Are they key chains not encrypted when locked?
It has been working pretty well for me.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054530</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056070</id>
	<title>.l3375p34k.</title>
	<author>screeble</author>
	<datestamp>1257872940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>1 \/\/r4p 411 my p455w0rdz 1n d07z 4nd u53 13375p34k.</p><p>I pick a meaningful word to myself. Perhaps something like "Pathfinder," which is one of my favourite Vox amps.</p><p>This becomes:<nobr> <wbr></nobr>.p47hf1nd3r.</p></htmltext>
<tokenext>1 \ / \ /r4p 411 my p455w0rdz 1n d07z 4nd u53 13375p34k.I pick a meaningful word to myself .
Perhaps something like " Pathfinder , " which is one of my favourite Vox amps.This becomes : .p47hf1nd3r .</tokentext>
<sentencetext>1 \/\/r4p 411 my p455w0rdz 1n d07z 4nd u53 13375p34k.I pick a meaningful word to myself.
Perhaps something like "Pathfinder," which is one of my favourite Vox amps.This becomes: .p47hf1nd3r.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058832</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>malkien</author>
	<datestamp>1257082800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use the same mechanism.<br>Unfortunately it is somewhat defeated when some crazy rules are forced on your password (i.e. specific length, numbers only).<br>I found more than one place that did this.</p></htmltext>
<tokenext>I use the same mechanism.Unfortunately it is somewhat defeated when some crazy rules are forced on your password ( i.e .
specific length , numbers only ) .I found more than one place that did this .</tokentext>
<sentencetext>I use the same mechanism.Unfortunately it is somewhat defeated when some crazy rules are forced on your password (i.e.
specific length, numbers only).I found more than one place that did this.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058686</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>selven</author>
	<datestamp>1257081540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>But a Greek can easily get in.</p></htmltext>
<tokenext>But a Greek can easily get in .</tokentext>
<sentencetext>But a Greek can easily get in.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057524</id>
	<title>Re:Hashing Works</title>
	<author>Aceticon</author>
	<datestamp>1257067740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Just use ROT13 on the website name to generate the hash.</p><p>For extra safety, use ROT13 <b>twice</b>.</p></htmltext>
<tokenext>Just use ROT13 on the website name to generate the hash.For extra safety , use ROT13 twice .</tokentext>
<sentencetext>Just use ROT13 on the website name to generate the hash.For extra safety, use ROT13 twice.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054936</id>
	<title>Blackberry Password Keeper</title>
	<author>RabidMonkey</author>
	<datestamp>1257865620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've lately really gotten into using the password keeper on my BlackBerry, putting in various websites and so on.  I like it because it's portable, as you switch devices it's backed up and moved, and I pretty much always have it with me.  It doesn't integrate with software etc for me, but I'm now in the habit of just throwing new stuff in there.  It's quite handy, and free.</p></htmltext>
<tokenext>I 've lately really gotten into using the password keeper on my BlackBerry , putting in various websites and so on .
I like it because it 's portable , as you switch devices it 's backed up and moved , and I pretty much always have it with me .
It does n't integrate with software etc for me , but I 'm now in the habit of just throwing new stuff in there .
It 's quite handy , and free .</tokentext>
<sentencetext>I've lately really gotten into using the password keeper on my BlackBerry, putting in various websites and so on.
I like it because it's portable, as you switch devices it's backed up and moved, and I pretty much always have it with me.
It doesn't integrate with software etc for me, but I'm now in the habit of just throwing new stuff in there.
It's quite handy, and free.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054992</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>Anonymous</author>
	<datestamp>1257865920000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Viruses can still steal passwords on post-it notes on your monitor if you have a webcam on your computer and a reflective surface facing the computer.</p></htmltext>
<tokenext>Viruses can still steal passwords on post-it notes on your monitor if you have a webcam on your computer and a reflective surface facing the computer .</tokentext>
<sentencetext>Viruses can still steal passwords on post-it notes on your monitor if you have a webcam on your computer and a reflective surface facing the computer.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054850</id>
	<title>Re:Xmarks, KeePass and Encrypted Zip combination</title>
	<author>RuBLed</author>
	<datestamp>1257865140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I usually think of passwords as passphrases now.
<br> <br>
I often use a combination of words, it could be composed of a constant special character, at least 3 numbers, a word that is relevant to the site or application, and a totally irrelevant word like a dog breed, anime characters, etc etc.
<br> <br>
I just shuffle a limited number of combinations and it usually turns out to be something like this:
<br>
69slashdot?terrier69
<br>
42mail!shepherd42</htmltext>
<tokenext>I usually think of passwords as passphrases now .
I often use a combination of words , it could be composed of a constant special character , at least 3 numbers , a word that is relevant to the site or application , and a totally irrelevant word like a dog breed , anime characters , etc etc .
I just shuffle a limited number of combinations and it usually turns out to be something like this : 69slashdot ? terrier69 42mail ! shepherd42</tokentext>
<sentencetext>I usually think of passwords as passphrases now.
I often use a combination of words, it could be composed of a constant special character, at least 3 numbers, a word that is relevant to the site or application, and a totally irrelevant word like a dog breed, anime characters, etc etc.
I just shuffle a limited number of combinations and it usually turns out to be something like this:

69slashdot?terrier69

42mail!shepherd42</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054488</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058154</id>
	<title>I use SuperGenPass.com</title>
	<author>Anonymous</author>
	<datestamp>1257075240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Well, more specifically, I use a version I've slightly modified and have uploaded to my own hosting account.</p><p>I also keep a copy on a USB stick so that I have access when offline.</p></htmltext>
<tokenext>Well , more specifically , I use a version I 've slightly modified and have uploaded to my own hosting account.I also keep a copy on a USB stick so that I have access when offline .</tokentext>
<sentencetext>Well, more specifically, I use a version I've slightly modified and have uploaded to my own hosting account.I also keep a copy on a USB stick so that I have access when offline.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054814</id>
	<title>brain</title>
	<author>JeanBaptiste</author>
	<datestamp>1257864960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I have literally hundreds of passwords memorized, yet I cannot match a face to a name without much effort =(</p></htmltext>
<tokenext>I have literally hundreds of passwords memorized , yet I can not match a face to a name without much effort = (</tokentext>
<sentencetext>I have literally hundreds of passwords memorized, yet I cannot match a face to a name without much effort =(</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055716</id>
	<title>Re:Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257870480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Do what I set up for my father, Truecrypt installed to a USB key, passwords in a plaintext file inside the arcive.</p></div><p>...and in the page file, and maybe a dozen other places, depending on which text editor he uses to look at that text file.</p></div>
	</htmltext>
<tokenext>Do what I set up for my father , Truecrypt installed to a USB key , passwords in a plaintext file inside the arcive....and in the page file , and maybe a dozen other places , depending on which text editor he uses to look at that text file .</tokentext>
<sentencetext>Do what I set up for my father, Truecrypt installed to a USB key, passwords in a plaintext file inside the arcive....and in the page file, and maybe a dozen other places, depending on which text editor he uses to look at that text file.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055088</id>
	<title>Clipperz.com</title>
	<author>ifchairscouldtalk</author>
	<datestamp>1257866520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use clipperz, a free and anonymous online password manager which comes in an offline version too. It is based on open standards, proven encryption technologies, and has no vendor lock-in, and full anonymity.</p><p>

<a href="http://www.clipperz.com/" title="clipperz.com" rel="nofollow">http://www.clipperz.com/</a> [clipperz.com]

</p><p>I like the philosophy behind it and the people who have developed it.</p><p>If you use it, please consider a donation =)</p></htmltext>
<tokenext>I use clipperz , a free and anonymous online password manager which comes in an offline version too .
It is based on open standards , proven encryption technologies , and has no vendor lock-in , and full anonymity .
http : //www.clipperz.com/ [ clipperz.com ] I like the philosophy behind it and the people who have developed it.If you use it , please consider a donation = )</tokentext>
<sentencetext>I use clipperz, a free and anonymous online password manager which comes in an offline version too.
It is based on open standards, proven encryption technologies, and has no vendor lock-in, and full anonymity.
http://www.clipperz.com/ [clipperz.com]

I like the philosophy behind it and the people who have developed it.If you use it, please consider a donation =)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055592</id>
	<title>Passpack.com</title>
	<author>BountyX</author>
	<datestamp>1257869520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If you havn't seen it yet, it's worth a peek. Straight from passpack's site<br> <br>...Your data is encrypted on-the-fly before leaving your browser. Passpack uses the AES-256 encryption algorithm, US government approved for classified information, to make sure that only you can decrypt it with your secret Packing Key.

Your Packing Key never gets sent or saved to the server, so not even Passpack staff knows it. As far as the world outside your browser is concerned, your Packing Key is a complete mystery. Without it, it is impossibile to see, access or use your Passpack account (so don't loose it!)...<br> <br>You can verify the integrity of the encryption algorithm by looking at their JS implementation. It dosn't have the added protection of key files though...</htmltext>
<tokenext>If you hav n't seen it yet , it 's worth a peek .
Straight from passpack 's site ...Your data is encrypted on-the-fly before leaving your browser .
Passpack uses the AES-256 encryption algorithm , US government approved for classified information , to make sure that only you can decrypt it with your secret Packing Key .
Your Packing Key never gets sent or saved to the server , so not even Passpack staff knows it .
As far as the world outside your browser is concerned , your Packing Key is a complete mystery .
Without it , it is impossibile to see , access or use your Passpack account ( so do n't loose it ! ) .. .
You can verify the integrity of the encryption algorithm by looking at their JS implementation .
It dos n't have the added protection of key files though.. .</tokentext>
<sentencetext>If you havn't seen it yet, it's worth a peek.
Straight from passpack's site ...Your data is encrypted on-the-fly before leaving your browser.
Passpack uses the AES-256 encryption algorithm, US government approved for classified information, to make sure that only you can decrypt it with your secret Packing Key.
Your Packing Key never gets sent or saved to the server, so not even Passpack staff knows it.
As far as the world outside your browser is concerned, your Packing Key is a complete mystery.
Without it, it is impossibile to see, access or use your Passpack account (so don't loose it!)...
You can verify the integrity of the encryption algorithm by looking at their JS implementation.
It dosn't have the added protection of key files though...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055344</id>
	<title>pwman (curses/terminal manager?)</title>
	<author>Anonymous</author>
	<datestamp>1257867900000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use "pwman" because it works with my pgp key (and stores them in an encrypted XML file)</p><p>Not the greatest, I wouldn't mind finding something better.. (sometimes it corrupts my file) but it was the only one I could find that worked with the terminal. (I don't like critical stuff using X11, plus, I want to get at it via ssh)</p></htmltext>
<tokenext>I use " pwman " because it works with my pgp key ( and stores them in an encrypted XML file ) Not the greatest , I would n't mind finding something better.. ( sometimes it corrupts my file ) but it was the only one I could find that worked with the terminal .
( I do n't like critical stuff using X11 , plus , I want to get at it via ssh )</tokentext>
<sentencetext>I use "pwman" because it works with my pgp key (and stores them in an encrypted XML file)Not the greatest, I wouldn't mind finding something better.. (sometimes it corrupts my file) but it was the only one I could find that worked with the terminal.
(I don't like critical stuff using X11, plus, I want to get at it via ssh)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054960</id>
	<title>master password</title>
	<author>Anonymous</author>
	<datestamp>1257865740000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Use the 'master password' option in Firefox that requires you to type in a password (the master password) before it will automagically fill in the username/password boxes on websites.</p></htmltext>
<tokenext>Use the 'master password ' option in Firefox that requires you to type in a password ( the master password ) before it will automagically fill in the username/password boxes on websites .</tokentext>
<sentencetext>Use the 'master password' option in Firefox that requires you to type in a password (the master password) before it will automagically fill in the username/password boxes on websites.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055904</id>
	<title>Data Harvesting</title>
	<author>Zupreme</author>
	<datestamp>1257871560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You do all realize that this post could simply be a thinly veiled attempt at gathering sensitive information (i.e. where you all store your passwords)...

Just a thought.</htmltext>
<tokenext>You do all realize that this post could simply be a thinly veiled attempt at gathering sensitive information ( i.e .
where you all store your passwords ) .. . Just a thought .</tokentext>
<sentencetext>You do all realize that this post could simply be a thinly veiled attempt at gathering sensitive information (i.e.
where you all store your passwords)...

Just a thought.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058932</id>
	<title>Re:paper in your wallet</title>
	<author>Anonymous</author>
	<datestamp>1257083640000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>If your wallet is lost, immediately set all your passwords to something temporary then build a new password list all over again.</p></div><p>And how do you reset your passwords if you don't have your current password list?</p></div>
	</htmltext>
<tokenext>If your wallet is lost , immediately set all your passwords to something temporary then build a new password list all over again.And how do you reset your passwords if you do n't have your current password list ?</tokentext>
<sentencetext>If your wallet is lost, immediately set all your passwords to something temporary then build a new password list all over again.And how do you reset your passwords if you don't have your current password list?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058864</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>flycast</author>
	<datestamp>1257083160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>This is wrong. There are trojans that sit and wait and log keystrokes. Lot's of websites are getting hacked right now by one that does exactly that.</htmltext>
<tokenext>This is wrong .
There are trojans that sit and wait and log keystrokes .
Lot 's of websites are getting hacked right now by one that does exactly that .</tokentext>
<sentencetext>This is wrong.
There are trojans that sit and wait and log keystrokes.
Lot's of websites are getting hacked right now by one that does exactly that.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057416</id>
	<title>cpm</title>
	<author>bumby</author>
	<datestamp>1257066300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I've been waiting to try out cpm (console password manager), <a href="http://www.harry-b.de/dokuwiki/doku.php?id=harry:cpm" title="harry-b.de">http://www.harry-b.de/dokuwiki/doku.php?id=harry:cpm</a> [harry-b.de] , for quite a while now. However, there's still no working version for me debian<nobr> <wbr></nobr>:(</htmltext>
<tokenext>I 've been waiting to try out cpm ( console password manager ) , http : //www.harry-b.de/dokuwiki/doku.php ? id = harry : cpm [ harry-b.de ] , for quite a while now .
However , there 's still no working version for me debian : (</tokentext>
<sentencetext>I've been waiting to try out cpm (console password manager), http://www.harry-b.de/dokuwiki/doku.php?id=harry:cpm [harry-b.de] , for quite a while now.
However, there's still no working version for me debian :(</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057306</id>
	<title>Re:Truecrypt</title>
	<author>RocketRabbit</author>
	<datestamp>1257108240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>That sounds like a pain in the ass.  I remember my passwords.  That way I don't need some damn usb key.</p></htmltext>
<tokenext>That sounds like a pain in the ass .
I remember my passwords .
That way I do n't need some damn usb key .</tokentext>
<sentencetext>That sounds like a pain in the ass.
I remember my passwords.
That way I don't need some damn usb key.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059926</id>
	<title>Password "safe" on portable device</title>
	<author>wonderboss</author>
	<datestamp>1257089640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use a password storing program on a portable device such as a PDA or iPod touch.
I use obscure passwords that I can remember with a hint that won't make
sense to anyone else.  I only store the hint in the encrypted storage.</htmltext>
<tokenext>I use a password storing program on a portable device such as a PDA or iPod touch .
I use obscure passwords that I can remember with a hint that wo n't make sense to anyone else .
I only store the hint in the encrypted storage .</tokentext>
<sentencetext>I use a password storing program on a portable device such as a PDA or iPod touch.
I use obscure passwords that I can remember with a hint that won't make
sense to anyone else.
I only store the hint in the encrypted storage.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30070878</id>
	<title>PasswordMaker</title>
	<author>fialar</author>
	<datestamp>1258026840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://www.passwordmaker.org/" title="passwordmaker.org">http://www.passwordmaker.org/</a> [passwordmaker.org]<br>All you have to remember is a master password. It will generate secure passwords for you depending on the "note text" you enter (whether it's a domain or something else.)</p><p>Has a firefox extension, but also a CLI / PHP / Java version, so you can use it on anything.</p></htmltext>
<tokenext>http : //www.passwordmaker.org/ [ passwordmaker.org ] All you have to remember is a master password .
It will generate secure passwords for you depending on the " note text " you enter ( whether it 's a domain or something else .
) Has a firefox extension , but also a CLI / PHP / Java version , so you can use it on anything .</tokentext>
<sentencetext>http://www.passwordmaker.org/ [passwordmaker.org]All you have to remember is a master password.
It will generate secure passwords for you depending on the "note text" you enter (whether it's a domain or something else.
)Has a firefox extension, but also a CLI / PHP / Java version, so you can use it on anything.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062282</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>Anonymous</author>
	<datestamp>1257099420000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>... that's assuming you have no net-connected mobile robot moving around at your place.</p></htmltext>
<tokenext>... that 's assuming you have no net-connected mobile robot moving around at your place .</tokentext>
<sentencetext>... that's assuming you have no net-connected mobile robot moving around at your place.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054718</id>
	<title>Re:Keepass</title>
	<author>kitezh</author>
	<datestamp>1257864480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I second Keepass.You can have it suggest passwords based on length or acceptable characters.  You can also organize your passwords by categories (like folders).  Just don't forget your master password.  If you don't like using a master password, you can use a digital key instead stored at a separate location (like a thumb drive).

Plus, it comes not only for Windows, but there are ports for Linux/Max OSX, iPhone, Blackberry, Palm, etc.</htmltext>
<tokenext>I second Keepass.You can have it suggest passwords based on length or acceptable characters .
You can also organize your passwords by categories ( like folders ) .
Just do n't forget your master password .
If you do n't like using a master password , you can use a digital key instead stored at a separate location ( like a thumb drive ) .
Plus , it comes not only for Windows , but there are ports for Linux/Max OSX , iPhone , Blackberry , Palm , etc .</tokentext>
<sentencetext>I second Keepass.You can have it suggest passwords based on length or acceptable characters.
You can also organize your passwords by categories (like folders).
Just don't forget your master password.
If you don't like using a master password, you can use a digital key instead stored at a separate location (like a thumb drive).
Plus, it comes not only for Windows, but there are ports for Linux/Max OSX, iPhone, Blackberry, Palm, etc.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055286</id>
	<title>lastpass</title>
	<author>genka</author>
	<datestamp>1257867540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>www.lastpass.com
I store less important passwords, and keep in memory ones for banking, ebay, etc.</htmltext>
<tokenext>www.lastpass.com I store less important passwords , and keep in memory ones for banking , ebay , etc .</tokentext>
<sentencetext>www.lastpass.com
I store less important passwords, and keep in memory ones for banking, ebay, etc.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060756</id>
	<title>SplashID</title>
	<author>Anonymous</author>
	<datestamp>1257093360000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>With Blackberry, desktop, iPhone/iPod Touch, Nokia, Palm and Windows Mobile versions; keep your passwords AES encrypted and synced across multiple platforms.  http://www.splashdata.com/splashid/</p></htmltext>
<tokenext>With Blackberry , desktop , iPhone/iPod Touch , Nokia , Palm and Windows Mobile versions ; keep your passwords AES encrypted and synced across multiple platforms .
http : //www.splashdata.com/splashid/</tokentext>
<sentencetext>With Blackberry, desktop, iPhone/iPod Touch, Nokia, Palm and Windows Mobile versions; keep your passwords AES encrypted and synced across multiple platforms.
http://www.splashdata.com/splashid/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059406</id>
	<title>Associations</title>
	<author>c00p3r</author>
	<datestamp>1257087480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Create more associations. Some abstract pictures is a good thing.</htmltext>
<tokenext>Create more associations .
Some abstract pictures is a good thing .</tokentext>
<sentencetext>Create more associations.
Some abstract pictures is a good thing.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061108</id>
	<title>Passwords...</title>
	<author>Anonymous</author>
	<datestamp>1257094800000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>It's quite interesting that everyone has some convoluted method of passwords...  Take the square root of your mothers age + the name of the website + your favorite color...+1</p></htmltext>
<tokenext>It 's quite interesting that everyone has some convoluted method of passwords... Take the square root of your mothers age + the name of the website + your favorite color... + 1</tokentext>
<sentencetext>It's quite interesting that everyone has some convoluted method of passwords...  Take the square root of your mothers age + the name of the website + your favorite color...+1</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058670</id>
	<title>RoboForm</title>
	<author>tanktop</author>
	<datestamp>1257081360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use RoboForm. It's not free, but does the job well</p></htmltext>
<tokenext>I use RoboForm .
It 's not free , but does the job well</tokentext>
<sentencetext>I use RoboForm.
It's not free, but does the job well</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054806</id>
	<title>Cellphone contact list</title>
	<author>Anonymous</author>
	<datestamp>1257864900000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Cellphone contact list...until your phone dies or goes missing</p></htmltext>
<tokenext>Cellphone contact list...until your phone dies or goes missing</tokentext>
<sentencetext>Cellphone contact list...until your phone dies or goes missing</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056904</id>
	<title>Re:Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257881160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use KeePass as well and it works Great. You can put both the application and the encrypted file on a usb and you have mobile version. What I do is maintain my most current version on my laptop, but I take the USB just in case I need my passwords while on the go.  If you have to create new passwords while away from your laptop, you can create a "Move to Master file" folder which is a reminder to move those passwords to your main file.  It works awesome and I don't ever worry about forgetting or remembering passwords.</p></htmltext>
<tokenext>I use KeePass as well and it works Great .
You can put both the application and the encrypted file on a usb and you have mobile version .
What I do is maintain my most current version on my laptop , but I take the USB just in case I need my passwords while on the go .
If you have to create new passwords while away from your laptop , you can create a " Move to Master file " folder which is a reminder to move those passwords to your main file .
It works awesome and I do n't ever worry about forgetting or remembering passwords .</tokentext>
<sentencetext>I use KeePass as well and it works Great.
You can put both the application and the encrypted file on a usb and you have mobile version.
What I do is maintain my most current version on my laptop, but I take the USB just in case I need my passwords while on the go.
If you have to create new passwords while away from your laptop, you can create a "Move to Master file" folder which is a reminder to move those passwords to your main file.
It works awesome and I don't ever worry about forgetting or remembering passwords.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054586</id>
	<title>LastPass</title>
	<author>Anonymous</author>
	<datestamp>1257863940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I've using LastPass for the past few months and like it immensely. It integrates with almost every major browser. It also can generate a random password for you. Check it out: https://lastpass.com/</p></htmltext>
<tokenext>I 've using LastPass for the past few months and like it immensely .
It integrates with almost every major browser .
It also can generate a random password for you .
Check it out : https : //lastpass.com/</tokentext>
<sentencetext>I've using LastPass for the past few months and like it immensely.
It integrates with almost every major browser.
It also can generate a random password for you.
Check it out: https://lastpass.com/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057688</id>
	<title>Re:Keepass</title>
	<author>Felgior</author>
	<datestamp>1257069540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="http://www.dobysoft.com/products/keypass/" title="dobysoft.com" rel="nofollow">http://www.dobysoft.com/products/keypass/</a> [dobysoft.com] is just like Keepass but easier in usage. There a very little differences, but they do make life a lot easier. On the down side the program has a price attached to it, but it's only $ 30.</htmltext>
<tokenext>http : //www.dobysoft.com/products/keypass/ [ dobysoft.com ] is just like Keepass but easier in usage .
There a very little differences , but they do make life a lot easier .
On the down side the program has a price attached to it , but it 's only $ 30 .</tokentext>
<sentencetext>http://www.dobysoft.com/products/keypass/ [dobysoft.com] is just like Keepass but easier in usage.
There a very little differences, but they do make life a lot easier.
On the down side the program has a price attached to it, but it's only $ 30.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062404</id>
	<title>Password app for your cellphone</title>
	<author>Anonymous</author>
	<datestamp>1257099900000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>A collegue of mine got tired of keeping passwords in his head, as well as all the time you have to renew your passwords every 2 months according to these "hard-to-break-password-rules", that makes the password impossible to remember.</p><p>He made a simple S60 app (that by itself is password protected) where you can store all your passwords and to what account (if needed) they are used. The app saves the passwords encrypted on your phone, and it also has the ability to generate new passwords with a lot of different parameters to help you set the length, special characters etc. I think it works wonderful for me, and I haven't had any problems remembering passwords since.</p><p>The weak points is ofcourse you will need to set a fairly strong password on the application to start it, which can be tricky to remember. Best would be if the cellphone had a finger-print-reader built in that you could use to start the app.</p></htmltext>
<tokenext>A collegue of mine got tired of keeping passwords in his head , as well as all the time you have to renew your passwords every 2 months according to these " hard-to-break-password-rules " , that makes the password impossible to remember.He made a simple S60 app ( that by itself is password protected ) where you can store all your passwords and to what account ( if needed ) they are used .
The app saves the passwords encrypted on your phone , and it also has the ability to generate new passwords with a lot of different parameters to help you set the length , special characters etc .
I think it works wonderful for me , and I have n't had any problems remembering passwords since.The weak points is ofcourse you will need to set a fairly strong password on the application to start it , which can be tricky to remember .
Best would be if the cellphone had a finger-print-reader built in that you could use to start the app .</tokentext>
<sentencetext>A collegue of mine got tired of keeping passwords in his head, as well as all the time you have to renew your passwords every 2 months according to these "hard-to-break-password-rules", that makes the password impossible to remember.He made a simple S60 app (that by itself is password protected) where you can store all your passwords and to what account (if needed) they are used.
The app saves the passwords encrypted on your phone, and it also has the ability to generate new passwords with a lot of different parameters to help you set the length, special characters etc.
I think it works wonderful for me, and I haven't had any problems remembering passwords since.The weak points is ofcourse you will need to set a fairly strong password on the application to start it, which can be tricky to remember.
Best would be if the cellphone had a finger-print-reader built in that you could use to start the app.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056260</id>
	<title>Keepass</title>
	<author>lusid1</author>
	<datestamp>1257874920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Keepass works well, and has been ported to almost every platform.  Win, Lin, Mac, iphone, droid, winmo, even the old fashioned blackberry.</p><p><a href="http://keepass.info/" title="keepass.info" rel="nofollow">http://keepass.info/</a> [keepass.info]</p></htmltext>
<tokenext>Keepass works well , and has been ported to almost every platform .
Win , Lin , Mac , iphone , droid , winmo , even the old fashioned blackberry.http : //keepass.info/ [ keepass.info ]</tokentext>
<sentencetext>Keepass works well, and has been ported to almost every platform.
Win, Lin, Mac, iphone, droid, winmo, even the old fashioned blackberry.http://keepass.info/ [keepass.info]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061710</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>cayle clark</author>
	<datestamp>1257097080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>actually, only two.</p></htmltext>
<tokenext>actually , only two .</tokentext>
<sentencetext>actually, only two.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056872</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058334</id>
	<title>1Password</title>
	<author>Anonymous</author>
	<datestamp>1257077580000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>if you use mac os you could try 1password. it stores your passwords in an aes encrypted file und has browser plug ins..<br>automaticly fills your fields if you want to.</p><p>by now i only know the very imortant passwords.. the rest is just by 1password generated<nobr> <wbr></nobr>;)</p></htmltext>
<tokenext>if you use mac os you could try 1password .
it stores your passwords in an aes encrypted file und has browser plug ins..automaticly fills your fields if you want to.by now i only know the very imortant passwords.. the rest is just by 1password generated ; )</tokentext>
<sentencetext>if you use mac os you could try 1password.
it stores your passwords in an aes encrypted file und has browser plug ins..automaticly fills your fields if you want to.by now i only know the very imortant passwords.. the rest is just by 1password generated ;)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059044</id>
	<title>Re:Truecrypt</title>
	<author>corbettw</author>
	<datestamp>1257084840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>What about those of us who need to use different accounts on the same site? I manage the retirement accounts for myself and my wife; I need to log in periodically either as myself, or as her, to move money around and make sure we're on track for our goals. Does GPGAuth allow this kind of flexibility?</p></htmltext>
<tokenext>What about those of us who need to use different accounts on the same site ?
I manage the retirement accounts for myself and my wife ; I need to log in periodically either as myself , or as her , to move money around and make sure we 're on track for our goals .
Does GPGAuth allow this kind of flexibility ?</tokentext>
<sentencetext>What about those of us who need to use different accounts on the same site?
I manage the retirement accounts for myself and my wife; I need to log in periodically either as myself, or as her, to move money around and make sure we're on track for our goals.
Does GPGAuth allow this kind of flexibility?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055024</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057180</id>
	<title>Keepass is pretty  much the gold standard</title>
	<author>mauriceh</author>
	<datestamp>1257106680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>And runs on most popular OS.</p></htmltext>
<tokenext>And runs on most popular OS .</tokentext>
<sentencetext>And runs on most popular OS.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057518</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>IrquiM</author>
	<datestamp>1257067560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Just make it look like a shopping list...</p><p>I.e. a Post-it with the text: Remember to buy flowers, and the password is 2BuyFl0w3r5</p></htmltext>
<tokenext>Just make it look like a shopping list...I.e .
a Post-it with the text : Remember to buy flowers , and the password is 2BuyFl0w3r5</tokentext>
<sentencetext>Just make it look like a shopping list...I.e.
a Post-it with the text: Remember to buy flowers, and the password is 2BuyFl0w3r5</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055278</id>
	<title>KeyMaker</title>
	<author>Anonymous</author>
	<datestamp>1257867480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use an old program called KeyMaker.  It uses a passphrase of your choice, the complexity of your choice and other options (such as the name of the website and the username) to generate the password.  I like it because, I never have to write down a password.  I simply have to remember the passphrase and what options I used, and the program will generate the password for me.</p></htmltext>
<tokenext>I use an old program called KeyMaker .
It uses a passphrase of your choice , the complexity of your choice and other options ( such as the name of the website and the username ) to generate the password .
I like it because , I never have to write down a password .
I simply have to remember the passphrase and what options I used , and the program will generate the password for me .</tokentext>
<sentencetext>I use an old program called KeyMaker.
It uses a passphrase of your choice, the complexity of your choice and other options (such as the name of the website and the username) to generate the password.
I like it because, I never have to write down a password.
I simply have to remember the passphrase and what options I used, and the program will generate the password for me.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054592</id>
	<title>Key Chains</title>
	<author>hillbilly1980</author>
	<datestamp>1257864000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>First of when using firefox, use the password manager. From what i understand it encyrpts your passwords with your master password. For everything else from secure notes, ssl keys, to passwords i use a custom container in Key Chains. The built in password manager of any OS X machine.</p></htmltext>
<tokenext>First of when using firefox , use the password manager .
From what i understand it encyrpts your passwords with your master password .
For everything else from secure notes , ssl keys , to passwords i use a custom container in Key Chains .
The built in password manager of any OS X machine .</tokentext>
<sentencetext>First of when using firefox, use the password manager.
From what i understand it encyrpts your passwords with your master password.
For everything else from secure notes, ssl keys, to passwords i use a custom container in Key Chains.
The built in password manager of any OS X machine.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056518</id>
	<title>Definitely LastPass</title>
	<author>Anonymous</author>
	<datestamp>1257877620000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>LastPass is definitely the way to go if you ask me. It is secure, it syncs, you can get to your passwords from any device, and it's truly a brilliant concept. The idea is that you only remember one "LastPass" and there are no more passwords to remember. The customization is awesome and the compatibility across browsers makes it ideal for the migrating web user. I especially like the "AutoLogin" feature. This eliminates all user interaction by actually submitting forms for you when you come up on a page. The ability to specify individual accounts for a password re-prompt helps keep your most important accounts more secure and the form filling feature is a nice bonus. I've tried 'em all and to me this is a clear winner. Anyone agree?</p><p>By the way I reviewed it here if anyone is interested: <a href="http://austinbeam.com/2009/10/top-notch-password-manager/" title="austinbeam.com" rel="nofollow">Top Notch Password Manager</a> [austinbeam.com]</p></htmltext>
<tokenext>LastPass is definitely the way to go if you ask me .
It is secure , it syncs , you can get to your passwords from any device , and it 's truly a brilliant concept .
The idea is that you only remember one " LastPass " and there are no more passwords to remember .
The customization is awesome and the compatibility across browsers makes it ideal for the migrating web user .
I especially like the " AutoLogin " feature .
This eliminates all user interaction by actually submitting forms for you when you come up on a page .
The ability to specify individual accounts for a password re-prompt helps keep your most important accounts more secure and the form filling feature is a nice bonus .
I 've tried 'em all and to me this is a clear winner .
Anyone agree ? By the way I reviewed it here if anyone is interested : Top Notch Password Manager [ austinbeam.com ]</tokentext>
<sentencetext>LastPass is definitely the way to go if you ask me.
It is secure, it syncs, you can get to your passwords from any device, and it's truly a brilliant concept.
The idea is that you only remember one "LastPass" and there are no more passwords to remember.
The customization is awesome and the compatibility across browsers makes it ideal for the migrating web user.
I especially like the "AutoLogin" feature.
This eliminates all user interaction by actually submitting forms for you when you come up on a page.
The ability to specify individual accounts for a password re-prompt helps keep your most important accounts more secure and the form filling feature is a nice bonus.
I've tried 'em all and to me this is a clear winner.
Anyone agree?By the way I reviewed it here if anyone is interested: Top Notch Password Manager [austinbeam.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057376</id>
	<title>Re:Prepended or Appended Passphrase</title>
	<author>Anonymous</author>
	<datestamp>1257109020000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>Create a passphrase which you prepend or append to every important password.</p></div><p>Bad idea. You should never use the same password (or part thereof) on two or more systems (that you do not control). In your case, if an attacker managed to get two of your passwords (say to two different web sites) then they could simply compare them and determine your super-secret pass phrase that you attach to all your passwords. Combine that with your list and you're owned.</p></div>
	</htmltext>
<tokenext>Create a passphrase which you prepend or append to every important password.Bad idea .
You should never use the same password ( or part thereof ) on two or more systems ( that you do not control ) .
In your case , if an attacker managed to get two of your passwords ( say to two different web sites ) then they could simply compare them and determine your super-secret pass phrase that you attach to all your passwords .
Combine that with your list and you 're owned .</tokentext>
<sentencetext>Create a passphrase which you prepend or append to every important password.Bad idea.
You should never use the same password (or part thereof) on two or more systems (that you do not control).
In your case, if an attacker managed to get two of your passwords (say to two different web sites) then they could simply compare them and determine your super-secret pass phrase that you attach to all your passwords.
Combine that with your list and you're owned.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057762</id>
	<title>Re:The most secure place</title>
	<author>pilybaby</author>
	<datestamp>1257070620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The most secure thing to do is to use passwords that you don't even know yourself, by using something like KeePass to generate and manage the passwords for you.  No matter how hard someone beats you up for your passwords you wont be able to tell them because you've never seen or typed them in yourself.  You'll also be able to easily have a completely different and secure password for each site that needs one and not have to worry about your memory.</htmltext>
<tokenext>The most secure thing to do is to use passwords that you do n't even know yourself , by using something like KeePass to generate and manage the passwords for you .
No matter how hard someone beats you up for your passwords you wont be able to tell them because you 've never seen or typed them in yourself .
You 'll also be able to easily have a completely different and secure password for each site that needs one and not have to worry about your memory .</tokentext>
<sentencetext>The most secure thing to do is to use passwords that you don't even know yourself, by using something like KeePass to generate and manage the passwords for you.
No matter how hard someone beats you up for your passwords you wont be able to tell them because you've never seen or typed them in yourself.
You'll also be able to easily have a completely different and secure password for each site that needs one and not have to worry about your memory.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544</id>
	<title>PasswordSafe</title>
	<author>Avenger546</author>
	<datestamp>1257863820000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>5</modscore>
	<htmltext><p>I first saw the link to <a href="http://passwordsafe.sourceforge.net/" title="sourceforge.net" rel="nofollow">PasswordSafe</a> [sourceforge.net] from Bruce Schneier's site. If I have to take advice from someone on keeping something secure, it's Bruce.</p></htmltext>
<tokenext>I first saw the link to PasswordSafe [ sourceforge.net ] from Bruce Schneier 's site .
If I have to take advice from someone on keeping something secure , it 's Bruce .</tokentext>
<sentencetext>I first saw the link to PasswordSafe [sourceforge.net] from Bruce Schneier's site.
If I have to take advice from someone on keeping something secure, it's Bruce.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055006</id>
	<title>Re:Keepass</title>
	<author>Anonymous</author>
	<datestamp>1257865980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I second (third? fourth?) this. KeePass is awesome. I've used both the Windows and Linux (KeePassX) versions, both work fine, I recommend it to everyone I know, and I couldn't live without it.</p><p>Just make sure you don't lose your master password<nobr> <wbr></nobr>;)</p></htmltext>
<tokenext>I second ( third ?
fourth ? ) this .
KeePass is awesome .
I 've used both the Windows and Linux ( KeePassX ) versions , both work fine , I recommend it to everyone I know , and I could n't live without it.Just make sure you do n't lose your master password ; )</tokentext>
<sentencetext>I second (third?
fourth?) this.
KeePass is awesome.
I've used both the Windows and Linux (KeePassX) versions, both work fine, I recommend it to everyone I know, and I couldn't live without it.Just make sure you don't lose your master password ;)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060298</id>
	<title>Now I know how you do it! THX!!</title>
	<author>Anonymous</author>
	<datestamp>1257091260000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Has anyone given thought as to why he is asking this question??</p></htmltext>
<tokenext>Has anyone given thought as to why he is asking this question ?
?</tokentext>
<sentencetext>Has anyone given thought as to why he is asking this question?
?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061092</id>
	<title>Re:paper in your wallet</title>
	<author>Anonymous</author>
	<datestamp>1257094680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>"So, make your passwords random, different for each thing that requires a password, and write it down on a cheat sheet. Guard that sheet like you would your credit cards. If your wallet is lost, immediately set all your passwords to something temporary then build a new password list all over again."</p><p>Uhhhh...I could be missing something, but, if the reason for the piece of paper is to help you remember your passwords, and your wallet is stolen with the piece of paper, exactly how are you supposed to "immediately set all yoru passwords to something temporary?"  If someone could remember them, they wouldn't need the piece of paper.  I suppose you could keep a copy at home, but this wasn't mentioned in the solution--so I'm just pointing it out for those of us with leaky brains.</p></htmltext>
<tokenext>" So , make your passwords random , different for each thing that requires a password , and write it down on a cheat sheet .
Guard that sheet like you would your credit cards .
If your wallet is lost , immediately set all your passwords to something temporary then build a new password list all over again .
" Uhhhh...I could be missing something , but , if the reason for the piece of paper is to help you remember your passwords , and your wallet is stolen with the piece of paper , exactly how are you supposed to " immediately set all yoru passwords to something temporary ?
" If someone could remember them , they would n't need the piece of paper .
I suppose you could keep a copy at home , but this was n't mentioned in the solution--so I 'm just pointing it out for those of us with leaky brains .</tokentext>
<sentencetext>"So, make your passwords random, different for each thing that requires a password, and write it down on a cheat sheet.
Guard that sheet like you would your credit cards.
If your wallet is lost, immediately set all your passwords to something temporary then build a new password list all over again.
"Uhhhh...I could be missing something, but, if the reason for the piece of paper is to help you remember your passwords, and your wallet is stolen with the piece of paper, exactly how are you supposed to "immediately set all yoru passwords to something temporary?
"  If someone could remember them, they wouldn't need the piece of paper.
I suppose you could keep a copy at home, but this wasn't mentioned in the solution--so I'm just pointing it out for those of us with leaky brains.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054680</id>
	<title>Use a formula</title>
	<author>Anonymous</author>
	<datestamp>1257864300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use a memorized formula that does not change, but continuously generates new passwords as time goes on.  That way my password is based on the time it was created, and another memorized section.</p></htmltext>
<tokenext>I use a memorized formula that does not change , but continuously generates new passwords as time goes on .
That way my password is based on the time it was created , and another memorized section .</tokentext>
<sentencetext>I use a memorized formula that does not change, but continuously generates new passwords as time goes on.
That way my password is based on the time it was created, and another memorized section.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055238</id>
	<title>Sticky notes...</title>
	<author>angry tapir</author>
	<datestamp>1257867240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>are all you need</htmltext>
<tokenext>are all you need</tokentext>
<sentencetext>are all you need</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</id>
	<title>Re:paper in your wallet</title>
	<author>Anonymous</author>
	<datestamp>1257865020000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>I agree.</p><p>100\% security is impossible. Any data you transmit or store on a physical device can be recovered, regardless of encryption. All you can do is make it more costly to recover that data -- the best security makes it more expensive than it is worth.</p><p>Given that's true, then all security is a tradeoff. Storing passwords on a piece of paper in your wallet is actually very secure for the majority of people, more secure than you can really hope for without going to extreme lengths.</p><p>If you have communications or data that are so sensitive that you really have to go to extreme lengths to protect it, then you need the help of a security professional, not encryption and advice on password management.</p><p>So, make your passwords random, different for each thing that requires a password, and write it down on a cheat sheet. Guard that sheet like you would your credit cards. If your wallet is lost, immediately set all your passwords to something temporary then build a new password list all over again.</p></htmltext>
<tokenext>I agree.100 \ % security is impossible .
Any data you transmit or store on a physical device can be recovered , regardless of encryption .
All you can do is make it more costly to recover that data -- the best security makes it more expensive than it is worth.Given that 's true , then all security is a tradeoff .
Storing passwords on a piece of paper in your wallet is actually very secure for the majority of people , more secure than you can really hope for without going to extreme lengths.If you have communications or data that are so sensitive that you really have to go to extreme lengths to protect it , then you need the help of a security professional , not encryption and advice on password management.So , make your passwords random , different for each thing that requires a password , and write it down on a cheat sheet .
Guard that sheet like you would your credit cards .
If your wallet is lost , immediately set all your passwords to something temporary then build a new password list all over again .</tokentext>
<sentencetext>I agree.100\% security is impossible.
Any data you transmit or store on a physical device can be recovered, regardless of encryption.
All you can do is make it more costly to recover that data -- the best security makes it more expensive than it is worth.Given that's true, then all security is a tradeoff.
Storing passwords on a piece of paper in your wallet is actually very secure for the majority of people, more secure than you can really hope for without going to extreme lengths.If you have communications or data that are so sensitive that you really have to go to extreme lengths to protect it, then you need the help of a security professional, not encryption and advice on password management.So, make your passwords random, different for each thing that requires a password, and write it down on a cheat sheet.
Guard that sheet like you would your credit cards.
If your wallet is lost, immediately set all your passwords to something temporary then build a new password list all over again.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057654</id>
	<title>Re:Password Safe</title>
	<author>Anonymous</author>
	<datestamp>1257069180000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Best Tool is http://keepass.info/</p></htmltext>
<tokenext>Best Tool is http : //keepass.info/</tokentext>
<sentencetext>Best Tool is http://keepass.info/</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054660</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064290</id>
	<title>Mandylion Password Manager</title>
	<author>Anonymous</author>
	<datestamp>1257107160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>The mandylion password manager seems like a pretty nifty tool.  It's a key fob device which can both generate, and store up to 50 sets of login usernames and passwords.  It meets DoD\Military specs for a password generation\storage device and can even be set to scuttle after a number of login failures (this is optional of course).  Thinkgeek sells them, but is currently out of stock. http://www.thinkgeek.com/gadgets/security/91a2/</p></htmltext>
<tokenext>The mandylion password manager seems like a pretty nifty tool .
It 's a key fob device which can both generate , and store up to 50 sets of login usernames and passwords .
It meets DoD \ Military specs for a password generation \ storage device and can even be set to scuttle after a number of login failures ( this is optional of course ) .
Thinkgeek sells them , but is currently out of stock .
http : //www.thinkgeek.com/gadgets/security/91a2/</tokentext>
<sentencetext>The mandylion password manager seems like a pretty nifty tool.
It's a key fob device which can both generate, and store up to 50 sets of login usernames and passwords.
It meets DoD\Military specs for a password generation\storage device and can even be set to scuttle after a number of login failures (this is optional of course).
Thinkgeek sells them, but is currently out of stock.
http://www.thinkgeek.com/gadgets/security/91a2/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055108</id>
	<title>SplashID (AES &amp; Blowfish) on my Cellphone</title>
	<author>Anonymous</author>
	<datestamp>1257866580000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>I keep my passwords encrypted on my cellphone, backed up on my PC.</p></htmltext>
<tokenext>I keep my passwords encrypted on my cellphone , backed up on my PC .</tokentext>
<sentencetext>I keep my passwords encrypted on my cellphone, backed up on my PC.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055774</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>not-my-real-name</author>
	<datestamp>1257870780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Well, just put a bunch of post-its on your monitor each with some piece of random stuff on it, old phone numbers, names, random words, dates, whatever.</p></htmltext>
<tokenext>Well , just put a bunch of post-its on your monitor each with some piece of random stuff on it , old phone numbers , names , random words , dates , whatever .</tokentext>
<sentencetext>Well, just put a bunch of post-its on your monitor each with some piece of random stuff on it, old phone numbers, names, random words, dates, whatever.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054992</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055260</id>
	<title>Phone numbers</title>
	<author>Anonymous</author>
	<datestamp>1257867360000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Have the body of the password as a numerical string, write this string down in notepad but precede it with phone numbers that your remember from your childhood. Hardly anyone remembers numbers now but old numbers of schoolmates stick in my mind for some reason. If the file gets "found" then only you would know where the numbers stop and start, especially if you omit area codes.</p></htmltext>
<tokenext>Have the body of the password as a numerical string , write this string down in notepad but precede it with phone numbers that your remember from your childhood .
Hardly anyone remembers numbers now but old numbers of schoolmates stick in my mind for some reason .
If the file gets " found " then only you would know where the numbers stop and start , especially if you omit area codes .</tokentext>
<sentencetext>Have the body of the password as a numerical string, write this string down in notepad but precede it with phone numbers that your remember from your childhood.
Hardly anyone remembers numbers now but old numbers of schoolmates stick in my mind for some reason.
If the file gets "found" then only you would know where the numbers stop and start, especially if you omit area codes.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30074548</id>
	<title>password gorilla</title>
	<author>Anonymous</author>
	<datestamp>1258049160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I love this tool. I've used it for 6 years now. It is still actively developed and is fully cross platform (anything that will use tclkit). http://www.fpx.de/fp/Software/Gorilla/</p></htmltext>
<tokenext>I love this tool .
I 've used it for 6 years now .
It is still actively developed and is fully cross platform ( anything that will use tclkit ) .
http : //www.fpx.de/fp/Software/Gorilla/</tokentext>
<sentencetext>I love this tool.
I've used it for 6 years now.
It is still actively developed and is fully cross platform (anything that will use tclkit).
http://www.fpx.de/fp/Software/Gorilla/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055130</id>
	<title>Re:Truecrypt</title>
	<author>Darinbob</author>
	<datestamp>1257866640000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>I do this also.  I don't have a laptop I carry around, so I just have a USB storage lying on my desk with the passwords.  Probably safer to put in a file drawer I suppose.<br><br>I also have a copy of less important passwords at work, such as vendor support sites.  This is stored in a secure drive partition on a Mac, and the password for that is in my wallet if I forget it.  There aren't any vital passwords on it, so I'm not too concerned about how secure this is (if I start making intelligent posts on slashdot, then you'll know it's been compromised).<br><br>In some sense, just losing the "nomad" lifestyle helps.  Do you really need to have the password for your bank account on your laptop, so that you can do some banking while waiting for your lunch order?  Probably not, so leave that password at home.  If it's something you don't want compromised, then see if you can get away with not having that password with you.  Even if it means you may have to wait until you get home to remember what the password is.  If you have to have it on the road (say your frequent flyer club access) then a piece of paper in your wallet could work, but be sure it's not the same password as something important.</htmltext>
<tokenext>I do this also .
I do n't have a laptop I carry around , so I just have a USB storage lying on my desk with the passwords .
Probably safer to put in a file drawer I suppose.I also have a copy of less important passwords at work , such as vendor support sites .
This is stored in a secure drive partition on a Mac , and the password for that is in my wallet if I forget it .
There are n't any vital passwords on it , so I 'm not too concerned about how secure this is ( if I start making intelligent posts on slashdot , then you 'll know it 's been compromised ) .In some sense , just losing the " nomad " lifestyle helps .
Do you really need to have the password for your bank account on your laptop , so that you can do some banking while waiting for your lunch order ?
Probably not , so leave that password at home .
If it 's something you do n't want compromised , then see if you can get away with not having that password with you .
Even if it means you may have to wait until you get home to remember what the password is .
If you have to have it on the road ( say your frequent flyer club access ) then a piece of paper in your wallet could work , but be sure it 's not the same password as something important .</tokentext>
<sentencetext>I do this also.
I don't have a laptop I carry around, so I just have a USB storage lying on my desk with the passwords.
Probably safer to put in a file drawer I suppose.I also have a copy of less important passwords at work, such as vendor support sites.
This is stored in a secure drive partition on a Mac, and the password for that is in my wallet if I forget it.
There aren't any vital passwords on it, so I'm not too concerned about how secure this is (if I start making intelligent posts on slashdot, then you'll know it's been compromised).In some sense, just losing the "nomad" lifestyle helps.
Do you really need to have the password for your bank account on your laptop, so that you can do some banking while waiting for your lunch order?
Probably not, so leave that password at home.
If it's something you don't want compromised, then see if you can get away with not having that password with you.
Even if it means you may have to wait until you get home to remember what the password is.
If you have to have it on the road (say your frequent flyer club access) then a piece of paper in your wallet could work, but be sure it's not the same password as something important.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055938</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>RKThoadan</author>
	<datestamp>1257871860000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>I used to do something like this, but as companies buy each other out, rebrand parts of themselves and other such shenanigans the website name and URL tend to change.  This can get confusing.</p></htmltext>
<tokenext>I used to do something like this , but as companies buy each other out , rebrand parts of themselves and other such shenanigans the website name and URL tend to change .
This can get confusing .</tokentext>
<sentencetext>I used to do something like this, but as companies buy each other out, rebrand parts of themselves and other such shenanigans the website name and URL tend to change.
This can get confusing.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054640</id>
	<title>Write your own</title>
	<author>Anonymous</author>
	<datestamp>1257864180000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>I wrote my own password generator in vb.net. I'm sure it's not as random as it could be, but I think it's good enough.</p></htmltext>
<tokenext>I wrote my own password generator in vb.net .
I 'm sure it 's not as random as it could be , but I think it 's good enough .</tokentext>
<sentencetext>I wrote my own password generator in vb.net.
I'm sure it's not as random as it could be, but I think it's good enough.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30099122</id>
	<title>Re:1password</title>
	<author>o'davy</author>
	<datestamp>1258225140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Because 1Password has a strong password generator and an improved keychain format which works better when syncing to services like Mobile Me or Drop.io (or just about anywhere else). There is also an iPhone app that syncs as well. As long as you have your phone, you have your passwords. The real upside is having a unique, strong password for each site, so even if one does get compromised, the attacker only has access to that one site and has no real chance of guessing any of your other passwords.</htmltext>
<tokenext>Because 1Password has a strong password generator and an improved keychain format which works better when syncing to services like Mobile Me or Drop.io ( or just about anywhere else ) .
There is also an iPhone app that syncs as well .
As long as you have your phone , you have your passwords .
The real upside is having a unique , strong password for each site , so even if one does get compromised , the attacker only has access to that one site and has no real chance of guessing any of your other passwords .</tokentext>
<sentencetext>Because 1Password has a strong password generator and an improved keychain format which works better when syncing to services like Mobile Me or Drop.io (or just about anywhere else).
There is also an iPhone app that syncs as well.
As long as you have your phone, you have your passwords.
The real upside is having a unique, strong password for each site, so even if one does get compromised, the attacker only has access to that one site and has no real chance of guessing any of your other passwords.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055386</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055780</id>
	<title>Re:Prepended or Appended Passphrase</title>
	<author>Anonymous</author>
	<datestamp>1257870780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>The best tip I ever heard was to think up a phrase that you'll always remember.  The author who wrote it used lyrics from Ice Ice Baby;</p><p>"To the extreme I rock the mic like a vandal"</p><p>At the beginning or end of the password, put an acronym for the site.  So, for Facebook his password suggestion was "fbtteIrtmlav".  Total gibberish to anyone who manages to crack it, and it's unique for every site you use.</p></htmltext>
<tokenext>The best tip I ever heard was to think up a phrase that you 'll always remember .
The author who wrote it used lyrics from Ice Ice Baby ; " To the extreme I rock the mic like a vandal " At the beginning or end of the password , put an acronym for the site .
So , for Facebook his password suggestion was " fbtteIrtmlav " .
Total gibberish to anyone who manages to crack it , and it 's unique for every site you use .</tokentext>
<sentencetext>The best tip I ever heard was to think up a phrase that you'll always remember.
The author who wrote it used lyrics from Ice Ice Baby;"To the extreme I rock the mic like a vandal"At the beginning or end of the password, put an acronym for the site.
So, for Facebook his password suggestion was "fbtteIrtmlav".
Total gibberish to anyone who manages to crack it, and it's unique for every site you use.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055022</id>
	<title>Re:Simple</title>
	<author>Anonymous</author>
	<datestamp>1257866100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>that's the kind of thing an idiot would have on his luggage.</p></htmltext>
<tokenext>that 's the kind of thing an idiot would have on his luggage .</tokentext>
<sentencetext>that's the kind of thing an idiot would have on his luggage.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057532</id>
	<title>...and KeePassX for Linux</title>
	<author>mikewilsonuk</author>
	<datestamp>1257067800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>As already noted, KeePass is great for Windows. There is also KeePassX for Linux which uses the same file format, so you can move the password database around easily if you use both operating systems.</htmltext>
<tokenext>As already noted , KeePass is great for Windows .
There is also KeePassX for Linux which uses the same file format , so you can move the password database around easily if you use both operating systems .</tokentext>
<sentencetext>As already noted, KeePass is great for Windows.
There is also KeePassX for Linux which uses the same file format, so you can move the password database around easily if you use both operating systems.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059240</id>
	<title>7z or so</title>
	<author>Bashr</author>
	<datestamp>1257086220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I try to remember them all, but if I had to store my passwords, I would make a text file, and store it into an encrypted 7z compressed file (AES 256, maybe it's weak). Of course, you would need a master password.

<br> - 7z doesn't need install, so you can put it on a USB stick with your pass file, if you want to carry it.
<br> - 7z is cross platform

<br> 7z or anything with that kind of features and easyness.</htmltext>
<tokenext>I try to remember them all , but if I had to store my passwords , I would make a text file , and store it into an encrypted 7z compressed file ( AES 256 , maybe it 's weak ) .
Of course , you would need a master password .
- 7z does n't need install , so you can put it on a USB stick with your pass file , if you want to carry it .
- 7z is cross platform 7z or anything with that kind of features and easyness .</tokentext>
<sentencetext>I try to remember them all, but if I had to store my passwords, I would make a text file, and store it into an encrypted 7z compressed file (AES 256, maybe it's weak).
Of course, you would need a master password.
- 7z doesn't need install, so you can put it on a USB stick with your pass file, if you want to carry it.
- 7z is cross platform

 7z or anything with that kind of features and easyness.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064606</id>
	<title>Roboform Rocks</title>
	<author>GalubJamun</author>
	<datestamp>1257108360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I also put a vote in for Roboform, I use it all over the place.  Now that they have the server based sync it especially rocks!</htmltext>
<tokenext>I also put a vote in for Roboform , I use it all over the place .
Now that they have the server based sync it especially rocks !</tokentext>
<sentencetext>I also put a vote in for Roboform, I use it all over the place.
Now that they have the server based sync it especially rocks!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062628</id>
	<title>A small TrueCrypt drive can hold passwords</title>
	<author>MojoSF</author>
	<datestamp>1257101100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>What I've done is make a small TrueCrypt drive, and redirect Firefox to use that for its local data. It will store the cache and my passwords on that drive, thus keeping my passwords hidden without first entering the TrueCrypt password.</p><p>Find Firefox's profiles.ini file in your local application data directory.</p><p>Downside: you have to give TrueCrypt a password whenever you startup, and Firefox won't boot at all if the TrueCrypt drive isn't mounted. The error message is misleading too, "Firefox is already running<nobr> <wbr></nobr>..." (fail!)</p><p>Bonus: the pr0n downloads in your cache are encrypted too.</p></htmltext>
<tokenext>What I 've done is make a small TrueCrypt drive , and redirect Firefox to use that for its local data .
It will store the cache and my passwords on that drive , thus keeping my passwords hidden without first entering the TrueCrypt password.Find Firefox 's profiles.ini file in your local application data directory.Downside : you have to give TrueCrypt a password whenever you startup , and Firefox wo n't boot at all if the TrueCrypt drive is n't mounted .
The error message is misleading too , " Firefox is already running ... " ( fail !
) Bonus : the pr0n downloads in your cache are encrypted too .</tokentext>
<sentencetext>What I've done is make a small TrueCrypt drive, and redirect Firefox to use that for its local data.
It will store the cache and my passwords on that drive, thus keeping my passwords hidden without first entering the TrueCrypt password.Find Firefox's profiles.ini file in your local application data directory.Downside: you have to give TrueCrypt a password whenever you startup, and Firefox won't boot at all if the TrueCrypt drive isn't mounted.
The error message is misleading too, "Firefox is already running ..." (fail!
)Bonus: the pr0n downloads in your cache are encrypted too.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059334</id>
	<title>Re:PasswordSafe</title>
	<author>Anonymous</author>
	<datestamp>1257087000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I absolutely agree, we've been using PWSafe for some time now and it's a great mix of security and features.</p><p>The only catch is where/how do you store the password for the safe?</p><p>Chicken...meet egg.</p></htmltext>
<tokenext>I absolutely agree , we 've been using PWSafe for some time now and it 's a great mix of security and features.The only catch is where/how do you store the password for the safe ? Chicken...meet egg .</tokentext>
<sentencetext>I absolutely agree, we've been using PWSafe for some time now and it's a great mix of security and features.The only catch is where/how do you store the password for the safe?Chicken...meet egg.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30070428</id>
	<title>Use two-factor authentication</title>
	<author>Anonymous</author>
	<datestamp>1258020120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Think of a password you can easily remember. The password should have upper and lower cases, numbers and punctuation in it. Do not store or write down the password. In addition use a variable password generated by a security token. This token can be easily carried on a key chain. The result is: a static password + a variable password.</p><p>The same thing can easily be achieved with SSH; generate a key pair, put your private key on a USB drive and use a long / complex password to protect it.</p></htmltext>
<tokenext>Think of a password you can easily remember .
The password should have upper and lower cases , numbers and punctuation in it .
Do not store or write down the password .
In addition use a variable password generated by a security token .
This token can be easily carried on a key chain .
The result is : a static password + a variable password.The same thing can easily be achieved with SSH ; generate a key pair , put your private key on a USB drive and use a long / complex password to protect it .</tokentext>
<sentencetext>Think of a password you can easily remember.
The password should have upper and lower cases, numbers and punctuation in it.
Do not store or write down the password.
In addition use a variable password generated by a security token.
This token can be easily carried on a key chain.
The result is: a static password + a variable password.The same thing can easily be achieved with SSH; generate a key pair, put your private key on a USB drive and use a long / complex password to protect it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055766</id>
	<title>1Password or just hints</title>
	<author>MidnightBrewer</author>
	<datestamp>1257870660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>In addition to recommending 1Password for the Mac, another solution I used for a long time was a list of sites, login names and password hints (you could even have your login name as a login hint, if you wanted). This meant that even in an unencrypted plaintext file, there's no information there that will really make sense to anyone else. I also don't typically use more than three passwords, and I have my own mental rating system as to when each password is appropriate to use, meaning that knowing one of them isn't going to give access to everything.</p></htmltext>
<tokenext>In addition to recommending 1Password for the Mac , another solution I used for a long time was a list of sites , login names and password hints ( you could even have your login name as a login hint , if you wanted ) .
This meant that even in an unencrypted plaintext file , there 's no information there that will really make sense to anyone else .
I also do n't typically use more than three passwords , and I have my own mental rating system as to when each password is appropriate to use , meaning that knowing one of them is n't going to give access to everything .</tokentext>
<sentencetext>In addition to recommending 1Password for the Mac, another solution I used for a long time was a list of sites, login names and password hints (you could even have your login name as a login hint, if you wanted).
This meant that even in an unencrypted plaintext file, there's no information there that will really make sense to anyone else.
I also don't typically use more than three passwords, and I have my own mental rating system as to when each password is appropriate to use, meaning that knowing one of them isn't going to give access to everything.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30070156</id>
	<title>Re:paper in your wallet</title>
	<author>Jared555</author>
	<datestamp>1258059300000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>100\% security is possible if you have physical control of a device and want to make sure that nobody ever gets access to it again.  (Turning the device into a fine powder and then either melting it down or distributing it across a very large area).... I believe at one point at least that is how the government handled things.</p><p>Storing a backup version of your data that you do not need frequent access to on the other hand is possible to get 99.999\% secure but as you increase the security level you also frequently increase the chances of complete data loss because you lost part or all of the key.</p></htmltext>
<tokenext>100 \ % security is possible if you have physical control of a device and want to make sure that nobody ever gets access to it again .
( Turning the device into a fine powder and then either melting it down or distributing it across a very large area ) .... I believe at one point at least that is how the government handled things.Storing a backup version of your data that you do not need frequent access to on the other hand is possible to get 99.999 \ % secure but as you increase the security level you also frequently increase the chances of complete data loss because you lost part or all of the key .</tokentext>
<sentencetext>100\% security is possible if you have physical control of a device and want to make sure that nobody ever gets access to it again.
(Turning the device into a fine powder and then either melting it down or distributing it across a very large area).... I believe at one point at least that is how the government handled things.Storing a backup version of your data that you do not need frequent access to on the other hand is possible to get 99.999\% secure but as you increase the security level you also frequently increase the chances of complete data loss because you lost part or all of the key.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30069978</id>
	<title>Secure Data Manager</title>
	<author>Anonymous</author>
	<datestamp>1257105300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use this one, http://sdm.sourceforge.net/</p><p>Written in Java, Open Source and light weigh.</p></htmltext>
<tokenext>I use this one , http : //sdm.sourceforge.net/Written in Java , Open Source and light weigh .</tokentext>
<sentencetext>I use this one, http://sdm.sourceforge.net/Written in Java, Open Source and light weigh.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056962</id>
	<title>Re:supergenpass ?</title>
	<author>AigariusDebian</author>
	<datestamp>1257881820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Using <a href="http://supergenpass.com/" title="supergenpass.com">SuperGenPass</a> [supergenpass.com] for most of my online passwords. The only problem I have is that it is a pain to use it in Google Chrome (no bookmark toolbar with bookmarklet support), but for IE, Firefox, Safari, Opera and all browsers like them it is perfectly fine. When there is no support, one can use the 'mobile' version. You can even save it to your hard drive as a file.</p><p>The best thing about it is that no password is ever stored - it is always generated on the fly from your master password and the domain name of the web site. And that also means that there is no password database to move around.</p></htmltext>
<tokenext>Using SuperGenPass [ supergenpass.com ] for most of my online passwords .
The only problem I have is that it is a pain to use it in Google Chrome ( no bookmark toolbar with bookmarklet support ) , but for IE , Firefox , Safari , Opera and all browsers like them it is perfectly fine .
When there is no support , one can use the 'mobile ' version .
You can even save it to your hard drive as a file.The best thing about it is that no password is ever stored - it is always generated on the fly from your master password and the domain name of the web site .
And that also means that there is no password database to move around .</tokentext>
<sentencetext>Using SuperGenPass [supergenpass.com] for most of my online passwords.
The only problem I have is that it is a pain to use it in Google Chrome (no bookmark toolbar with bookmarklet support), but for IE, Firefox, Safari, Opera and all browsers like them it is perfectly fine.
When there is no support, one can use the 'mobile' version.
You can even save it to your hard drive as a file.The best thing about it is that no password is ever stored - it is always generated on the fly from your master password and the domain name of the web site.
And that also means that there is no password database to move around.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054646</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30068164</id>
	<title>Re: How I remember passes</title>
	<author>Anonymous</author>
	<datestamp>1257084480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>2 methods; dead simple and non technical.</p><p>1.  The 6-7 passwords I actively use are based on things I can see when I'm at my computer, but have no context whatsoever for anyone else.  For example, greentile might refer to the tiling in my kitchen.  Forget the password, look around and it comes back to me.  Can be modified if you're usually w/your laptop away from the house.  Use some unusual label on your laptop, or redlight for the little red light on your laptop power transformer.   Right in front of you, but again no recognizable context for anyone except you.</p><p>2.  Disposable passwords.  For the other 99 pw's that get used maybe once a year (airline freq flier etc) they're all disposable.  I just request a new one on the rare occasion I need to access their site.  No paper trail, no context w the rest of my life, nothing to record or remember</p></htmltext>
<tokenext>2 methods ; dead simple and non technical.1 .
The 6-7 passwords I actively use are based on things I can see when I 'm at my computer , but have no context whatsoever for anyone else .
For example , greentile might refer to the tiling in my kitchen .
Forget the password , look around and it comes back to me .
Can be modified if you 're usually w/your laptop away from the house .
Use some unusual label on your laptop , or redlight for the little red light on your laptop power transformer .
Right in front of you , but again no recognizable context for anyone except you.2 .
Disposable passwords .
For the other 99 pw 's that get used maybe once a year ( airline freq flier etc ) they 're all disposable .
I just request a new one on the rare occasion I need to access their site .
No paper trail , no context w the rest of my life , nothing to record or remember</tokentext>
<sentencetext>2 methods; dead simple and non technical.1.
The 6-7 passwords I actively use are based on things I can see when I'm at my computer, but have no context whatsoever for anyone else.
For example, greentile might refer to the tiling in my kitchen.
Forget the password, look around and it comes back to me.
Can be modified if you're usually w/your laptop away from the house.
Use some unusual label on your laptop, or redlight for the little red light on your laptop power transformer.
Right in front of you, but again no recognizable context for anyone except you.2.
Disposable passwords.
For the other 99 pw's that get used maybe once a year (airline freq flier etc) they're all disposable.
I just request a new one on the rare occasion I need to access their site.
No paper trail, no context w the rest of my life, nothing to record or remember</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062412</id>
	<title>PwdHash</title>
	<author>gphilip</author>
	<datestamp>1257099960000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><a href="https://www.pwdhash.com/" title="pwdhash.com" rel="nofollow">https://www.pwdhash.com/</a> [pwdhash.com]
<br> <br>
Available in three ways:
<ol>
  <li> Online at the above address -- works with any browser that supports JavaScript.</li><li> As a plugin for FireFox (and beta plugins for other browsers): Press F2 or type @@ at the beginning of a text field for the plugin to kick in.</li><li> As a webpage (the one at <a href="https://www.pwdhash.com/" title="pwdhash.com" rel="nofollow">https://www.pwdhash.com/</a> [pwdhash.com] )with JavaScript code that you can store on disk and open in any browser.</li></ol><p>
Constructs a one-way hash of
</p><ol>
  <li>the password entered in a password (or other text) field, and </li><li> the domain name of the site where the password is used (both these can be entered manually in methods 1 and 3) </li></ol><p>
to get a domain-specific password.

Memorize one strong password and use this utility to get distinct passwords for each domain. The generated passwords are (usually) complicated enough to pass any conceivable non-triviality test.</p></htmltext>
<tokenext>https : //www.pwdhash.com/ [ pwdhash.com ] Available in three ways : Online at the above address -- works with any browser that supports JavaScript .
As a plugin for FireFox ( and beta plugins for other browsers ) : Press F2 or type @ @ at the beginning of a text field for the plugin to kick in .
As a webpage ( the one at https : //www.pwdhash.com/ [ pwdhash.com ] ) with JavaScript code that you can store on disk and open in any browser .
Constructs a one-way hash of the password entered in a password ( or other text ) field , and the domain name of the site where the password is used ( both these can be entered manually in methods 1 and 3 ) to get a domain-specific password .
Memorize one strong password and use this utility to get distinct passwords for each domain .
The generated passwords are ( usually ) complicated enough to pass any conceivable non-triviality test .</tokentext>
<sentencetext>https://www.pwdhash.com/ [pwdhash.com]
 
Available in three ways:

   Online at the above address -- works with any browser that supports JavaScript.
As a plugin for FireFox (and beta plugins for other browsers): Press F2 or type @@ at the beginning of a text field for the plugin to kick in.
As a webpage (the one at https://www.pwdhash.com/ [pwdhash.com] )with JavaScript code that you can store on disk and open in any browser.
Constructs a one-way hash of

  the password entered in a password (or other text) field, and  the domain name of the site where the password is used (both these can be entered manually in methods 1 and 3) 
to get a domain-specific password.
Memorize one strong password and use this utility to get distinct passwords for each domain.
The generated passwords are (usually) complicated enough to pass any conceivable non-triviality test.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062968</id>
	<title>IronKey Identity Manager</title>
	<author>Anonymous</author>
	<datestamp>1257102540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>IronKey makes a very useful encrypted flash drive, that includes a password management tool called "Identity Manager".</p><p>The Identity Manager is password management tool which saves and autofills your account user names and passwords.  It also includes helpful features such as a virtual keyboard, password generation, etc.  One-time passwords can also be generated using VeriSigns VIP Service.  This is great for locking down your eBay and PayPal accounts with 2-factor authentication.</p><p>In case you lose your IronKey, there is online backup that you can do, that enables you to restore your account information to a new IronKey.</p><p>You will (of course) still need to remember the password to your IronKey.</p><p>Full disclosure: Yes, I work for IronKey.</p></htmltext>
<tokenext>IronKey makes a very useful encrypted flash drive , that includes a password management tool called " Identity Manager " .The Identity Manager is password management tool which saves and autofills your account user names and passwords .
It also includes helpful features such as a virtual keyboard , password generation , etc .
One-time passwords can also be generated using VeriSigns VIP Service .
This is great for locking down your eBay and PayPal accounts with 2-factor authentication.In case you lose your IronKey , there is online backup that you can do , that enables you to restore your account information to a new IronKey.You will ( of course ) still need to remember the password to your IronKey.Full disclosure : Yes , I work for IronKey .</tokentext>
<sentencetext>IronKey makes a very useful encrypted flash drive, that includes a password management tool called "Identity Manager".The Identity Manager is password management tool which saves and autofills your account user names and passwords.
It also includes helpful features such as a virtual keyboard, password generation, etc.
One-time passwords can also be generated using VeriSigns VIP Service.
This is great for locking down your eBay and PayPal accounts with 2-factor authentication.In case you lose your IronKey, there is online backup that you can do, that enables you to restore your account information to a new IronKey.You will (of course) still need to remember the password to your IronKey.Full disclosure: Yes, I work for IronKey.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059052</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>corbettw</author>
	<datestamp>1257084900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Dude, did you just share your Slashdot password on Slashdot itself?</p></htmltext>
<tokenext>Dude , did you just share your Slashdot password on Slashdot itself ?</tokentext>
<sentencetext>Dude, did you just share your Slashdot password on Slashdot itself?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986</id>
	<title>Re:Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257865920000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>Why make them mount a Truecrypt volume and search through text files? KeePass gives you an encrypted searchable password database that's much easier to use: While it's running, click the system tray icon, type in your password and your passwords are listed and searchable. When you're done, minimize it back to the tray and it's locked again.</htmltext>
<tokenext>Why make them mount a Truecrypt volume and search through text files ?
KeePass gives you an encrypted searchable password database that 's much easier to use : While it 's running , click the system tray icon , type in your password and your passwords are listed and searchable .
When you 're done , minimize it back to the tray and it 's locked again .</tokentext>
<sentencetext>Why make them mount a Truecrypt volume and search through text files?
KeePass gives you an encrypted searchable password database that's much easier to use: While it's running, click the system tray icon, type in your password and your passwords are listed and searchable.
When you're done, minimize it back to the tray and it's locked again.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061290</id>
	<title>LastPass</title>
	<author>macinnisrr</author>
	<datestamp>1257095580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use lastpass. They have online sync plugins for firefox, chrome, ie, and safari, as well as a downloadable tool similar to keepassx. All you have to do is remember this one password, and it keeps track of all the others. very handy. Plus, if you do use the online sync tool (i.e. if you're not afraid of having your passwords on some other company's machine), you can always log in at their site to retrieve passwords if you're on a computer that can't download the plugin.</htmltext>
<tokenext>I use lastpass .
They have online sync plugins for firefox , chrome , ie , and safari , as well as a downloadable tool similar to keepassx .
All you have to do is remember this one password , and it keeps track of all the others .
very handy .
Plus , if you do use the online sync tool ( i.e .
if you 're not afraid of having your passwords on some other company 's machine ) , you can always log in at their site to retrieve passwords if you 're on a computer that ca n't download the plugin .</tokentext>
<sentencetext>I use lastpass.
They have online sync plugins for firefox, chrome, ie, and safari, as well as a downloadable tool similar to keepassx.
All you have to do is remember this one password, and it keeps track of all the others.
very handy.
Plus, if you do use the online sync tool (i.e.
if you're not afraid of having your passwords on some other company's machine), you can always log in at their site to retrieve passwords if you're on a computer that can't download the plugin.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055954</id>
	<title>1Password</title>
	<author>forand</author>
	<datestamp>1257871980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If you are on a Mac 1Password is a wonderful app. It provides very similar functionality to the already mentioned Keepass but was much more stable and has an iPhone app. I also found it very frustrating that the various incarnations of Keepass kept changing formats and the like. 1Password, while not free, is well worth the money although you may want to wait for the new version to come out which has some interesting features.
<br>
<a href="http://agilewebsolutions.com/products/1Password" title="agilewebsolutions.com">Their site</a> [agilewebsolutions.com]</htmltext>
<tokenext>If you are on a Mac 1Password is a wonderful app .
It provides very similar functionality to the already mentioned Keepass but was much more stable and has an iPhone app .
I also found it very frustrating that the various incarnations of Keepass kept changing formats and the like .
1Password , while not free , is well worth the money although you may want to wait for the new version to come out which has some interesting features .
Their site [ agilewebsolutions.com ]</tokentext>
<sentencetext>If you are on a Mac 1Password is a wonderful app.
It provides very similar functionality to the already mentioned Keepass but was much more stable and has an iPhone app.
I also found it very frustrating that the various incarnations of Keepass kept changing formats and the like.
1Password, while not free, is well worth the money although you may want to wait for the new version to come out which has some interesting features.
Their site [agilewebsolutions.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054682</id>
	<title>Gringotts</title>
	<author>elwinc</author>
	<datestamp>1257864300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Gringotts used to be goog.  Gringotts saves info in encrypted files.  You still need 1 password to decrypt the file, but you can have copies of the file in multiple places.  See <a href="http://directory.fsf.org/project/gringotts/" title="fsf.org">http://directory.fsf.org/project/gringotts/</a> [fsf.org]</htmltext>
<tokenext>Gringotts used to be goog .
Gringotts saves info in encrypted files .
You still need 1 password to decrypt the file , but you can have copies of the file in multiple places .
See http : //directory.fsf.org/project/gringotts/ [ fsf.org ]</tokentext>
<sentencetext>Gringotts used to be goog.
Gringotts saves info in encrypted files.
You still need 1 password to decrypt the file, but you can have copies of the file in multiple places.
See http://directory.fsf.org/project/gringotts/ [fsf.org]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055658</id>
	<title>Re:KeePass - fantastic software.</title>
	<author>Anonymous</author>
	<datestamp>1257870120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Yep, KeePass rocks. Use it with the KeeForm plugin to have yourself auto-logged-in to nearly any site with just a click of your mouse. KeePass even has an Android port.</p></htmltext>
<tokenext>Yep , KeePass rocks .
Use it with the KeeForm plugin to have yourself auto-logged-in to nearly any site with just a click of your mouse .
KeePass even has an Android port .</tokentext>
<sentencetext>Yep, KeePass rocks.
Use it with the KeeForm plugin to have yourself auto-logged-in to nearly any site with just a click of your mouse.
KeePass even has an Android port.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067734</id>
	<title>Password Tracker Deluxe</title>
	<author>mlippert</author>
	<datestamp>1257081060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I bought a copy of <a href="http://www.clrpc.com/" title="clrpc.com" rel="nofollow">Password Tracker Deluxe</a> [clrpc.com] years ago, and it's been a great tool on Windows, so I wanted to give it a mention.</p><p>I'm currently trying to replace Windows for my daily needs with Linux (I'm currently trying Linux Mint KDE), and so I had to find another option (although it does mostly work under wine).</p><p>What I found was <a href="http://www.keepassx.org/" title="keepassx.org" rel="nofollow">KeePassX</a> [keepassx.org], which has done a pretty good job as a replacement. And because KeePassX is cross-platform, I can access on Windows as well.</p><p>I saw others mentioning KeePassX above, and they mentioned features I haven't even discovered yet.</p></htmltext>
<tokenext>I bought a copy of Password Tracker Deluxe [ clrpc.com ] years ago , and it 's been a great tool on Windows , so I wanted to give it a mention.I 'm currently trying to replace Windows for my daily needs with Linux ( I 'm currently trying Linux Mint KDE ) , and so I had to find another option ( although it does mostly work under wine ) .What I found was KeePassX [ keepassx.org ] , which has done a pretty good job as a replacement .
And because KeePassX is cross-platform , I can access on Windows as well.I saw others mentioning KeePassX above , and they mentioned features I have n't even discovered yet .</tokentext>
<sentencetext>I bought a copy of Password Tracker Deluxe [clrpc.com] years ago, and it's been a great tool on Windows, so I wanted to give it a mention.I'm currently trying to replace Windows for my daily needs with Linux (I'm currently trying Linux Mint KDE), and so I had to find another option (although it does mostly work under wine).What I found was KeePassX [keepassx.org], which has done a pretty good job as a replacement.
And because KeePassX is cross-platform, I can access on Windows as well.I saw others mentioning KeePassX above, and they mentioned features I haven't even discovered yet.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055180</id>
	<title>Hardware Solution</title>
	<author>Alphanos</author>
	<datestamp>1257866940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>"The ideal tool in my mind should be something that is independent of any application, browser, or computer; something that is easily carried, but which if lost poses no risk of compromise. What does the Slashdot crowd like in password tools?"</p><p>It sounds like you're describing this: <a href="http://www.thinkgeek.com/gadgets/security/91a2/" title="thinkgeek.com">Mandylion Password Manager</a> [thinkgeek.com].  ThinkGeek's out of stock at the moment, but you can probably find one elsewhere.</p><p>Less convenient than some options since you can't copy &amp; paste.  On the other hand, more secure since the list of passwords never gets to the PC's RAM.</p></htmltext>
<tokenext>" The ideal tool in my mind should be something that is independent of any application , browser , or computer ; something that is easily carried , but which if lost poses no risk of compromise .
What does the Slashdot crowd like in password tools ?
" It sounds like you 're describing this : Mandylion Password Manager [ thinkgeek.com ] .
ThinkGeek 's out of stock at the moment , but you can probably find one elsewhere.Less convenient than some options since you ca n't copy &amp; paste .
On the other hand , more secure since the list of passwords never gets to the PC 's RAM .</tokentext>
<sentencetext>"The ideal tool in my mind should be something that is independent of any application, browser, or computer; something that is easily carried, but which if lost poses no risk of compromise.
What does the Slashdot crowd like in password tools?
"It sounds like you're describing this: Mandylion Password Manager [thinkgeek.com].
ThinkGeek's out of stock at the moment, but you can probably find one elsewhere.Less convenient than some options since you can't copy &amp; paste.
On the other hand, more secure since the list of passwords never gets to the PC's RAM.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059300</id>
	<title>One word:</title>
	<author>Hurricane78</author>
	<datestamp>1257086700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>BRAAAIIINNSSS! ^^</p><p>Oh you mean <em>outside</em> your head?<br>Very simple: A password!</p><p>Or more exact: A password-protected thing that stores your other passwords. It can really be anything. I use KDEs KWallet.<br>And Firefox's password manager, encrypted and protected by a master-password (which you can set in Firefox's own settings dialog, if you had looked there for even a second!)<br>(Firefox sadly needs a lot of manual scripting hackery to integrate into KWallet).</p><p>But really, anything password-protected and encrypted is good enough. Even a text file. If it's on an encrypted drive on an USB stick.<br>There are tons of possibilities. Use whatever suits your needs best.</p></htmltext>
<tokenext>BRAAAIIINNSSS !
^ ^ Oh you mean outside your head ? Very simple : A password ! Or more exact : A password-protected thing that stores your other passwords .
It can really be anything .
I use KDEs KWallet.And Firefox 's password manager , encrypted and protected by a master-password ( which you can set in Firefox 's own settings dialog , if you had looked there for even a second !
) ( Firefox sadly needs a lot of manual scripting hackery to integrate into KWallet ) .But really , anything password-protected and encrypted is good enough .
Even a text file .
If it 's on an encrypted drive on an USB stick.There are tons of possibilities .
Use whatever suits your needs best .</tokentext>
<sentencetext>BRAAAIIINNSSS!
^^Oh you mean outside your head?Very simple: A password!Or more exact: A password-protected thing that stores your other passwords.
It can really be anything.
I use KDEs KWallet.And Firefox's password manager, encrypted and protected by a master-password (which you can set in Firefox's own settings dialog, if you had looked there for even a second!
)(Firefox sadly needs a lot of manual scripting hackery to integrate into KWallet).But really, anything password-protected and encrypted is good enough.
Even a text file.
If it's on an encrypted drive on an USB stick.There are tons of possibilities.
Use whatever suits your needs best.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30073808</id>
	<title>vim with gpg</title>
	<author>blackjackshellac</author>
	<datestamp>1258046400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I have a text file that I edit with vim that automagically decrypts the file when I view/edit it and re-encrypts it when done.  Very secure, don't have to worry about a single use application going the way of the dodo.</p></htmltext>
<tokenext>I have a text file that I edit with vim that automagically decrypts the file when I view/edit it and re-encrypts it when done .
Very secure , do n't have to worry about a single use application going the way of the dodo .</tokentext>
<sentencetext>I have a text file that I edit with vim that automagically decrypts the file when I view/edit it and re-encrypts it when done.
Very secure, don't have to worry about a single use application going the way of the dodo.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056198</id>
	<title>Re:Use the master password feature and stop worryi</title>
	<author>chilbert</author>
	<datestamp>1257874200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Master password does not protect you from malicious Firefox plugins stealing passwords stored under Master Password, so it shouldn't be used for access to any sensitive information.</htmltext>
<tokenext>Master password does not protect you from malicious Firefox plugins stealing passwords stored under Master Password , so it should n't be used for access to any sensitive information .</tokentext>
<sentencetext>Master password does not protect you from malicious Firefox plugins stealing passwords stored under Master Password, so it shouldn't be used for access to any sensitive information.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056312</id>
	<title>Re:KeePass - fantastic software.</title>
	<author>Anonymous</author>
	<datestamp>1257875400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>&gt; Don't use Firefox's password storage! They are all stored in plain text! Anyone can view them!!</p><p>Really? What version of Firefox were you using? Firefox 3 uses signons.sqlite. You can view them from Firefox's options dialog without entering a password...<nobr> <wbr></nobr>...unless you choose to set a master password, which also encrypts them with key3.db, an encryption key based on your master password. Secure, as it uses 3DES (Triple DES) encryption; if you want to use a more secure encryption method you can use Federal Information Processing Standard (FIPS) 140.</p><p>See http://realinfosec.com/?p=111 for more details (slightly broken English, but readable.)</p></htmltext>
<tokenext>&gt; Do n't use Firefox 's password storage !
They are all stored in plain text !
Anyone can view them ! ! Really ?
What version of Firefox were you using ?
Firefox 3 uses signons.sqlite .
You can view them from Firefox 's options dialog without entering a password... ...unless you choose to set a master password , which also encrypts them with key3.db , an encryption key based on your master password .
Secure , as it uses 3DES ( Triple DES ) encryption ; if you want to use a more secure encryption method you can use Federal Information Processing Standard ( FIPS ) 140.See http : //realinfosec.com/ ? p = 111 for more details ( slightly broken English , but readable .
)</tokentext>
<sentencetext>&gt; Don't use Firefox's password storage!
They are all stored in plain text!
Anyone can view them!!Really?
What version of Firefox were you using?
Firefox 3 uses signons.sqlite.
You can view them from Firefox's options dialog without entering a password... ...unless you choose to set a master password, which also encrypts them with key3.db, an encryption key based on your master password.
Secure, as it uses 3DES (Triple DES) encryption; if you want to use a more secure encryption method you can use Federal Information Processing Standard (FIPS) 140.See http://realinfosec.com/?p=111 for more details (slightly broken English, but readable.
)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061942</id>
	<title>Re:Prepended or Appended Passphrase</title>
	<author>Casca</author>
	<datestamp>1257098040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Sounds great, except there are still a lot of places that have stupid password limits, like no more than 8 characters, or no special characters, and so on. So you still end up with a bunch of unique passwords, and have to find a way to remember them all.</p></htmltext>
<tokenext>Sounds great , except there are still a lot of places that have stupid password limits , like no more than 8 characters , or no special characters , and so on .
So you still end up with a bunch of unique passwords , and have to find a way to remember them all .</tokentext>
<sentencetext>Sounds great, except there are still a lot of places that have stupid password limits, like no more than 8 characters, or no special characters, and so on.
So you still end up with a bunch of unique passwords, and have to find a way to remember them all.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056954</id>
	<title>Books</title>
	<author>lloyd11b</author>
	<datestamp>1257881700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>As a student, I have many textbooks on/around my desk. Every month I pick a book and open to a chapter (normally the chapter corresponding to the month). I use the first letter of each word, capitalization and punctuation included, of a sentence. Since most of textbooks are engineering related, the sentences are rich with numbers, so this method allows for an endless supply of complex alpha-numeric passwords.  All I have to do is remember the book (or the sentence).</htmltext>
<tokenext>As a student , I have many textbooks on/around my desk .
Every month I pick a book and open to a chapter ( normally the chapter corresponding to the month ) .
I use the first letter of each word , capitalization and punctuation included , of a sentence .
Since most of textbooks are engineering related , the sentences are rich with numbers , so this method allows for an endless supply of complex alpha-numeric passwords .
All I have to do is remember the book ( or the sentence ) .</tokentext>
<sentencetext>As a student, I have many textbooks on/around my desk.
Every month I pick a book and open to a chapter (normally the chapter corresponding to the month).
I use the first letter of each word, capitalization and punctuation included, of a sentence.
Since most of textbooks are engineering related, the sentences are rich with numbers, so this method allows for an endless supply of complex alpha-numeric passwords.
All I have to do is remember the book (or the sentence).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057166</id>
	<title>how about...</title>
	<author>Anonymous</author>
	<datestamp>1257106500000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>There's these neat devices we all have inside of us that are capable of remembering passwords.  it's so cool!  its called your brain.</p></htmltext>
<tokenext>There 's these neat devices we all have inside of us that are capable of remembering passwords .
it 's so cool !
its called your brain .</tokentext>
<sentencetext>There's these neat devices we all have inside of us that are capable of remembering passwords.
it's so cool!
its called your brain.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056730</id>
	<title>Re:The most secure place</title>
	<author>cLive ;-)</author>
	<datestamp>1257879180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Have you learned how to salt and hash passwords since then?<nobr> <wbr></nobr>;-)</htmltext>
<tokenext>Have you learned how to salt and hash passwords since then ?
; - )</tokentext>
<sentencetext>Have you learned how to salt and hash passwords since then?
;-)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054742</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057582</id>
	<title>Use this.</title>
	<author>RichiH</author>
	<datestamp>1257068340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://www.vim.org/scripts/script.php?script\_id=2012" title="vim.org">http://www.vim.org/scripts/script.php?script\_id=2012</a> [vim.org]</p><p>It handles de- and encryption transparently.</p></htmltext>
<tokenext>http : //www.vim.org/scripts/script.php ? script \ _id = 2012 [ vim.org ] It handles de- and encryption transparently .</tokentext>
<sentencetext>http://www.vim.org/scripts/script.php?script\_id=2012 [vim.org]It handles de- and encryption transparently.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055804</id>
	<title>What I .</title>
	<author>HybridJeff</author>
	<datestamp>1257870900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Use the same passwords for things that don't really matter (forums, games that sort of thing) and memorize a small number of strong passwords for important more things, banks, important email addresses, school or work stuff. That works for me at least.</htmltext>
<tokenext>Use the same passwords for things that do n't really matter ( forums , games that sort of thing ) and memorize a small number of strong passwords for important more things , banks , important email addresses , school or work stuff .
That works for me at least .</tokentext>
<sentencetext>Use the same passwords for things that don't really matter (forums, games that sort of thing) and memorize a small number of strong passwords for important more things, banks, important email addresses, school or work stuff.
That works for me at least.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054946</id>
	<title>Re:if you use a mac...</title>
	<author>jayfehr</author>
	<datestamp>1257865680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Not  sure why you got modded down (maybe for mentioning a Mac), but I agree 1Password works wonders. The new version now includes online access to your passwords and the iPhone version will mean you always have a copy on hand.

Downside is that it is Mac only.</htmltext>
<tokenext>Not sure why you got modded down ( maybe for mentioning a Mac ) , but I agree 1Password works wonders .
The new version now includes online access to your passwords and the iPhone version will mean you always have a copy on hand .
Downside is that it is Mac only .</tokentext>
<sentencetext>Not  sure why you got modded down (maybe for mentioning a Mac), but I agree 1Password works wonders.
The new version now includes online access to your passwords and the iPhone version will mean you always have a copy on hand.
Downside is that it is Mac only.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054500</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056400</id>
	<title>Encrypted text file on Mobile Phone</title>
	<author>ami.one</author>
	<datestamp>1257876420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I keep all my passwords etc in an encrypted text file on my mobile phone. (during bouts of paranoia i type them in reverse order sometimes) </p><p>I usually sync the phone to my laptop every 1-2 weeks and save an encrypted file in the laptop as well as in my gmail account for backup in case i loose the phone and need to change all passwords etc</p></htmltext>
<tokenext>I keep all my passwords etc in an encrypted text file on my mobile phone .
( during bouts of paranoia i type them in reverse order sometimes ) I usually sync the phone to my laptop every 1-2 weeks and save an encrypted file in the laptop as well as in my gmail account for backup in case i loose the phone and need to change all passwords etc</tokentext>
<sentencetext>I keep all my passwords etc in an encrypted text file on my mobile phone.
(during bouts of paranoia i type them in reverse order sometimes) I usually sync the phone to my laptop every 1-2 weeks and save an encrypted file in the laptop as well as in my gmail account for backup in case i loose the phone and need to change all passwords etc</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056156</id>
	<title>Acronyms</title>
	<author>Anonymous</author>
	<datestamp>1257873780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Another (more algorithmic and easier to remember) method of generating secure passwords you can remember (without having to remember which number replaces which letter, etc.) is to take a phrase or even better a full sentence or two with punctuation (such as "This phrase is for my password, bitches!") and create an acronym (such as "Tpi4mp,b!") of it including punctuation, capitalization and replacing "to" with 2 and "for" with 4 (and perhaps other word/number homophones).</p></htmltext>
<tokenext>Another ( more algorithmic and easier to remember ) method of generating secure passwords you can remember ( without having to remember which number replaces which letter , etc .
) is to take a phrase or even better a full sentence or two with punctuation ( such as " This phrase is for my password , bitches !
" ) and create an acronym ( such as " Tpi4mp,b !
" ) of it including punctuation , capitalization and replacing " to " with 2 and " for " with 4 ( and perhaps other word/number homophones ) .</tokentext>
<sentencetext>Another (more algorithmic and easier to remember) method of generating secure passwords you can remember (without having to remember which number replaces which letter, etc.
) is to take a phrase or even better a full sentence or two with punctuation (such as "This phrase is for my password, bitches!
") and create an acronym (such as "Tpi4mp,b!
") of it including punctuation, capitalization and replacing "to" with 2 and "for" with 4 (and perhaps other word/number homophones).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056180</id>
	<title>Mnemonics</title>
	<author>Anonymous</author>
	<datestamp>1257873960000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Easy, create passwords that are memorable but subtly changed, such as "H0rd3r0gu3".  See what I did there?  ^.-  133t5p34k passwords usually count as 'strong' passwords, especially with the addition of symbols.</p></htmltext>
<tokenext>Easy , create passwords that are memorable but subtly changed , such as " H0rd3r0gu3 " .
See what I did there ?
^ .- 133t5p34k passwords usually count as 'strong ' passwords , especially with the addition of symbols .</tokentext>
<sentencetext>Easy, create passwords that are memorable but subtly changed, such as "H0rd3r0gu3".
See what I did there?
^.-  133t5p34k passwords usually count as 'strong' passwords, especially with the addition of symbols.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30068726</id>
	<title>lastpass.com is a sweet free service</title>
	<author>mrterrysilver</author>
	<datestamp>1257089520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>lastpass.com does just this. it is a free cross browser (ie, firefox, safari, chrome, iphone) plugin that encrypts your passwords and then stored them on their servers. (only your encrypted passwords are stored)

it replaces the built in firefox manager (which doesn't work very well and i can't believe they haven't addressed that yet) and lastpass's plugin works much much better than the built in ie / firefox managers. its also a lot more secure.

its not without faults.... its not very easy to use with multiple accounts and trying to correct an account with a wrong password is sometimes painful

overall, i love it and am a user. check it out: lastpass.com</htmltext>
<tokenext>lastpass.com does just this .
it is a free cross browser ( ie , firefox , safari , chrome , iphone ) plugin that encrypts your passwords and then stored them on their servers .
( only your encrypted passwords are stored ) it replaces the built in firefox manager ( which does n't work very well and i ca n't believe they have n't addressed that yet ) and lastpass 's plugin works much much better than the built in ie / firefox managers .
its also a lot more secure .
its not without faults.... its not very easy to use with multiple accounts and trying to correct an account with a wrong password is sometimes painful overall , i love it and am a user .
check it out : lastpass.com</tokentext>
<sentencetext>lastpass.com does just this.
it is a free cross browser (ie, firefox, safari, chrome, iphone) plugin that encrypts your passwords and then stored them on their servers.
(only your encrypted passwords are stored)

it replaces the built in firefox manager (which doesn't work very well and i can't believe they haven't addressed that yet) and lastpass's plugin works much much better than the built in ie / firefox managers.
its also a lot more secure.
its not without faults.... its not very easy to use with multiple accounts and trying to correct an account with a wrong password is sometimes painful

overall, i love it and am a user.
check it out: lastpass.com</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055030</id>
	<title>Remember vs recording...</title>
	<author>hamster\_nz</author>
	<datestamp>1257866160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I *remember* passwords in my head, and hate to admit it but they are short phrases... if I was a Blade Runner fan I might choose "Time2DiE!" for a not so important account.</p><p>I *record* as few passwords of my passwords as possible, but at my employer we record all the details in a special area of our CRM system. It isn't very secure, but it works. I prefer not to have any record of my employer's client's passwords and check the CRM every time - it is embarrassing to lock out the Admin account when another engineer changes the password!</p><p>I feel sorry for one customer who needed to give us admin access. His "never tell anybody" password was the brand name and model of s personal electronic device for appling mild electric shocks to sensitive parts of the body... I just HAD to google it!</p></htmltext>
<tokenext>I * remember * passwords in my head , and hate to admit it but they are short phrases... if I was a Blade Runner fan I might choose " Time2DiE !
" for a not so important account.I * record * as few passwords of my passwords as possible , but at my employer we record all the details in a special area of our CRM system .
It is n't very secure , but it works .
I prefer not to have any record of my employer 's client 's passwords and check the CRM every time - it is embarrassing to lock out the Admin account when another engineer changes the password ! I feel sorry for one customer who needed to give us admin access .
His " never tell anybody " password was the brand name and model of s personal electronic device for appling mild electric shocks to sensitive parts of the body... I just HAD to google it !</tokentext>
<sentencetext>I *remember* passwords in my head, and hate to admit it but they are short phrases... if I was a Blade Runner fan I might choose "Time2DiE!
" for a not so important account.I *record* as few passwords of my passwords as possible, but at my employer we record all the details in a special area of our CRM system.
It isn't very secure, but it works.
I prefer not to have any record of my employer's client's passwords and check the CRM every time - it is embarrassing to lock out the Admin account when another engineer changes the password!I feel sorry for one customer who needed to give us admin access.
His "never tell anybody" password was the brand name and model of s personal electronic device for appling mild electric shocks to sensitive parts of the body... I just HAD to google it!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061778</id>
	<title>smarter text file</title>
	<author>JoeMac</author>
	<datestamp>1257097320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I keep a text file, but it's only visible as root and its name doesn't make it seem like a text file. Furthermore, within it I never actually spell out my passwords, just a couple of characters to remember my sequence. I used to do the same for the system for which it applied, but then I found that I would forget my clever-at-the-time abbreviations for those (that leaky brain problem you mentioned...). I think that's sufficient obfuscation for now.</htmltext>
<tokenext>I keep a text file , but it 's only visible as root and its name does n't make it seem like a text file .
Furthermore , within it I never actually spell out my passwords , just a couple of characters to remember my sequence .
I used to do the same for the system for which it applied , but then I found that I would forget my clever-at-the-time abbreviations for those ( that leaky brain problem you mentioned... ) .
I think that 's sufficient obfuscation for now .</tokentext>
<sentencetext>I keep a text file, but it's only visible as root and its name doesn't make it seem like a text file.
Furthermore, within it I never actually spell out my passwords, just a couple of characters to remember my sequence.
I used to do the same for the system for which it applied, but then I found that I would forget my clever-at-the-time abbreviations for those (that leaky brain problem you mentioned...).
I think that's sufficient obfuscation for now.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30070476</id>
	<title>Yet another suggestion....</title>
	<author>Atiniir</author>
	<datestamp>1258021020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Just throwing my suggestion on the heap of hundreds:

Take the first letter of the chorus of a song you like, and make that the password. If you forget it, you can just think of the song and punch out the password. For example, Iron Maiden's "Run To The Hills", you have "Run to the hills, run for your lives", which comes out as rtthfryl, which is not likely to come up in any brute force dictionary based attack, and it has a built in method for you to remember it. Feel free to add characters or numbers if necessary, I really like the !1, or *8.</htmltext>
<tokenext>Just throwing my suggestion on the heap of hundreds : Take the first letter of the chorus of a song you like , and make that the password .
If you forget it , you can just think of the song and punch out the password .
For example , Iron Maiden 's " Run To The Hills " , you have " Run to the hills , run for your lives " , which comes out as rtthfryl , which is not likely to come up in any brute force dictionary based attack , and it has a built in method for you to remember it .
Feel free to add characters or numbers if necessary , I really like the ! 1 , or * 8 .</tokentext>
<sentencetext>Just throwing my suggestion on the heap of hundreds:

Take the first letter of the chorus of a song you like, and make that the password.
If you forget it, you can just think of the song and punch out the password.
For example, Iron Maiden's "Run To The Hills", you have "Run to the hills, run for your lives", which comes out as rtthfryl, which is not likely to come up in any brute force dictionary based attack, and it has a built in method for you to remember it.
Feel free to add characters or numbers if necessary, I really like the !1, or *8.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058252</id>
	<title>Re: Written down, in a locked filing cabinet...</title>
	<author>neonsignal</author>
	<datestamp>1257076320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Written down, in a lockbox, in a safe, in the floor of your basement, under a rug, in your house that has an active alarm system (that you use), in a armed guard and gated community is ok.</p></div><p>
But why would you want the Vogons to find your password list?</p></div>
	</htmltext>
<tokenext>Written down , in a lockbox , in a safe , in the floor of your basement , under a rug , in your house that has an active alarm system ( that you use ) , in a armed guard and gated community is ok . But why would you want the Vogons to find your password list ?</tokentext>
<sentencetext>Written down, in a lockbox, in a safe, in the floor of your basement, under a rug, in your house that has an active alarm system (that you use), in a armed guard and gated community is ok.
But why would you want the Vogons to find your password list?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054894</id>
	<title>Fantastic tool: Grey Matter</title>
	<author>Zalbik</author>
	<datestamp>1257865440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>The ideal tool in my mind should be something that is independent of any application, browser, or computer; something that is easily carried, but which if lost poses no risk of compromise. What does the Slashdot crowd like in password tools?"</p></div></blockquote><p>I like using my brain.</p><p>Seriously, how many passwords do you need to remember? 15? 20?</p><p>Figure out a reasonable mnemonic for remembering them and do just that...remember them.</p><p>Every other tool I've tried has ended up being not available at some point when I needed it (e.g. at a hotel, at a friend's house, on an airplane etc).</p></div>
	</htmltext>
<tokenext>The ideal tool in my mind should be something that is independent of any application , browser , or computer ; something that is easily carried , but which if lost poses no risk of compromise .
What does the Slashdot crowd like in password tools ?
" I like using my brain.Seriously , how many passwords do you need to remember ?
15 ? 20 ? Figure out a reasonable mnemonic for remembering them and do just that...remember them.Every other tool I 've tried has ended up being not available at some point when I needed it ( e.g .
at a hotel , at a friend 's house , on an airplane etc ) .</tokentext>
<sentencetext>The ideal tool in my mind should be something that is independent of any application, browser, or computer; something that is easily carried, but which if lost poses no risk of compromise.
What does the Slashdot crowd like in password tools?
"I like using my brain.Seriously, how many passwords do you need to remember?
15? 20?Figure out a reasonable mnemonic for remembering them and do just that...remember them.Every other tool I've tried has ended up being not available at some point when I needed it (e.g.
at a hotel, at a friend's house, on an airplane etc).
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054784</id>
	<title>Superuser.com question</title>
	<author>jazzyjrw</author>
	<datestamp>1257864780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>This question has been asked on superuser.com, with many answers and associated discussion:  <a href="http://superuser.com/questions/255/how-do-you-keep-track-of-all-your-passwords" title="superuser.com" rel="nofollow">http://superuser.com/questions/255/how-do-you-keep-track-of-all-your-passwords</a> [superuser.com]</htmltext>
<tokenext>This question has been asked on superuser.com , with many answers and associated discussion : http : //superuser.com/questions/255/how-do-you-keep-track-of-all-your-passwords [ superuser.com ]</tokentext>
<sentencetext>This question has been asked on superuser.com, with many answers and associated discussion:  http://superuser.com/questions/255/how-do-you-keep-track-of-all-your-passwords [superuser.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063488</id>
	<title>critical data saved in OSX DMG files</title>
	<author>Anonymous</author>
	<datestamp>1257104400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>In OSX, I save a list of my plaintext usernames and passwords inside an encrypted disk image (AES-128) residing on my pocket USB stick (and can secrete copies on the various machines).</p><p>One major passphrase to unlock the image if ever I can't remember a particular password.</p><p>Since I'm always in OSX it poses no problems, but there's nothing I know of to use the same scheme from OSXwindows...  Does anyone know of a windows app that can handle DMG files?</p><p>Encrypted disk images are also nice ways to keep my project notes, diaries, and data - they can be given different passphrases so that other colleagues can have specific access to the information.</p></htmltext>
<tokenext>In OSX , I save a list of my plaintext usernames and passwords inside an encrypted disk image ( AES-128 ) residing on my pocket USB stick ( and can secrete copies on the various machines ) .One major passphrase to unlock the image if ever I ca n't remember a particular password.Since I 'm always in OSX it poses no problems , but there 's nothing I know of to use the same scheme from OSXwindows... Does anyone know of a windows app that can handle DMG files ? Encrypted disk images are also nice ways to keep my project notes , diaries , and data - they can be given different passphrases so that other colleagues can have specific access to the information .</tokentext>
<sentencetext>In OSX, I save a list of my plaintext usernames and passwords inside an encrypted disk image (AES-128) residing on my pocket USB stick (and can secrete copies on the various machines).One major passphrase to unlock the image if ever I can't remember a particular password.Since I'm always in OSX it poses no problems, but there's nothing I know of to use the same scheme from OSXwindows...  Does anyone know of a windows app that can handle DMG files?Encrypted disk images are also nice ways to keep my project notes, diaries, and data - they can be given different passphrases so that other colleagues can have specific access to the information.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054904</id>
	<title>Memorize you're own algorithm</title>
	<author>oljanx</author>
	<datestamp>1257865440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Memorize a single algorithm for generating all of your passwords.  For example you might take the first name of a family member, modify it according to a set of rules, and append their birth date also modified by some set of rules.  Now obviously you want to use something more secure than family names and birth dates, but you get the idea.  With enough creativity, you'll end up with secure passwords.

There are several advantages to this method.  When you forget a password, you can pull from your pool of initial values and generate passwords until you find the right one.  And it's often easier to remember a set of initial values associated with a particular website/etc, than the complex password that you actually generate and use.</htmltext>
<tokenext>Memorize a single algorithm for generating all of your passwords .
For example you might take the first name of a family member , modify it according to a set of rules , and append their birth date also modified by some set of rules .
Now obviously you want to use something more secure than family names and birth dates , but you get the idea .
With enough creativity , you 'll end up with secure passwords .
There are several advantages to this method .
When you forget a password , you can pull from your pool of initial values and generate passwords until you find the right one .
And it 's often easier to remember a set of initial values associated with a particular website/etc , than the complex password that you actually generate and use .</tokentext>
<sentencetext>Memorize a single algorithm for generating all of your passwords.
For example you might take the first name of a family member, modify it according to a set of rules, and append their birth date also modified by some set of rules.
Now obviously you want to use something more secure than family names and birth dates, but you get the idea.
With enough creativity, you'll end up with secure passwords.
There are several advantages to this method.
When you forget a password, you can pull from your pool of initial values and generate passwords until you find the right one.
And it's often easier to remember a set of initial values associated with a particular website/etc, than the complex password that you actually generate and use.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055388</id>
	<title>Re:Use the master password feature and stop worryi</title>
	<author>ExRex</author>
	<datestamp>1257868140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>There's also an add-on called Master Password Timeout. You set a period of time after which it will again ask for your master password when you log in somewhere. The security feature here is that if you get a password prompt without expecting it, you'll know that there's some background code on the page poking into places it shouldn't be.
It is also good in a workplace if you happen to leave your browser open while away from your desk. Keeps co-workers from checking your webmail, or bidding for you on ebay.
I usually set mine for 15 minutes. You can set it to a really short period if your particularly paranoid.</htmltext>
<tokenext>There 's also an add-on called Master Password Timeout .
You set a period of time after which it will again ask for your master password when you log in somewhere .
The security feature here is that if you get a password prompt without expecting it , you 'll know that there 's some background code on the page poking into places it should n't be .
It is also good in a workplace if you happen to leave your browser open while away from your desk .
Keeps co-workers from checking your webmail , or bidding for you on ebay .
I usually set mine for 15 minutes .
You can set it to a really short period if your particularly paranoid .</tokentext>
<sentencetext>There's also an add-on called Master Password Timeout.
You set a period of time after which it will again ask for your master password when you log in somewhere.
The security feature here is that if you get a password prompt without expecting it, you'll know that there's some background code on the page poking into places it shouldn't be.
It is also good in a workplace if you happen to leave your browser open while away from your desk.
Keeps co-workers from checking your webmail, or bidding for you on ebay.
I usually set mine for 15 minutes.
You can set it to a really short period if your particularly paranoid.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064128</id>
	<title>Re:PasswordSafe</title>
	<author>Mike Van Pelt</author>
	<datestamp>1257106500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I really liked PasswordSafe, and if I didn't use a Mac part of the time, that's what I'd still be using.</p><p>I'm currently using KeePass, and<nobr> <wbr></nobr>... I do not like it very much.  It doesn't have a built-in way to merge the latest keys from multiple key files, which to me is a huge, glaring flaw.</p><p>And after using it for a while<nobr> <wbr></nobr>... I just don't trust the security-consciousness of the KeePass developers as much as I do Bruce Schneier.  For one thing, when you export the password database to plain clear text, passwordsafe prints a "warning warning danger danger do you really want to do this" type message.  KeePass<nobr> <wbr></nobr>... just does it, with no warning.  True, in itself, that's no big deal (Just don't do that!) but it make me worry about what other bad practices might be embedded in it.</p><p>I'm unhappy enough with KeePass that I'm going back to PasswordSafe, and if I need it on the Mac, I'll just run it under Fusion.  I regret moving everything over to KeePass.</p><p>Password Gorilla looks interesting (I hadn't heard of it before reading the comments here) but it doesn't seem to have been updated in almost 4 years. Password Safe development continues.</p></htmltext>
<tokenext>I really liked PasswordSafe , and if I did n't use a Mac part of the time , that 's what I 'd still be using.I 'm currently using KeePass , and ... I do not like it very much .
It does n't have a built-in way to merge the latest keys from multiple key files , which to me is a huge , glaring flaw.And after using it for a while ... I just do n't trust the security-consciousness of the KeePass developers as much as I do Bruce Schneier .
For one thing , when you export the password database to plain clear text , passwordsafe prints a " warning warning danger danger do you really want to do this " type message .
KeePass ... just does it , with no warning .
True , in itself , that 's no big deal ( Just do n't do that !
) but it make me worry about what other bad practices might be embedded in it.I 'm unhappy enough with KeePass that I 'm going back to PasswordSafe , and if I need it on the Mac , I 'll just run it under Fusion .
I regret moving everything over to KeePass.Password Gorilla looks interesting ( I had n't heard of it before reading the comments here ) but it does n't seem to have been updated in almost 4 years .
Password Safe development continues .</tokentext>
<sentencetext>I really liked PasswordSafe, and if I didn't use a Mac part of the time, that's what I'd still be using.I'm currently using KeePass, and ... I do not like it very much.
It doesn't have a built-in way to merge the latest keys from multiple key files, which to me is a huge, glaring flaw.And after using it for a while ... I just don't trust the security-consciousness of the KeePass developers as much as I do Bruce Schneier.
For one thing, when you export the password database to plain clear text, passwordsafe prints a "warning warning danger danger do you really want to do this" type message.
KeePass ... just does it, with no warning.
True, in itself, that's no big deal (Just don't do that!
) but it make me worry about what other bad practices might be embedded in it.I'm unhappy enough with KeePass that I'm going back to PasswordSafe, and if I need it on the Mac, I'll just run it under Fusion.
I regret moving everything over to KeePass.Password Gorilla looks interesting (I hadn't heard of it before reading the comments here) but it doesn't seem to have been updated in almost 4 years.
Password Safe development continues.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30070630</id>
	<title>KisKis</title>
	<author>Anonymous</author>
	<datestamp>1258023060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>http://kiskis.sourceforge.net/</p><p>Is java based so it's cross platform, it'll fit on a usb stick and run on anything with java on.</p></htmltext>
<tokenext>http : //kiskis.sourceforge.net/Is java based so it 's cross platform , it 'll fit on a usb stick and run on anything with java on .</tokentext>
<sentencetext>http://kiskis.sourceforge.net/Is java based so it's cross platform, it'll fit on a usb stick and run on anything with java on.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056212</id>
	<title>I use ccrypt</title>
	<author>Anonymous</author>
	<datestamp>1257874440000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I use ccrypt to encrypt a plaintext file where I keep many different pieces of vital information.</p><p>The file is always kept encrypted in my home directory.  I have a script that enables me to enter the password for the file, edit it, and then re-encrypt it with the same password.  I have cron email the encrypted password file to a gmail account every day.  Therefore, it's always encrypted except for a brief time while being edited.  It's always readily available, and backed up.  ccrypt is available on virtually all platforms.  After using this system for about two years, I find it to be nearly ideal.  I don't worry about leaving copies of the encrypted file here and there because its password is memorized and very strong.  I've also never needed to get access to a password without being able to retrieve it fairly quickly.  After using this system for a few months, I realized that there's no penalty for using very strong passwords everywhere (16 character random alphanumeric with special characters...), including all financial or etailer sites.</p><p>Overall, it works well for me with minimal personal effort and good security.</p></htmltext>
<tokenext>I use ccrypt to encrypt a plaintext file where I keep many different pieces of vital information.The file is always kept encrypted in my home directory .
I have a script that enables me to enter the password for the file , edit it , and then re-encrypt it with the same password .
I have cron email the encrypted password file to a gmail account every day .
Therefore , it 's always encrypted except for a brief time while being edited .
It 's always readily available , and backed up .
ccrypt is available on virtually all platforms .
After using this system for about two years , I find it to be nearly ideal .
I do n't worry about leaving copies of the encrypted file here and there because its password is memorized and very strong .
I 've also never needed to get access to a password without being able to retrieve it fairly quickly .
After using this system for a few months , I realized that there 's no penalty for using very strong passwords everywhere ( 16 character random alphanumeric with special characters... ) , including all financial or etailer sites.Overall , it works well for me with minimal personal effort and good security .</tokentext>
<sentencetext>I use ccrypt to encrypt a plaintext file where I keep many different pieces of vital information.The file is always kept encrypted in my home directory.
I have a script that enables me to enter the password for the file, edit it, and then re-encrypt it with the same password.
I have cron email the encrypted password file to a gmail account every day.
Therefore, it's always encrypted except for a brief time while being edited.
It's always readily available, and backed up.
ccrypt is available on virtually all platforms.
After using this system for about two years, I find it to be nearly ideal.
I don't worry about leaving copies of the encrypted file here and there because its password is memorized and very strong.
I've also never needed to get access to a password without being able to retrieve it fairly quickly.
After using this system for a few months, I realized that there's no penalty for using very strong passwords everywhere (16 character random alphanumeric with special characters...), including all financial or etailer sites.Overall, it works well for me with minimal personal effort and good security.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058286</id>
	<title>Not too secure either unfortunately</title>
	<author>Anonymous</author>
	<datestamp>1257076860000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Sorry, but it is trivial to crack. Rootkit the OS and keylog everything. You can correlate with OS activities such as browsers and other apps's activities. With browsers you can even log most activity nowadays, or just use a custom binary. Basically you can hijack most used processes and log whatever you do in SSL or SSH (you're using putty right?). Worst case, make snapshots or view the screen from remote for those virtual keypads. Peep through the web camera for fun<nobr> <wbr></nobr>:-)</p><p>"Security" is today a bad joke. I'm surprised people's passwords aren't all abused more already, because it's theoretically do-able and most security schemes rely on weak protection against high-impact security holes (which most people running Windows are already afflicted by). It's like relying on captcha - only a matter of time before it breaks totally.</p><p>This is going to create more problems in a few years. It only require virus writers to incorporate more already-existing features into their codebase, and to more actively start to misuse people's identities.</p><p>How do you know your OS is not already rooted?</p></htmltext>
<tokenext>Sorry , but it is trivial to crack .
Rootkit the OS and keylog everything .
You can correlate with OS activities such as browsers and other apps 's activities .
With browsers you can even log most activity nowadays , or just use a custom binary .
Basically you can hijack most used processes and log whatever you do in SSL or SSH ( you 're using putty right ? ) .
Worst case , make snapshots or view the screen from remote for those virtual keypads .
Peep through the web camera for fun : - ) " Security " is today a bad joke .
I 'm surprised people 's passwords are n't all abused more already , because it 's theoretically do-able and most security schemes rely on weak protection against high-impact security holes ( which most people running Windows are already afflicted by ) .
It 's like relying on captcha - only a matter of time before it breaks totally.This is going to create more problems in a few years .
It only require virus writers to incorporate more already-existing features into their codebase , and to more actively start to misuse people 's identities.How do you know your OS is not already rooted ?</tokentext>
<sentencetext>Sorry, but it is trivial to crack.
Rootkit the OS and keylog everything.
You can correlate with OS activities such as browsers and other apps's activities.
With browsers you can even log most activity nowadays, or just use a custom binary.
Basically you can hijack most used processes and log whatever you do in SSL or SSH (you're using putty right?).
Worst case, make snapshots or view the screen from remote for those virtual keypads.
Peep through the web camera for fun :-)"Security" is today a bad joke.
I'm surprised people's passwords aren't all abused more already, because it's theoretically do-able and most security schemes rely on weak protection against high-impact security holes (which most people running Windows are already afflicted by).
It's like relying on captcha - only a matter of time before it breaks totally.This is going to create more problems in a few years.
It only require virus writers to incorporate more already-existing features into their codebase, and to more actively start to misuse people's identities.How do you know your OS is not already rooted?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054852</id>
	<title>Re:Opera Password Manager</title>
	<author>Lehk228</author>
	<datestamp>1257865140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>firefox also allows a master password, i don't know the exact behavior of it WRT encryption though.</htmltext>
<tokenext>firefox also allows a master password , i do n't know the exact behavior of it WRT encryption though .</tokentext>
<sentencetext>firefox also allows a master password, i don't know the exact behavior of it WRT encryption though.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054610</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054742</id>
	<title>Re:The most secure place</title>
	<author>JWSmythe</author>
	<datestamp>1257864540000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>
&nbsp; &nbsp; That's not the best idea.  If a secure location becomes compromised, you just gave up access to everything you do.   Not to say people don't do it, but people also set their passwords to "password".</p><p>
&nbsp; &nbsp; <a href="http://it.slashdot.org/comments.pl?sid=170628&amp;cid=14216999" title="slashdot.org">Here's an old post</a> [slashdot.org] I did here 4 years ago on the subject.  Users haven't gotten any smarter.  Just poorer when their bank account gets compromised.</p></htmltext>
<tokenext>    That 's not the best idea .
If a secure location becomes compromised , you just gave up access to everything you do .
Not to say people do n't do it , but people also set their passwords to " password " .
    Here 's an old post [ slashdot.org ] I did here 4 years ago on the subject .
Users have n't gotten any smarter .
Just poorer when their bank account gets compromised .</tokentext>
<sentencetext>
    That's not the best idea.
If a secure location becomes compromised, you just gave up access to everything you do.
Not to say people don't do it, but people also set their passwords to "password".
    Here's an old post [slashdot.org] I did here 4 years ago on the subject.
Users haven't gotten any smarter.
Just poorer when their bank account gets compromised.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065700</id>
	<title>Re:LastPass doubleplus</title>
	<author>Brysmi</author>
	<datestamp>1257070320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I was happy syncing up across browsers (work, home, netbook<nobr> <wbr></nobr>...) through password exporter (URL:https://addons.mozilla.org/en-US/firefox/addon/2848&gt;, svn, thumbdrives, and KeePass<nobr> <wbr></nobr>... yikes.  LastPass showed up while reviewing the current state of identity management (SSO providers, etc) for a work project, and all of the actions I used to take to have my identities with me are usually zero clicks away, and on whatever browser or device (they have a blackberry client) I am surfing with.  Encryption on the client, shared out in the cloud, and most significantly, close to transparent in the interface<nobr> <wbr></nobr>...and their roadmap has some of the issues I do have with it scheduled.

Hooray for LastPass solving a problem I didn't realize I had and eliminating a small hack in my online life.</htmltext>
<tokenext>I was happy syncing up across browsers ( work , home , netbook ... ) through password exporter ( URL : https : //addons.mozilla.org/en-US/firefox/addon/2848 &gt; , svn , thumbdrives , and KeePass ... yikes. LastPass showed up while reviewing the current state of identity management ( SSO providers , etc ) for a work project , and all of the actions I used to take to have my identities with me are usually zero clicks away , and on whatever browser or device ( they have a blackberry client ) I am surfing with .
Encryption on the client , shared out in the cloud , and most significantly , close to transparent in the interface ...and their roadmap has some of the issues I do have with it scheduled .
Hooray for LastPass solving a problem I did n't realize I had and eliminating a small hack in my online life .</tokentext>
<sentencetext>I was happy syncing up across browsers (work, home, netbook ...) through password exporter (URL:https://addons.mozilla.org/en-US/firefox/addon/2848&gt;, svn, thumbdrives, and KeePass ... yikes.  LastPass showed up while reviewing the current state of identity management (SSO providers, etc) for a work project, and all of the actions I used to take to have my identities with me are usually zero clicks away, and on whatever browser or device (they have a blackberry client) I am surfing with.
Encryption on the client, shared out in the cloud, and most significantly, close to transparent in the interface ...and their roadmap has some of the issues I do have with it scheduled.
Hooray for LastPass solving a problem I didn't realize I had and eliminating a small hack in my online life.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054978</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064622</id>
	<title>Wiki</title>
	<author>Anonymous</author>
	<datestamp>1257108420000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>This topic comes up every once and a while and I too have gone through various iterations of solutions to this problem. Until recently I was storing them in an encrypted DB on a Palm TX pda. As that thing slowly degrades I realized I won't be owning a pda in the future, so I looked at other solutions.</p><p>- Has to be portable and follow me to any computer I'm on.<br>- Has to be easily searchable and or sortable/organizable, I have close to a hundred logins stored.<br>- Has to be secure.</p><p>My solution is that for the MOST important things like anything involving money like my online banking I just memorize the passwords. For the almost one hundred of the rest I keep them in a wiki on one of my personal websites (shared hosting). I use a wiki plugin that encrypts the data client side before saving the wiki page. So only the encrypted list is stored on the web server. It's decrypted in my browser by JS.</p><p>Works pretty good so far. Minor concerns about it being stored in the browser's cache, but I never access it from public computers.</p></htmltext>
<tokenext>This topic comes up every once and a while and I too have gone through various iterations of solutions to this problem .
Until recently I was storing them in an encrypted DB on a Palm TX pda .
As that thing slowly degrades I realized I wo n't be owning a pda in the future , so I looked at other solutions.- Has to be portable and follow me to any computer I 'm on.- Has to be easily searchable and or sortable/organizable , I have close to a hundred logins stored.- Has to be secure.My solution is that for the MOST important things like anything involving money like my online banking I just memorize the passwords .
For the almost one hundred of the rest I keep them in a wiki on one of my personal websites ( shared hosting ) .
I use a wiki plugin that encrypts the data client side before saving the wiki page .
So only the encrypted list is stored on the web server .
It 's decrypted in my browser by JS.Works pretty good so far .
Minor concerns about it being stored in the browser 's cache , but I never access it from public computers .</tokentext>
<sentencetext>This topic comes up every once and a while and I too have gone through various iterations of solutions to this problem.
Until recently I was storing them in an encrypted DB on a Palm TX pda.
As that thing slowly degrades I realized I won't be owning a pda in the future, so I looked at other solutions.- Has to be portable and follow me to any computer I'm on.- Has to be easily searchable and or sortable/organizable, I have close to a hundred logins stored.- Has to be secure.My solution is that for the MOST important things like anything involving money like my online banking I just memorize the passwords.
For the almost one hundred of the rest I keep them in a wiki on one of my personal websites (shared hosting).
I use a wiki plugin that encrypts the data client side before saving the wiki page.
So only the encrypted list is stored on the web server.
It's decrypted in my browser by JS.Works pretty good so far.
Minor concerns about it being stored in the browser's cache, but I never access it from public computers.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30163506</id>
	<title>Re:Password Safe</title>
	<author>TenDimensions</author>
	<datestamp>1258625520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Too bad this isn't set up as a voting method.  I vote for Password Safe as well.  Doing a search on here seems to yield a lot of those.</p></htmltext>
<tokenext>Too bad this is n't set up as a voting method .
I vote for Password Safe as well .
Doing a search on here seems to yield a lot of those .</tokentext>
<sentencetext>Too bad this isn't set up as a voting method.
I vote for Password Safe as well.
Doing a search on here seems to yield a lot of those.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054660</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056314</id>
	<title>I only have two passwords</title>
	<author>Savior\_on\_a\_Stick</author>
	<datestamp>1257875400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>But they are ones I'll never forget.</p><p>And no one else would ever guess.</p><p>One is my uberstrong password, the other is for everything else.</p><p>Not having them written down anywhere is a big security plus, which I think makes it stronger than changing them so often that you have to "manage" them.</p></htmltext>
<tokenext>But they are ones I 'll never forget.And no one else would ever guess.One is my uberstrong password , the other is for everything else.Not having them written down anywhere is a big security plus , which I think makes it stronger than changing them so often that you have to " manage " them .</tokentext>
<sentencetext>But they are ones I'll never forget.And no one else would ever guess.One is my uberstrong password, the other is for everything else.Not having them written down anywhere is a big security plus, which I think makes it stronger than changing them so often that you have to "manage" them.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058474</id>
	<title>Text files in a directory</title>
	<author>greenlead</author>
	<datestamp>1257079200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I created a directory for web passwords, and I create a new text file for each site that I register with, using the GRC password generator. The text file includes email, username, and password. This directory is encrypted by TrueCrypt and opened each time I login.

</p><p>I'm gambling that 1) I'm not a high-profile attack for hacking 2) my firewall would add difficulty to any attack 3) malicious software wouldn't get installed 4) malicious software wouldn't be smart enough find the directory and parse its contents.

</p><p>The advantage of this approach is that each site has its own very good password.

</p><p>I've discovered that many sites have short password length limits, which are not disclosed on registration. It's frustrating to register with a long password, only to find out later that the site truncated it. This means that I have to figure out where it was truncated, or I have to reset the password and enter a new one.</p></htmltext>
<tokenext>I created a directory for web passwords , and I create a new text file for each site that I register with , using the GRC password generator .
The text file includes email , username , and password .
This directory is encrypted by TrueCrypt and opened each time I login .
I 'm gambling that 1 ) I 'm not a high-profile attack for hacking 2 ) my firewall would add difficulty to any attack 3 ) malicious software would n't get installed 4 ) malicious software would n't be smart enough find the directory and parse its contents .
The advantage of this approach is that each site has its own very good password .
I 've discovered that many sites have short password length limits , which are not disclosed on registration .
It 's frustrating to register with a long password , only to find out later that the site truncated it .
This means that I have to figure out where it was truncated , or I have to reset the password and enter a new one .</tokentext>
<sentencetext>I created a directory for web passwords, and I create a new text file for each site that I register with, using the GRC password generator.
The text file includes email, username, and password.
This directory is encrypted by TrueCrypt and opened each time I login.
I'm gambling that 1) I'm not a high-profile attack for hacking 2) my firewall would add difficulty to any attack 3) malicious software wouldn't get installed 4) malicious software wouldn't be smart enough find the directory and parse its contents.
The advantage of this approach is that each site has its own very good password.
I've discovered that many sites have short password length limits, which are not disclosed on registration.
It's frustrating to register with a long password, only to find out later that the site truncated it.
This means that I have to figure out where it was truncated, or I have to reset the password and enter a new one.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055486</id>
	<title>PasswordVault</title>
	<author>soulnet</author>
	<datestamp>1257868800000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>How about PasswordVault by Lava Software --&gt; <a href="http://www.lavasoftware.com/PasswordVault" title="lavasoftware.com" rel="nofollow">http://www.lavasoftware.com/PasswordVault</a> [lavasoftware.com]<br>They have binaries for Windows, Linux, Mac<br>There's also a portable version to put on a USB stick that will sync up with the Desktop version.<br>You can categorize you passwords and it has auto-fill features, amongst other features.</p></htmltext>
<tokenext>How about PasswordVault by Lava Software -- &gt; http : //www.lavasoftware.com/PasswordVault [ lavasoftware.com ] They have binaries for Windows , Linux , MacThere 's also a portable version to put on a USB stick that will sync up with the Desktop version.You can categorize you passwords and it has auto-fill features , amongst other features .</tokentext>
<sentencetext>How about PasswordVault by Lava Software --&gt; http://www.lavasoftware.com/PasswordVault [lavasoftware.com]They have binaries for Windows, Linux, MacThere's also a portable version to put on a USB stick that will sync up with the Desktop version.You can categorize you passwords and it has auto-fill features, amongst other features.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058890</id>
	<title>Problem with algorithms, pre-generated lists</title>
	<author>bradley13</author>
	<datestamp>1257083340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Several posters have proposed using a simple-but-obscure algorithm to generate passwords. I like this idea, for its sheer portability: no need for a USB key, or a special password management program. Other posters have also proposed interesting ideas - like starting from a meaningless fixed text and constructing a password from it.

</p><p>There is just one problem: &lt;rant&gt;What is it with those sites that "know better"? Your password must contains at least one capital letter, 2 digits, 3 special characters and four donkeys. Or else: your password may not contain any of the characters<nobr> <wbr></nobr>./*,:;\_ etc.? The fact that every such idiotic website has a <i>different</i> set of rules makes any sort of 100\% consistent password management impossible.&lt;/rant&gt;

</p><p>Sorry, just had to get that off my chest - having just yesterday been forced to create a password outside my system, because of some nitwit's idea of security. To add to the "amusement": it was a credit-card company. You know, the guys who invented that ultra-secure secret number printed on the back of your credit card.</p></htmltext>
<tokenext>Several posters have proposed using a simple-but-obscure algorithm to generate passwords .
I like this idea , for its sheer portability : no need for a USB key , or a special password management program .
Other posters have also proposed interesting ideas - like starting from a meaningless fixed text and constructing a password from it .
There is just one problem : What is it with those sites that " know better " ?
Your password must contains at least one capital letter , 2 digits , 3 special characters and four donkeys .
Or else : your password may not contain any of the characters ./ * , : ; \ _ etc. ?
The fact that every such idiotic website has a different set of rules makes any sort of 100 \ % consistent password management impossible .
Sorry , just had to get that off my chest - having just yesterday been forced to create a password outside my system , because of some nitwit 's idea of security .
To add to the " amusement " : it was a credit-card company .
You know , the guys who invented that ultra-secure secret number printed on the back of your credit card .</tokentext>
<sentencetext>Several posters have proposed using a simple-but-obscure algorithm to generate passwords.
I like this idea, for its sheer portability: no need for a USB key, or a special password management program.
Other posters have also proposed interesting ideas - like starting from a meaningless fixed text and constructing a password from it.
There is just one problem: What is it with those sites that "know better"?
Your password must contains at least one capital letter, 2 digits, 3 special characters and four donkeys.
Or else: your password may not contain any of the characters ./*,:;\_ etc.?
The fact that every such idiotic website has a different set of rules makes any sort of 100\% consistent password management impossible.
Sorry, just had to get that off my chest - having just yesterday been forced to create a password outside my system, because of some nitwit's idea of security.
To add to the "amusement": it was a credit-card company.
You know, the guys who invented that ultra-secure secret number printed on the back of your credit card.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054920</id>
	<title>PDAs</title>
	<author>rwa2</author>
	<datestamp>1257865560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I'm old skool, so I have most of my stuff in KeyRing for PalmOS.  There's a jpilot plugin so I can sync and access it from Linux.</p><p>Someday I plan to migrate to KeePass, and then have some plugin automatically sync and login with Firefox using some sort of master password.</p><p>Also need to make some dead man's switch so my wife can get access to all of the accounts if something happens to me.  Right now my plan is to write down my master password with my last drops of blood as I lie face down on the pavement.</p></htmltext>
<tokenext>I 'm old skool , so I have most of my stuff in KeyRing for PalmOS .
There 's a jpilot plugin so I can sync and access it from Linux.Someday I plan to migrate to KeePass , and then have some plugin automatically sync and login with Firefox using some sort of master password.Also need to make some dead man 's switch so my wife can get access to all of the accounts if something happens to me .
Right now my plan is to write down my master password with my last drops of blood as I lie face down on the pavement .</tokentext>
<sentencetext>I'm old skool, so I have most of my stuff in KeyRing for PalmOS.
There's a jpilot plugin so I can sync and access it from Linux.Someday I plan to migrate to KeePass, and then have some plugin automatically sync and login with Firefox using some sort of master password.Also need to make some dead man's switch so my wife can get access to all of the accounts if something happens to me.
Right now my plan is to write down my master password with my last drops of blood as I lie face down on the pavement.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058048</id>
	<title>Re:Notecard In Wallet For Life</title>
	<author>ChameleonDave</author>
	<datestamp>1257074400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>That's a good idea, but don't actually write down the real password.  Instead, write down a password <em>reminder</em>.  For example, have a case-switching rule.  So, if your wallet says "sLash.r0X", your real password is "SlASH.R0x".  Or else write it backwards, etc.

</p><p>Still change your passwords if the slip of paper is stolen, though.</p></htmltext>
<tokenext>That 's a good idea , but do n't actually write down the real password .
Instead , write down a password reminder .
For example , have a case-switching rule .
So , if your wallet says " sLash.r0X " , your real password is " SlASH.R0x " .
Or else write it backwards , etc .
Still change your passwords if the slip of paper is stolen , though .</tokentext>
<sentencetext>That's a good idea, but don't actually write down the real password.
Instead, write down a password reminder.
For example, have a case-switching rule.
So, if your wallet says "sLash.r0X", your real password is "SlASH.R0x".
Or else write it backwards, etc.
Still change your passwords if the slip of paper is stolen, though.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055140</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058244</id>
	<title>Re:PassGorithm - One Algorithm, infinite passwords</title>
	<author>L4t3r4lu5</author>
	<datestamp>1257076320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>What if you forget your algorithm?</htmltext>
<tokenext>What if you forget your algorithm ?</tokentext>
<sentencetext>What if you forget your algorithm?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054886</id>
	<title>vim gpg</title>
	<author>pongo000</author>
	<datestamp>1257865380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I'm not kidding...get it <a href="http://www.vim.org/scripts/script.php?script\_id=661" title="vim.org">here</a> [vim.org].</p><p>I keep an encrypted password file (several copies, actually) that I use with a GPG key.  If GPG is good enough to general-use encryption, it's certainly good enough for your password needs.</p></htmltext>
<tokenext>I 'm not kidding...get it here [ vim.org ] .I keep an encrypted password file ( several copies , actually ) that I use with a GPG key .
If GPG is good enough to general-use encryption , it 's certainly good enough for your password needs .</tokentext>
<sentencetext>I'm not kidding...get it here [vim.org].I keep an encrypted password file (several copies, actually) that I use with a GPG key.
If GPG is good enough to general-use encryption, it's certainly good enough for your password needs.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054634</id>
	<title>Re:Keepass</title>
	<author>supersloshy</author>
	<datestamp>1257864180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Mod parent up. Keepassx, as another comment suggested, is great as well.</p></htmltext>
<tokenext>Mod parent up .
Keepassx , as another comment suggested , is great as well .</tokentext>
<sentencetext>Mod parent up.
Keepassx, as another comment suggested, is great as well.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057878</id>
	<title>Re:supergenpass ?</title>
	<author>Anonymous</author>
	<datestamp>1257072360000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>mod parent up, supergenpass is awesome.</p></htmltext>
<tokenext>mod parent up , supergenpass is awesome .</tokentext>
<sentencetext>mod parent up, supergenpass is awesome.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054646</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063264</id>
	<title>Encrypted vim and shorthand</title>
	<author>PunXX0r</author>
	<datestamp>1257103560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use an encrypted file (to which I remember the encryption key) which has all of my logins and URLs, and the first 3 or 4 characters of the associated password.  Between the file encryption and the fact that only a 25-30\% fraction of each password is listed, I feel that I am pretty safe.  My passwords tend to look like this: <br> <br>

$uns#!n34tn!t3  (sunshine at night)<br> <br><nobr> <wbr></nobr>...so a typical entry would look like this:<br> <br>

<a href="http://www.punkisnotdead.com/" title="punkisnotdead.com" rel="nofollow">http://www.punkisnotdead.com/</a> [punkisnotdead.com]                   PunXX0r                    $un</htmltext>
<tokenext>I use an encrypted file ( to which I remember the encryption key ) which has all of my logins and URLs , and the first 3 or 4 characters of the associated password .
Between the file encryption and the fact that only a 25-30 \ % fraction of each password is listed , I feel that I am pretty safe .
My passwords tend to look like this : $ uns # ! n34tn ! t3 ( sunshine at night ) ...so a typical entry would look like this : http : //www.punkisnotdead.com/ [ punkisnotdead.com ] PunXX0r $ un</tokentext>
<sentencetext>I use an encrypted file (to which I remember the encryption key) which has all of my logins and URLs, and the first 3 or 4 characters of the associated password.
Between the file encryption and the fact that only a 25-30\% fraction of each password is listed, I feel that I am pretty safe.
My passwords tend to look like this:  

$uns#!n34tn!t3  (sunshine at night)  ...so a typical entry would look like this: 

http://www.punkisnotdead.com/ [punkisnotdead.com]                   PunXX0r                    $un</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054504</id>
	<title>Anonymous account</title>
	<author>Anonymous</author>
	<datestamp>1257863580000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>I only use the anonymous account. No one will ever know the password. Haha<nobr> <wbr></nobr>.. wait!</htmltext>
<tokenext>I only use the anonymous account .
No one will ever know the password .
Haha .. wait !</tokentext>
<sentencetext>I only use the anonymous account.
No one will ever know the password.
Haha .. wait!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056434</id>
	<title>Re:Truecrypt</title>
	<author>WuphonsReach</author>
	<datestamp>1257876780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><i>Do what I set up for my father, Truecrypt installed to a USB key, passwords in a plaintext file inside the arcive.</i> <br>
<br>
Which means that as soon as the encrypted volume is mounted, all of the passwords are exposed.  (It's an inherent weakness of encrypted volumes.  Encrypted volumesare only secure when not mounted.)<br>
<br>
For more security conscious logins, you should be encrypting the contents of that text file with GPG/PGP.  And keeping different sites in different files, so that decrypting one file only exposes sites listed in that file.</htmltext>
<tokenext>Do what I set up for my father , Truecrypt installed to a USB key , passwords in a plaintext file inside the arcive .
Which means that as soon as the encrypted volume is mounted , all of the passwords are exposed .
( It 's an inherent weakness of encrypted volumes .
Encrypted volumesare only secure when not mounted .
) For more security conscious logins , you should be encrypting the contents of that text file with GPG/PGP .
And keeping different sites in different files , so that decrypting one file only exposes sites listed in that file .</tokentext>
<sentencetext>Do what I set up for my father, Truecrypt installed to a USB key, passwords in a plaintext file inside the arcive.
Which means that as soon as the encrypted volume is mounted, all of the passwords are exposed.
(It's an inherent weakness of encrypted volumes.
Encrypted volumesare only secure when not mounted.
)

For more security conscious logins, you should be encrypting the contents of that text file with GPG/PGP.
And keeping different sites in different files, so that decrypting one file only exposes sites listed in that file.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056576</id>
	<title>Re:Keepass</title>
	<author>The Cyberwolfe</author>
	<datestamp>1257878040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>another +1 for KeePass. I used to do the paper-in-wallet method, but the list grew too long to sit on every day.</htmltext>
<tokenext>another + 1 for KeePass .
I used to do the paper-in-wallet method , but the list grew too long to sit on every day .</tokentext>
<sentencetext>another +1 for KeePass.
I used to do the paper-in-wallet method, but the list grew too long to sit on every day.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056528</id>
	<title>Re:Keepass</title>
	<author>no.good.at.coding</author>
	<datestamp>1257877680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>KeePass is pretty awesome:</p><p>1. FOSS<br>2. 'Unofficial' ports for Linux, Mac OS X, JME, iPhone, BlackBerry, PalmOS and Android</p><p>These are features on the Windows build so I'm not sure how many of these are available on the ports:<br>3. You can secure your passwords DB with a passphrase, keyfile or your Windows user account (I don't know why anyone would pick that one though, one reinstall and you're locked out)<br>4. Nifty features like automatically clearing the clipboard after a timeout, automatically locking the interface on certain triggers and auto-type (automatically type in the username and password into other windows, like a form on a webpage when you hit a key combo)<br>5. Auto-generation of strong passwords</p><p>It'll create an encrypted DB of your passwords which is stored as a file. So you can easily take it with you. I use Dropbox to sync mine across all my machines. And if you use a portable version on a USB stick, you can access your updated DB from any machine.</p></htmltext>
<tokenext>KeePass is pretty awesome : 1 .
FOSS2. 'Unofficial ' ports for Linux , Mac OS X , JME , iPhone , BlackBerry , PalmOS and AndroidThese are features on the Windows build so I 'm not sure how many of these are available on the ports : 3 .
You can secure your passwords DB with a passphrase , keyfile or your Windows user account ( I do n't know why anyone would pick that one though , one reinstall and you 're locked out ) 4 .
Nifty features like automatically clearing the clipboard after a timeout , automatically locking the interface on certain triggers and auto-type ( automatically type in the username and password into other windows , like a form on a webpage when you hit a key combo ) 5 .
Auto-generation of strong passwordsIt 'll create an encrypted DB of your passwords which is stored as a file .
So you can easily take it with you .
I use Dropbox to sync mine across all my machines .
And if you use a portable version on a USB stick , you can access your updated DB from any machine .</tokentext>
<sentencetext>KeePass is pretty awesome:1.
FOSS2. 'Unofficial' ports for Linux, Mac OS X, JME, iPhone, BlackBerry, PalmOS and AndroidThese are features on the Windows build so I'm not sure how many of these are available on the ports:3.
You can secure your passwords DB with a passphrase, keyfile or your Windows user account (I don't know why anyone would pick that one though, one reinstall and you're locked out)4.
Nifty features like automatically clearing the clipboard after a timeout, automatically locking the interface on certain triggers and auto-type (automatically type in the username and password into other windows, like a form on a webpage when you hit a key combo)5.
Auto-generation of strong passwordsIt'll create an encrypted DB of your passwords which is stored as a file.
So you can easily take it with you.
I use Dropbox to sync mine across all my machines.
And if you use a portable version on a USB stick, you can access your updated DB from any machine.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30071402</id>
	<title>draw on keyboard</title>
	<author>Anonymous</author>
	<datestamp>1258034760000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I have by passwords as drawings on keyboard. Example: one of my (old) passwords is hnji9 - as in the tick in nike and letter 'N' at the bottom.</p></htmltext>
<tokenext>I have by passwords as drawings on keyboard .
Example : one of my ( old ) passwords is hnji9 - as in the tick in nike and letter 'N ' at the bottom .</tokentext>
<sentencetext>I have by passwords as drawings on keyboard.
Example: one of my (old) passwords is hnji9 - as in the tick in nike and letter 'N' at the bottom.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056820</id>
	<title>These look good</title>
	<author>Anonymous</author>
	<datestamp>1257880260000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>http://www.mojopac.com/</p><p>https://www.ironkey.com/</p></htmltext>
<tokenext>http : //www.mojopac.com/https : //www.ironkey.com/</tokentext>
<sentencetext>http://www.mojopac.com/https://www.ironkey.com/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30072200</id>
	<title>Re:PasswordSafe</title>
	<author>Anonymous</author>
	<datestamp>1258039560000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Yes, this is what I use at home and at work. In fact, the whole IT department uses it for various server admin logins. We have used it for years now, and it has several good features, including one-click web page auto login.</p></htmltext>
<tokenext>Yes , this is what I use at home and at work .
In fact , the whole IT department uses it for various server admin logins .
We have used it for years now , and it has several good features , including one-click web page auto login .</tokentext>
<sentencetext>Yes, this is what I use at home and at work.
In fact, the whole IT department uses it for various server admin logins.
We have used it for years now, and it has several good features, including one-click web page auto login.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059284</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>Anonymous</author>
	<datestamp>1257086640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I love it!</p></htmltext>
<tokenext>I love it !</tokentext>
<sentencetext>I love it!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056370</id>
	<title>Re:Keepass</title>
	<author>HAKdragon</author>
	<datestamp>1257876060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have a keepass database on my local machine, but it requires both a password and a key file that I have on my at all times (on a physically tiny flash drive on my keychain)</htmltext>
<tokenext>I have a keepass database on my local machine , but it requires both a password and a key file that I have on my at all times ( on a physically tiny flash drive on my keychain )</tokentext>
<sentencetext>I have a keepass database on my local machine, but it requires both a password and a key file that I have on my at all times (on a physically tiny flash drive on my keychain)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30073394</id>
	<title>app and method</title>
	<author>Avatar8</author>
	<datestamp>1258044360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If you use Windows based computers, I'd recommend Acerose ( <a href="http://www.dexadine.com/acerose.html" title="dexadine.com">http://www.dexadine.com/acerose.html</a> [dexadine.com] ). Put it on a thumb drive for portability.<p>
Also as some have recommended techniques with written "password," type out your password but add a common or nonsense word into the middle of it. Then you just know to remove that word.</p></htmltext>
<tokenext>If you use Windows based computers , I 'd recommend Acerose ( http : //www.dexadine.com/acerose.html [ dexadine.com ] ) .
Put it on a thumb drive for portability .
Also as some have recommended techniques with written " password , " type out your password but add a common or nonsense word into the middle of it .
Then you just know to remove that word .</tokentext>
<sentencetext>If you use Windows based computers, I'd recommend Acerose ( http://www.dexadine.com/acerose.html [dexadine.com] ).
Put it on a thumb drive for portability.
Also as some have recommended techniques with written "password," type out your password but add a common or nonsense word into the middle of it.
Then you just know to remove that word.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063864</id>
	<title>Re:paper in your wallet</title>
	<author>AlejoHausner</author>
	<datestamp>1257105660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>&gt; If your wallet is lost, immediately set all your passwords to something temporary</p><p>Hang on!  If he lost the magic cheat sheet in his wallet, how can he log into all those websites and change his passwords?  If he can pull that off, that means he memorized the passwords and doesn't need the cheat sheet in the first place.</p><p>Huh?</p><p>Alejo</p></htmltext>
<tokenext>&gt; If your wallet is lost , immediately set all your passwords to something temporaryHang on !
If he lost the magic cheat sheet in his wallet , how can he log into all those websites and change his passwords ?
If he can pull that off , that means he memorized the passwords and does n't need the cheat sheet in the first place.Huh ? Alejo</tokentext>
<sentencetext>&gt; If your wallet is lost, immediately set all your passwords to something temporaryHang on!
If he lost the magic cheat sheet in his wallet, how can he log into all those websites and change his passwords?
If he can pull that off, that means he memorized the passwords and doesn't need the cheat sheet in the first place.Huh?Alejo</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054668</id>
	<title>Re:Keepass</title>
	<author>Anonymous</author>
	<datestamp>1257864300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>It's cross-platform and available as a portable app that runs off a USB stick. Another vote for KeePass.</p></htmltext>
<tokenext>It 's cross-platform and available as a portable app that runs off a USB stick .
Another vote for KeePass .</tokentext>
<sentencetext>It's cross-platform and available as a portable app that runs off a USB stick.
Another vote for KeePass.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064698</id>
	<title>OpenSSL - encrypt file</title>
	<author>Anonymous</author>
	<datestamp>1257108780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Use OpenSSL to encrypt the file. You can carry OpenSSL on your thumb drive with the AES encrypted file as well.</p><p>Of cours you will need to remember the password you used to encrypt it. But that should be the case with most secure/semi-secure solutions.</p><p>http://www.madboa.com/geek/openssl/<br>openssl enc -aes-256-cbc -salt -in file.txt -out file.enc -pass pass:MySillyPassword</p><p>It is on MANY OS's and FREE.</p></htmltext>
<tokenext>Use OpenSSL to encrypt the file .
You can carry OpenSSL on your thumb drive with the AES encrypted file as well.Of cours you will need to remember the password you used to encrypt it .
But that should be the case with most secure/semi-secure solutions.http : //www.madboa.com/geek/openssl/openssl enc -aes-256-cbc -salt -in file.txt -out file.enc -pass pass : MySillyPasswordIt is on MANY OS 's and FREE .</tokentext>
<sentencetext>Use OpenSSL to encrypt the file.
You can carry OpenSSL on your thumb drive with the AES encrypted file as well.Of cours you will need to remember the password you used to encrypt it.
But that should be the case with most secure/semi-secure solutions.http://www.madboa.com/geek/openssl/openssl enc -aes-256-cbc -salt -in file.txt -out file.enc -pass pass:MySillyPasswordIt is on MANY OS's and FREE.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055812</id>
	<title>The Rotating Theme System</title>
	<author>beadfulthings</author>
	<datestamp>1257871020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>What with one thing and another, I've been having to remember passwords for at least twenty years--and the number has only increased. I use a rotating theme system. Every six weeks or every month or whatever security seems to dictate at the time, I pick a new theme. Successful themes have included: Old boyfriends, cars I have owned/want to own, ice cream flavors, species of birds, dog breeds, former phone numbers and zip codes, lines or words from a song, botanical names, astronomical names, book characters, etc. I then go through and change all my passwords so that they relate to the current theme--with appropriate injections of numbers and punctuation marks. If the passwords are somewhat interrelated, I seem much less likely to forget one. My method isn't foolproof, and I'm sure the security-minded could poke plenty of holes in it. But I've never had to write down a password, I seldom forget one, and I've yet to have one guessed. All I have to do is remember, "Oh. Right. It's 'A Tale of Two Cities' right now."</p></htmltext>
<tokenext>What with one thing and another , I 've been having to remember passwords for at least twenty years--and the number has only increased .
I use a rotating theme system .
Every six weeks or every month or whatever security seems to dictate at the time , I pick a new theme .
Successful themes have included : Old boyfriends , cars I have owned/want to own , ice cream flavors , species of birds , dog breeds , former phone numbers and zip codes , lines or words from a song , botanical names , astronomical names , book characters , etc .
I then go through and change all my passwords so that they relate to the current theme--with appropriate injections of numbers and punctuation marks .
If the passwords are somewhat interrelated , I seem much less likely to forget one .
My method is n't foolproof , and I 'm sure the security-minded could poke plenty of holes in it .
But I 've never had to write down a password , I seldom forget one , and I 've yet to have one guessed .
All I have to do is remember , " Oh .
Right. It 's 'A Tale of Two Cities ' right now .
"</tokentext>
<sentencetext>What with one thing and another, I've been having to remember passwords for at least twenty years--and the number has only increased.
I use a rotating theme system.
Every six weeks or every month or whatever security seems to dictate at the time, I pick a new theme.
Successful themes have included: Old boyfriends, cars I have owned/want to own, ice cream flavors, species of birds, dog breeds, former phone numbers and zip codes, lines or words from a song, botanical names, astronomical names, book characters, etc.
I then go through and change all my passwords so that they relate to the current theme--with appropriate injections of numbers and punctuation marks.
If the passwords are somewhat interrelated, I seem much less likely to forget one.
My method isn't foolproof, and I'm sure the security-minded could poke plenty of holes in it.
But I've never had to write down a password, I seldom forget one, and I've yet to have one guessed.
All I have to do is remember, "Oh.
Right. It's 'A Tale of Two Cities' right now.
"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054690</id>
	<title>Keepass</title>
	<author>Lorien\_the\_first\_one</author>
	<datestamp>1257864360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Keepass is cross platform works on PC and Linux.<nobr> <wbr></nobr>:)  Makes it easy to keep different credentials for every site you go to.  Keeps passwords in an encrypted file.
<br> <br>
<a href="http://keepass.info/" title="keepass.info">http://keepass.info/</a> [keepass.info]</htmltext>
<tokenext>Keepass is cross platform works on PC and Linux .
: ) Makes it easy to keep different credentials for every site you go to .
Keeps passwords in an encrypted file .
http : //keepass.info/ [ keepass.info ]</tokentext>
<sentencetext>Keepass is cross platform works on PC and Linux.
:)  Makes it easy to keep different credentials for every site you go to.
Keeps passwords in an encrypted file.
http://keepass.info/ [keepass.info]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494</id>
	<title>Keepass</title>
	<author>gad\_zuki!</author>
	<datestamp>1257863520000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><p><a href="http://keepass.info/download.html" title="keepass.info">http://keepass.info/download.html</a> [keepass.info]</p></htmltext>
<tokenext>http : //keepass.info/download.html [ keepass.info ]</tokentext>
<sentencetext>http://keepass.info/download.html [keepass.info]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057836</id>
	<title>AI Roboform</title>
	<author>Anonymous</author>
	<datestamp>1257071640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I would suggest AI Roboform 2 Go.  I was surprised to see no one mention it.  It can be carried on a flash drive, alll records encrypted, and a master password set.  It will run the software as soon as the drive mounts.  It works for all the major Internet browsers and many system password prompts.  It only runs on windows unfortunately.  You could also store password for other things manually in it for the non-website/dialogue type stuff.</p></htmltext>
<tokenext>I would suggest AI Roboform 2 Go .
I was surprised to see no one mention it .
It can be carried on a flash drive , alll records encrypted , and a master password set .
It will run the software as soon as the drive mounts .
It works for all the major Internet browsers and many system password prompts .
It only runs on windows unfortunately .
You could also store password for other things manually in it for the non-website/dialogue type stuff .</tokentext>
<sentencetext>I would suggest AI Roboform 2 Go.
I was surprised to see no one mention it.
It can be carried on a flash drive, alll records encrypted, and a master password set.
It will run the software as soon as the drive mounts.
It works for all the major Internet browsers and many system password prompts.
It only runs on windows unfortunately.
You could also store password for other things manually in it for the non-website/dialogue type stuff.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054588</id>
	<title>Password Manager XP</title>
	<author>RudySolis</author>
	<datestamp>1257863940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>from <a href="http://www.cp-lab.com/" title="cp-lab.com" rel="nofollow">http://www.cp-lab.com/</a> [cp-lab.com] <br>
<br>
Works great, is inexpensive and secure.<br> <br>
We use it at work and can assign different users different permissions.<br> <br>
It's also portable, so you don't have to install it on your computer, you can copy it to a thumbdrive and take it with you anywhere.</htmltext>
<tokenext>from http : //www.cp-lab.com/ [ cp-lab.com ] Works great , is inexpensive and secure .
We use it at work and can assign different users different permissions .
It 's also portable , so you do n't have to install it on your computer , you can copy it to a thumbdrive and take it with you anywhere .</tokentext>
<sentencetext>from http://www.cp-lab.com/ [cp-lab.com] 

Works great, is inexpensive and secure.
We use it at work and can assign different users different permissions.
It's also portable, so you don't have to install it on your computer, you can copy it to a thumbdrive and take it with you anywhere.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056022</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>icegreentea</author>
	<datestamp>1257872520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If you really wanted to be tricky, you could rot13, or any simple sub cipher it and then right it down. For example, I have to keep track of a lot of locker combinations, so I just keep them all written down with all the numbers shifted the same way.<br><br>Or if you wanted to be really tricky, just have a lot of sticky notes full of mundane stuff (like meeting at x time with whoever). And hide your passwords in there somehow. First letter in sentences or something. Have fun with it.</htmltext>
<tokenext>If you really wanted to be tricky , you could rot13 , or any simple sub cipher it and then right it down .
For example , I have to keep track of a lot of locker combinations , so I just keep them all written down with all the numbers shifted the same way.Or if you wanted to be really tricky , just have a lot of sticky notes full of mundane stuff ( like meeting at x time with whoever ) .
And hide your passwords in there somehow .
First letter in sentences or something .
Have fun with it .</tokentext>
<sentencetext>If you really wanted to be tricky, you could rot13, or any simple sub cipher it and then right it down.
For example, I have to keep track of a lot of locker combinations, so I just keep them all written down with all the numbers shifted the same way.Or if you wanted to be really tricky, just have a lot of sticky notes full of mundane stuff (like meeting at x time with whoever).
And hide your passwords in there somehow.
First letter in sentences or something.
Have fun with it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059662</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>noidentity</author>
	<datestamp>1257088560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Post-It notes [on the monitor] have the distinct advantage that no computer virus or Trojan can steal it.</p></div>
</blockquote><p>"Hey baby, hold a mirror up so I can see myself." and then your computer's camera gets a snapshot of all the post-it notes on the monitor.</p></div>
	</htmltext>
<tokenext>Post-It notes [ on the monitor ] have the distinct advantage that no computer virus or Trojan can steal it .
" Hey baby , hold a mirror up so I can see myself .
" and then your computer 's camera gets a snapshot of all the post-it notes on the monitor .</tokentext>
<sentencetext>Post-It notes [on the monitor] have the distinct advantage that no computer virus or Trojan can steal it.
"Hey baby, hold a mirror up so I can see myself.
" and then your computer's camera gets a snapshot of all the post-it notes on the monitor.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056132</id>
	<title>Keepass</title>
	<author>Anonymous</author>
	<datestamp>1257873540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Keepass.  Done.  Works on almost every os, hell even on my google phone.</p></htmltext>
<tokenext>Keepass .
Done. Works on almost every os , hell even on my google phone .</tokentext>
<sentencetext>Keepass.
Done.  Works on almost every os, hell even on my google phone.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054626</id>
	<title>File Encryption or KeePass</title>
	<author>Anonymous</author>
	<datestamp>1257864120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>You can try KeePass to store all your passwords or by far the easiest method is to to save all the passwords in a text file &amp; encrypt the file using any file encryption tool like AxCrypt.</p></htmltext>
<tokenext>You can try KeePass to store all your passwords or by far the easiest method is to to save all the passwords in a text file &amp; encrypt the file using any file encryption tool like AxCrypt .</tokentext>
<sentencetext>You can try KeePass to store all your passwords or by far the easiest method is to to save all the passwords in a text file &amp; encrypt the file using any file encryption tool like AxCrypt.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056898</id>
	<title>Re:Hashing Works</title>
	<author>Anonymous</author>
	<datestamp>1257881100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Until the website gets an overhaul... then you're SOL.</p></htmltext>
<tokenext>Until the website gets an overhaul... then you 're SOL .</tokentext>
<sentencetext>Until the website gets an overhaul... then you're SOL.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055478</id>
	<title>MD5</title>
	<author>klui</author>
	<datestamp>1257868740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use a template that contains some characters along with something that is specific to the website I wish to generate a passphrase then I use md5 and that becomes the password. For sites that have a limit on characters, I just use cut. This is only for public sites like slashdot, digg, etc.</p><p>For sites that use SSL, I don't hash my passphrase.</p></htmltext>
<tokenext>I use a template that contains some characters along with something that is specific to the website I wish to generate a passphrase then I use md5 and that becomes the password .
For sites that have a limit on characters , I just use cut .
This is only for public sites like slashdot , digg , etc.For sites that use SSL , I do n't hash my passphrase .</tokentext>
<sentencetext>I use a template that contains some characters along with something that is specific to the website I wish to generate a passphrase then I use md5 and that becomes the password.
For sites that have a limit on characters, I just use cut.
This is only for public sites like slashdot, digg, etc.For sites that use SSL, I don't hash my passphrase.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055320</id>
	<title>Re:Post-It Note on the Monitor</title>
	<author>Anonymous</author>
	<datestamp>1257867780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Post-It notes have the distinct advantage that no computer virus or Trojan can steal it.</p></div></blockquote><p>But on the downside:</p><ul>
<li>They tend to fall off and get lost as the adhesive wears</li><li>They're easy to steal by anyone nearby, and identity theft is often committed by those with physical access to your paper effects</li><li>They're not as easy to back up redundantly and off-site</li><li>They're too easy to damage by fire, water, pests, etc.</li></ul><p>Personally, I'd rather trust a backed up encrypted database using a strong password, than an easy-to-lose scrap of paper.</p></div>
	</htmltext>
<tokenext>Post-It notes have the distinct advantage that no computer virus or Trojan can steal it.But on the downside : They tend to fall off and get lost as the adhesive wearsThey 're easy to steal by anyone nearby , and identity theft is often committed by those with physical access to your paper effectsThey 're not as easy to back up redundantly and off-siteThey 're too easy to damage by fire , water , pests , etc.Personally , I 'd rather trust a backed up encrypted database using a strong password , than an easy-to-lose scrap of paper .</tokentext>
<sentencetext>Post-It notes have the distinct advantage that no computer virus or Trojan can steal it.But on the downside:
They tend to fall off and get lost as the adhesive wearsThey're easy to steal by anyone nearby, and identity theft is often committed by those with physical access to your paper effectsThey're not as easy to back up redundantly and off-siteThey're too easy to damage by fire, water, pests, etc.Personally, I'd rather trust a backed up encrypted database using a strong password, than an easy-to-lose scrap of paper.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055254</id>
	<title>The web2.0 way</title>
	<author>mysidia</author>
	<datestamp>1257867360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>
<a href="http://www.passpack.com/en/home/" title="passpack.com" rel="nofollow">Passpack.com</a> [passpack.com].
Actually, the site seems uncharacteristically sluggish at the moment... better be sure to download the offline client and use it to keep a local backup of the DB.
</p><p>
Good enough for personal passwords.  For really sensitive enterprise stuff,  it may be ideal to use an Enterprise password management product,  such as a Passpack appliance (whenever they get to making that),  or Citrix Password Manager.
</p><p>
Generally the requirements for businesses include strong encryption, multi-user access, and role-based access controls..
Most simple DB methods lack detailed access controls.
</p><p>
Some Enterprise password managers also provide options to allow a user to <b>utilize the password</b>  to login to something, from the application, it will launch a browser or ssh/telnet directly with login details filled..</p><p>In some cases, allows user login without their workstation <b>allowing them to know what the password actually is</b>  that is being submitted.
Or requires a separate action be taken to 'see' the password, which generates a special audit record.
</p><p>
That way, if someone's  terminated, or stripped of certain roles  (and therefore access to certain passwords),   it may not be quite as urgent  to change them all immediately,  or the passwords they actually chose to view can be changed first.
</p><p>
Policy might be for a password to always be changed  to a new random password within  3 days
of someone clicking on the "show me this password"  link.     To  ensure use of the PWM is for one-time access,  and protect against improper practices such as  \_writing down\_ passwords  or recording them outside the official DB.
</p></htmltext>
<tokenext>Passpack.com [ passpack.com ] .
Actually , the site seems uncharacteristically sluggish at the moment... better be sure to download the offline client and use it to keep a local backup of the DB .
Good enough for personal passwords .
For really sensitive enterprise stuff , it may be ideal to use an Enterprise password management product , such as a Passpack appliance ( whenever they get to making that ) , or Citrix Password Manager .
Generally the requirements for businesses include strong encryption , multi-user access , and role-based access controls. . Most simple DB methods lack detailed access controls .
Some Enterprise password managers also provide options to allow a user to utilize the password to login to something , from the application , it will launch a browser or ssh/telnet directly with login details filled..In some cases , allows user login without their workstation allowing them to know what the password actually is that is being submitted .
Or requires a separate action be taken to 'see ' the password , which generates a special audit record .
That way , if someone 's terminated , or stripped of certain roles ( and therefore access to certain passwords ) , it may not be quite as urgent to change them all immediately , or the passwords they actually chose to view can be changed first .
Policy might be for a password to always be changed to a new random password within 3 days of someone clicking on the " show me this password " link .
To ensure use of the PWM is for one-time access , and protect against improper practices such as \ _writing down \ _ passwords or recording them outside the official DB .</tokentext>
<sentencetext>
Passpack.com [passpack.com].
Actually, the site seems uncharacteristically sluggish at the moment... better be sure to download the offline client and use it to keep a local backup of the DB.
Good enough for personal passwords.
For really sensitive enterprise stuff,  it may be ideal to use an Enterprise password management product,  such as a Passpack appliance (whenever they get to making that),  or Citrix Password Manager.
Generally the requirements for businesses include strong encryption, multi-user access, and role-based access controls..
Most simple DB methods lack detailed access controls.
Some Enterprise password managers also provide options to allow a user to utilize the password  to login to something, from the application, it will launch a browser or ssh/telnet directly with login details filled..In some cases, allows user login without their workstation allowing them to know what the password actually is  that is being submitted.
Or requires a separate action be taken to 'see' the password, which generates a special audit record.
That way, if someone's  terminated, or stripped of certain roles  (and therefore access to certain passwords),   it may not be quite as urgent  to change them all immediately,  or the passwords they actually chose to view can be changed first.
Policy might be for a password to always be changed  to a new random password within  3 days
of someone clicking on the "show me this password"  link.
To  ensure use of the PWM is for one-time access,  and protect against improper practices such as  \_writing down\_ passwords  or recording them outside the official DB.
</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065284</id>
	<title>Re:Passphrases from books</title>
	<author>beezelle</author>
	<datestamp>1257068100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Holy crap. I used to use a variant of "Stately, plump Buck Mulligan" as one of my passphrases. Seeing this here gives me the same sense of disappointment I have whenever I get hits typing gibberish into Google.</htmltext>
<tokenext>Holy crap .
I used to use a variant of " Stately , plump Buck Mulligan " as one of my passphrases .
Seeing this here gives me the same sense of disappointment I have whenever I get hits typing gibberish into Google .</tokentext>
<sentencetext>Holy crap.
I used to use a variant of "Stately, plump Buck Mulligan" as one of my passphrases.
Seeing this here gives me the same sense of disappointment I have whenever I get hits typing gibberish into Google.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055466</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054594</id>
	<title>Gator!</title>
	<author>Anonymous</author>
	<datestamp>1257864000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>the best spyware password tool evar</p></htmltext>
<tokenext>the best spyware password tool evar</tokentext>
<sentencetext>the best spyware password tool evar</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057378</id>
	<title>dan</title>
	<author>Anonymous</author>
	<datestamp>1257109020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I am always using "fuck.$systemname" as my password so its easy to remember this for me...</p><p>for my mail I use "fuck.mail"<br>for my facebook account I use "fuck.facebook"<br>mysql -&gt; fuck.mysql</p></htmltext>
<tokenext>I am always using " fuck. $ systemname " as my password so its easy to remember this for me...for my mail I use " fuck.mail " for my facebook account I use " fuck.facebook " mysql - &gt; fuck.mysql</tokentext>
<sentencetext>I am always using "fuck.$systemname" as my password so its easy to remember this for me...for my mail I use "fuck.mail"for my facebook account I use "fuck.facebook"mysql -&gt; fuck.mysql</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057960</id>
	<title>Re:Simple</title>
	<author>Anonymous</author>
	<datestamp>1257073500000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>hah, everyone knows "4321" is more secure.</p></htmltext>
<tokenext>hah , everyone knows " 4321 " is more secure .</tokentext>
<sentencetext>hah, everyone knows "4321" is more secure.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059696</id>
	<title>Password too short....</title>
	<author>Ralz</author>
	<datestamp>1257088680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I once tried to set my password to 'penis'.

It said that my password was too short....</htmltext>
<tokenext>I once tried to set my password to 'penis' .
It said that my password was too short... .</tokentext>
<sentencetext>I once tried to set my password to 'penis'.
It said that my password was too short....</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061268</id>
	<title>Re:Hashing Works</title>
	<author>EEBaum</author>
	<datestamp>1257095460000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext>I've been doing this for years... great system.  The one problem I've run into is when a site changes names or is bought out (e.g. Chase now owns WaMu).  I then have to either change my password or try to remember how the history of mergers and acquisitions went down.</htmltext>
<tokenext>I 've been doing this for years... great system .
The one problem I 've run into is when a site changes names or is bought out ( e.g .
Chase now owns WaMu ) .
I then have to either change my password or try to remember how the history of mergers and acquisitions went down .</tokentext>
<sentencetext>I've been doing this for years... great system.
The one problem I've run into is when a site changes names or is bought out (e.g.
Chase now owns WaMu).
I then have to either change my password or try to remember how the history of mergers and acquisitions went down.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055306</id>
	<title>LastPass</title>
	<author>Anonymous</author>
	<datestamp>1257867660000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>I can't believe nobody mentioned LastPass yet.  I've been using this for a year or two now and its awesome.</p><p>Works everywhere and fills out the form for you... under IE, Firefox, Chrome, etc... has apps for iPhone and whatnot.  Works under Linux, Mac, Windows...</p><p>Keeps the password stored on the lastpass servers, encrypted.  Can backup easily...</p><p>I tried many password managers, this one is easily the best.</p></htmltext>
<tokenext>I ca n't believe nobody mentioned LastPass yet .
I 've been using this for a year or two now and its awesome.Works everywhere and fills out the form for you... under IE , Firefox , Chrome , etc... has apps for iPhone and whatnot .
Works under Linux , Mac , Windows...Keeps the password stored on the lastpass servers , encrypted .
Can backup easily...I tried many password managers , this one is easily the best .</tokentext>
<sentencetext>I can't believe nobody mentioned LastPass yet.
I've been using this for a year or two now and its awesome.Works everywhere and fills out the form for you... under IE, Firefox, Chrome, etc... has apps for iPhone and whatnot.
Works under Linux, Mac, Windows...Keeps the password stored on the lastpass servers, encrypted.
Can backup easily...I tried many password managers, this one is easily the best.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056922</id>
	<title>Re:KeePass - fantastic software.</title>
	<author>Anonymous</author>
	<datestamp>1257881280000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>I used to use KeePass, but I switched to LastPass.  LastPass keeps your passwords accessible on the web in their (encrypted) database.  I found it much easier to use strong passwords on multiple computers that way.  It integrates with firefox seamlessly via plugin, too.  Linux compatible.</p></htmltext>
<tokenext>I used to use KeePass , but I switched to LastPass .
LastPass keeps your passwords accessible on the web in their ( encrypted ) database .
I found it much easier to use strong passwords on multiple computers that way .
It integrates with firefox seamlessly via plugin , too .
Linux compatible .</tokentext>
<sentencetext>I used to use KeePass, but I switched to LastPass.
LastPass keeps your passwords accessible on the web in their (encrypted) database.
I found it much easier to use strong passwords on multiple computers that way.
It integrates with firefox seamlessly via plugin, too.
Linux compatible.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056436</id>
	<title>Until</title>
	<author>dereference</author>
	<datestamp>1257876780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Post-It notes have the distinct advantage that no computer virus or Trojan can steal it.</p></div><p>Yes, that's perfectly safe, until you have to type it into a computer for any reason.</p></div>
	</htmltext>
<tokenext>Post-It notes have the distinct advantage that no computer virus or Trojan can steal it.Yes , that 's perfectly safe , until you have to type it into a computer for any reason .</tokentext>
<sentencetext>Post-It notes have the distinct advantage that no computer virus or Trojan can steal it.Yes, that's perfectly safe, until you have to type it into a computer for any reason.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055460</id>
	<title>your brain</title>
	<author>KOTMATPOCKUH</author>
	<datestamp>1257868680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Using multiple passwords will lead to using some sort of tool to store them, and one master password to access this tool. Might as well just come up with a couple of reasonably strong, easy to remember passwords and rotate them between all sites you use.

The trick is to never use your passwords on the systems you do not trust, and never register accounts on some shady sites using your standard email and passwords.</htmltext>
<tokenext>Using multiple passwords will lead to using some sort of tool to store them , and one master password to access this tool .
Might as well just come up with a couple of reasonably strong , easy to remember passwords and rotate them between all sites you use .
The trick is to never use your passwords on the systems you do not trust , and never register accounts on some shady sites using your standard email and passwords .</tokentext>
<sentencetext>Using multiple passwords will lead to using some sort of tool to store them, and one master password to access this tool.
Might as well just come up with a couple of reasonably strong, easy to remember passwords and rotate them between all sites you use.
The trick is to never use your passwords on the systems you do not trust, and never register accounts on some shady sites using your standard email and passwords.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055726</id>
	<title>TK8 Safe</title>
	<author>Toenee</author>
	<datestamp>1257870540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I've used <a href="http://www.tk8.com/safe/" title="tk8.com" rel="nofollow">TK8 Safe</a> [tk8.com] for the last 3 years.  Works great.</htmltext>
<tokenext>I 've used TK8 Safe [ tk8.com ] for the last 3 years .
Works great .</tokentext>
<sentencetext>I've used TK8 Safe [tk8.com] for the last 3 years.
Works great.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</id>
	<title>Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257863520000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>Do what I set up for my father, Truecrypt installed to a USB key, passwords in a plaintext file inside the arcive.</p></htmltext>
<tokenext>Do what I set up for my father , Truecrypt installed to a USB key , passwords in a plaintext file inside the arcive .</tokentext>
<sentencetext>Do what I set up for my father, Truecrypt installed to a USB key, passwords in a plaintext file inside the arcive.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056774</id>
	<title>Re:Hashapass</title>
	<author>Anarchduke</author>
	<datestamp>1257879660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Sounds good.  I just give my 7 year old a bag of scrabble letters and a cappuccino.  he can create awesome random passwords</htmltext>
<tokenext>Sounds good .
I just give my 7 year old a bag of scrabble letters and a cappuccino .
he can create awesome random passwords</tokentext>
<sentencetext>Sounds good.
I just give my 7 year old a bag of scrabble letters and a cappuccino.
he can create awesome random passwords</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054526</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065090</id>
	<title>You don't need to keep your own password.</title>
	<author>Nesman64</author>
	<datestamp>1257067380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Just email me your passwords and the related sites.  I'll keep track of them for you.</htmltext>
<tokenext>Just email me your passwords and the related sites .
I 'll keep track of them for you .</tokentext>
<sentencetext>Just email me your passwords and the related sites.
I'll keep track of them for you.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055776</id>
	<title>Re:Truecrypt</title>
	<author>trickotomy</author>
	<datestamp>1257870780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>What is this "system tray" you speak of?</htmltext>
<tokenext>What is this " system tray " you speak of ?</tokentext>
<sentencetext>What is this "system tray" you speak of?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055132</id>
	<title>USB</title>
	<author>Idiomatick</author>
	<datestamp>1257866700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Firefox installed onto a USB stick. Have a single password for everything. If you lose the USB stick you can change passwords quick enough. It is convenient in that you only have to remember one thing. It is secure against key-loggers on infected computers. And you can probably make the usb stick effectively read-only protecting the stick itself. And the whole thing costs like a dollar.</htmltext>
<tokenext>Firefox installed onto a USB stick .
Have a single password for everything .
If you lose the USB stick you can change passwords quick enough .
It is convenient in that you only have to remember one thing .
It is secure against key-loggers on infected computers .
And you can probably make the usb stick effectively read-only protecting the stick itself .
And the whole thing costs like a dollar .</tokentext>
<sentencetext>Firefox installed onto a USB stick.
Have a single password for everything.
If you lose the USB stick you can change passwords quick enough.
It is convenient in that you only have to remember one thing.
It is secure against key-loggers on infected computers.
And you can probably make the usb stick effectively read-only protecting the stick itself.
And the whole thing costs like a dollar.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059574</id>
	<title>Re:1Password</title>
	<author>barzok</author>
	<datestamp>1257088200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Keychain is pretty limited. 1Password integrates with Safari &amp; Firefox seamlessly and lets you store a lot more than just passwords for filling forms - things like credit card info, addresses, etc. It's fairly smart about figuring out what fields on a web form need what information; smarter than anything else I've seen. It also gives you a good way to export/back up your passwords even to a printed file to keep in a secure location. Version 3 also has an area for storing software licensing info (keys, receipts, etc.)</p><p>I originally got it for free as part of a MacHeist or something, but I've paid for the upgrade.</p></htmltext>
<tokenext>Keychain is pretty limited .
1Password integrates with Safari &amp; Firefox seamlessly and lets you store a lot more than just passwords for filling forms - things like credit card info , addresses , etc .
It 's fairly smart about figuring out what fields on a web form need what information ; smarter than anything else I 've seen .
It also gives you a good way to export/back up your passwords even to a printed file to keep in a secure location .
Version 3 also has an area for storing software licensing info ( keys , receipts , etc .
) I originally got it for free as part of a MacHeist or something , but I 've paid for the upgrade .</tokentext>
<sentencetext>Keychain is pretty limited.
1Password integrates with Safari &amp; Firefox seamlessly and lets you store a lot more than just passwords for filling forms - things like credit card info, addresses, etc.
It's fairly smart about figuring out what fields on a web form need what information; smarter than anything else I've seen.
It also gives you a good way to export/back up your passwords even to a printed file to keep in a secure location.
Version 3 also has an area for storing software licensing info (keys, receipts, etc.
)I originally got it for free as part of a MacHeist or something, but I've paid for the upgrade.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059410</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055446</id>
	<title>Best Tool For Remembering Passwords</title>
	<author>clintonmonk</author>
	<datestamp>1257868560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>your brain.</htmltext>
<tokenext>your brain .</tokentext>
<sentencetext>your brain.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055296</id>
	<title>SafeDeposit for PalmOS</title>
	<author>ingo23</author>
	<datestamp>1257867600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>One of the reasons I got a Palm (Zire and then Treo) was to keep track of the passwords. My list at that time was 4 pages long and growing.
Since that time I have been using SafeDeposit on Palm  - <a href="http://www.freewarepalm.com/database/safedepositpda.shtml" title="freewarepalm.com" rel="nofollow">http://www.freewarepalm.com/database/safedepositpda.shtml</a> [freewarepalm.com]
<p>
It does encrypt the passwords with a master password and having them on a PDA/phone is much more convenient than a file/application on a laptop.</p></htmltext>
<tokenext>One of the reasons I got a Palm ( Zire and then Treo ) was to keep track of the passwords .
My list at that time was 4 pages long and growing .
Since that time I have been using SafeDeposit on Palm - http : //www.freewarepalm.com/database/safedepositpda.shtml [ freewarepalm.com ] It does encrypt the passwords with a master password and having them on a PDA/phone is much more convenient than a file/application on a laptop .</tokentext>
<sentencetext>One of the reasons I got a Palm (Zire and then Treo) was to keep track of the passwords.
My list at that time was 4 pages long and growing.
Since that time I have been using SafeDeposit on Palm  - http://www.freewarepalm.com/database/safedepositpda.shtml [freewarepalm.com]

It does encrypt the passwords with a master password and having them on a PDA/phone is much more convenient than a file/application on a laptop.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054512</id>
	<title>Do you really need to ask?</title>
	<author>Anonymous</author>
	<datestamp>1257863640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Hasn't everyone heard of KeePass (and KeePassX)?</p><p>http://keepass.info/</p><p>http://www.keepassx.org/</p></htmltext>
<tokenext>Has n't everyone heard of KeePass ( and KeePassX ) ? http : //keepass.info/http : //www.keepassx.org/</tokentext>
<sentencetext>Hasn't everyone heard of KeePass (and KeePassX)?http://keepass.info/http://www.keepassx.org/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055668</id>
	<title>brainpower</title>
	<author>e-scetic</author>
	<datestamp>1257870120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I use my own brain.  I continue to surprise myself at how many passwords I can remember, even years later.  If I counted I'm sure it would be in the hundreds.  And I don't have any a special memory powers...</p><p>Also, it helps if the passwords you create follow some pattern that only you know but still pass the usual test of being more than 9 characters and both alpha and numeric.  It might even help to go further than 9 chars.</p></htmltext>
<tokenext>I use my own brain .
I continue to surprise myself at how many passwords I can remember , even years later .
If I counted I 'm sure it would be in the hundreds .
And I do n't have any a special memory powers...Also , it helps if the passwords you create follow some pattern that only you know but still pass the usual test of being more than 9 characters and both alpha and numeric .
It might even help to go further than 9 chars .</tokentext>
<sentencetext>I use my own brain.
I continue to surprise myself at how many passwords I can remember, even years later.
If I counted I'm sure it would be in the hundreds.
And I don't have any a special memory powers...Also, it helps if the passwords you create follow some pattern that only you know but still pass the usual test of being more than 9 characters and both alpha and numeric.
It might even help to go further than 9 chars.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055024</id>
	<title>Re:Truecrypt</title>
	<author>Anonymous</author>
	<datestamp>1257866160000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>Do what I set up for my father, Truecrypt installed to a USB key, passwords in a plaintext file inside the arcive.</p></div><p>
Why bother with passwords?<br>
<br>
Start authenticating with your GPG key.  (http://gpgauth.com)<br>
<br>
Your GPG key logs you in, compromised sites don't hurt you.</p></div>
	</htmltext>
<tokenext>Do what I set up for my father , Truecrypt installed to a USB key , passwords in a plaintext file inside the arcive .
Why bother with passwords ?
Start authenticating with your GPG key .
( http : //gpgauth.com ) Your GPG key logs you in , compromised sites do n't hurt you .</tokentext>
<sentencetext>Do what I set up for my father, Truecrypt installed to a USB key, passwords in a plaintext file inside the arcive.
Why bother with passwords?
Start authenticating with your GPG key.
(http://gpgauth.com)

Your GPG key logs you in, compromised sites don't hurt you.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054562</id>
	<title>Roboform bar none</title>
	<author>Anonymous</author>
	<datestamp>1257863880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I've been using Roboform for years. Highly recommended and works with IE, Firefox and Chrome.</p></htmltext>
<tokenext>I 've been using Roboform for years .
Highly recommended and works with IE , Firefox and Chrome .</tokentext>
<sentencetext>I've been using Roboform for years.
Highly recommended and works with IE, Firefox and Chrome.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056492</id>
	<title>Giant list-o-passwords</title>
	<author>Fantastic Lad</author>
	<datestamp>1257877260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I have a mile of stupid passwords.  And a couple of weeks ago, because I'm a giant dork, I infected my system with a rootkit through a daring act of extreme idiocy.  So I had to go and change all of those stupid passwords to new stupid passwords because I had no idea what the heck that rootkit was looking for or was capable of doing.  It's like losing your wallet and having to cancel your credit cards.  Fun times.  I flushed a lot of old favorite memorized passwords down the drain.  -Which, all things considered, is probably a pretty smart thing to do periodically anyway.</p><p>But man!  What a world, eh?</p><p>I did a bunch of reading on how rootkits and viruses work, and the amazing thing is that it's pretty much impossible to have a world where there won't be enough jack-asses to fill the available space with toxins and general bullshit.  It's just the way things are.  There will always be a jerk out there trying to screw you over; a humanoid extension of a disease vector.  When I take several steps back, the internet really is looking more and more like robust biological environment with diseases and antibodies acting one another, where evolutionary forces are playing at full tilt.</p><p>I wonder how long it will take at the rate we're going for somebody's computer to sprout limbs and crawl from the seamy depths of the web.</p><p>I keep my passwords in an encrypted container/folder which I keep redundant copies of in various places and only open up when I forget how to log in to something, which since a couple of weeks ago, is bloody frequently.</p><p>It's flu season?  No shit.</p><p>-FL</p></htmltext>
<tokenext>I have a mile of stupid passwords .
And a couple of weeks ago , because I 'm a giant dork , I infected my system with a rootkit through a daring act of extreme idiocy .
So I had to go and change all of those stupid passwords to new stupid passwords because I had no idea what the heck that rootkit was looking for or was capable of doing .
It 's like losing your wallet and having to cancel your credit cards .
Fun times .
I flushed a lot of old favorite memorized passwords down the drain .
-Which , all things considered , is probably a pretty smart thing to do periodically anyway.But man !
What a world , eh ? I did a bunch of reading on how rootkits and viruses work , and the amazing thing is that it 's pretty much impossible to have a world where there wo n't be enough jack-asses to fill the available space with toxins and general bullshit .
It 's just the way things are .
There will always be a jerk out there trying to screw you over ; a humanoid extension of a disease vector .
When I take several steps back , the internet really is looking more and more like robust biological environment with diseases and antibodies acting one another , where evolutionary forces are playing at full tilt.I wonder how long it will take at the rate we 're going for somebody 's computer to sprout limbs and crawl from the seamy depths of the web.I keep my passwords in an encrypted container/folder which I keep redundant copies of in various places and only open up when I forget how to log in to something , which since a couple of weeks ago , is bloody frequently.It 's flu season ?
No shit.-FL</tokentext>
<sentencetext>I have a mile of stupid passwords.
And a couple of weeks ago, because I'm a giant dork, I infected my system with a rootkit through a daring act of extreme idiocy.
So I had to go and change all of those stupid passwords to new stupid passwords because I had no idea what the heck that rootkit was looking for or was capable of doing.
It's like losing your wallet and having to cancel your credit cards.
Fun times.
I flushed a lot of old favorite memorized passwords down the drain.
-Which, all things considered, is probably a pretty smart thing to do periodically anyway.But man!
What a world, eh?I did a bunch of reading on how rootkits and viruses work, and the amazing thing is that it's pretty much impossible to have a world where there won't be enough jack-asses to fill the available space with toxins and general bullshit.
It's just the way things are.
There will always be a jerk out there trying to screw you over; a humanoid extension of a disease vector.
When I take several steps back, the internet really is looking more and more like robust biological environment with diseases and antibodies acting one another, where evolutionary forces are playing at full tilt.I wonder how long it will take at the rate we're going for somebody's computer to sprout limbs and crawl from the seamy depths of the web.I keep my passwords in an encrypted container/folder which I keep redundant copies of in various places and only open up when I forget how to log in to something, which since a couple of weeks ago, is bloody frequently.It's flu season?
No shit.-FL</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057534</id>
	<title>Re:Notecard In Wallet For Life</title>
	<author>Krisbee</author>
	<datestamp>1257067800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Well I haven't lost my wallet for a decade, but I have no idea how many times people have had the possibility of looking into it without stealing anything.</p><p>---<br>Copying isn't stealing....</p></htmltext>
<tokenext>Well I have n't lost my wallet for a decade , but I have no idea how many times people have had the possibility of looking into it without stealing anything.---Copying is n't stealing... .</tokentext>
<sentencetext>Well I haven't lost my wallet for a decade, but I have no idea how many times people have had the possibility of looking into it without stealing anything.---Copying isn't stealing....</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055140</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058608</id>
	<title>keepassx and kedpm will do</title>
	<author>Anonymous</author>
	<datestamp>1257080700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>http://www.keepassx.org/<br>http://kedpm.sourceforge.net/</p></htmltext>
<tokenext>http : //www.keepassx.org/http : //kedpm.sourceforge.net/</tokentext>
<sentencetext>http://www.keepassx.org/http://kedpm.sourceforge.net/</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059466</id>
	<title>Cryptic clues</title>
	<author>aj50</author>
	<datestamp>1257087720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Important passwords should be long, random and not written down.</p><p>For each password, make up a set of cryptic crossword clues, preferably making obscure references to things from several different aspects of your life.</p><p>Additionally, make them really evil cryptic crossword clues that don't quite give you enough information (but enough to jog your memory).</p></htmltext>
<tokenext>Important passwords should be long , random and not written down.For each password , make up a set of cryptic crossword clues , preferably making obscure references to things from several different aspects of your life.Additionally , make them really evil cryptic crossword clues that do n't quite give you enough information ( but enough to jog your memory ) .</tokentext>
<sentencetext>Important passwords should be long, random and not written down.For each password, make up a set of cryptic crossword clues, preferably making obscure references to things from several different aspects of your life.Additionally, make them really evil cryptic crossword clues that don't quite give you enough information (but enough to jog your memory).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059722</id>
	<title>Simple Formula for Strong Passwords</title>
	<author>KnowOne256</author>
	<datestamp>1257088800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I use a mental algorithm that will always it generates a "good" secure password. No two passwords are the same. Because I the input to the algorithm is site or situation specific, but personally obvious, I always get the same output. I have to keep track of more than 30 passwords and I have a terrible memory. I used to use the same four passwords over and over again until I read the <a href="http://www.sans.org/reading\_room/whitepapers/authentication/1636.php" title="sans.org" rel="nofollow">Simple Formula for Strong Passwords (SFSP) Tutorial</a> [sans.org]. It is a long read but most of it is examples.  Basically it teaches you how to come up with a system that guarantees that you create memorable <b>and</b> secure passwords.</htmltext>
<tokenext>I use a mental algorithm that will always it generates a " good " secure password .
No two passwords are the same .
Because I the input to the algorithm is site or situation specific , but personally obvious , I always get the same output .
I have to keep track of more than 30 passwords and I have a terrible memory .
I used to use the same four passwords over and over again until I read the Simple Formula for Strong Passwords ( SFSP ) Tutorial [ sans.org ] .
It is a long read but most of it is examples .
Basically it teaches you how to come up with a system that guarantees that you create memorable and secure passwords .</tokentext>
<sentencetext>I use a mental algorithm that will always it generates a "good" secure password.
No two passwords are the same.
Because I the input to the algorithm is site or situation specific, but personally obvious, I always get the same output.
I have to keep track of more than 30 passwords and I have a terrible memory.
I used to use the same four passwords over and over again until I read the Simple Formula for Strong Passwords (SFSP) Tutorial [sans.org].
It is a long read but most of it is examples.
Basically it teaches you how to come up with a system that guarantees that you create memorable and secure passwords.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600</id>
	<title>Never store your passwords!</title>
	<author>JWSmythe</author>
	<datestamp>1257864000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>
&nbsp; &nbsp; Never ever ever ever (EVER!) store your passwords where they can be retrieved by unauthorized 3rd parties!  That includes password storing utilities, scraps of paper under your keyboard, or a little note in your wallet.</p><p>
&nbsp; &nbsp; Written down, in a lockbox, in a safe, in the floor of your basement, under a rug, in your house that has an active alarm system (that you use), in a armed guard and gated community is ok.  Ok, most of us can be a bit less secure than that, but I don't recommend it.<nobr> <wbr></nobr>:)</p><p>
&nbsp; &nbsp; Choose your passwords intelligently.  Then they'll be easier to remember.</p><p>"W)Wg#jwe9^)SEG" is pretty hard to remember.</p><p>"BankPass" is a terrible password, but easy to remember.  Don't use it.</p><p>"Wh3rzIzM!M0ny?" (Where is my money?) is easier to remember, even though it's a nice secure password.  I dare any brute force attack to get that one.<nobr> <wbr></nobr>:)</p><p>
&nbsp; &nbsp; For the sake of legacy access (like, when you get hit by a bus, and your wife needs to get into your accounts), make sure a second *TRUSTWORTHY* person knows the combination to the safe in your basement.</p></htmltext>
<tokenext>    Never ever ever ever ( EVER !
) store your passwords where they can be retrieved by unauthorized 3rd parties !
That includes password storing utilities , scraps of paper under your keyboard , or a little note in your wallet .
    Written down , in a lockbox , in a safe , in the floor of your basement , under a rug , in your house that has an active alarm system ( that you use ) , in a armed guard and gated community is ok. Ok , most of us can be a bit less secure than that , but I do n't recommend it .
: )     Choose your passwords intelligently .
Then they 'll be easier to remember .
" W ) Wg # jwe9 ^ ) SEG " is pretty hard to remember .
" BankPass " is a terrible password , but easy to remember .
Do n't use it. " Wh3rzIzM ! M0ny ?
" ( Where is my money ?
) is easier to remember , even though it 's a nice secure password .
I dare any brute force attack to get that one .
: )     For the sake of legacy access ( like , when you get hit by a bus , and your wife needs to get into your accounts ) , make sure a second * TRUSTWORTHY * person knows the combination to the safe in your basement .</tokentext>
<sentencetext>
    Never ever ever ever (EVER!
) store your passwords where they can be retrieved by unauthorized 3rd parties!
That includes password storing utilities, scraps of paper under your keyboard, or a little note in your wallet.
    Written down, in a lockbox, in a safe, in the floor of your basement, under a rug, in your house that has an active alarm system (that you use), in a armed guard and gated community is ok.  Ok, most of us can be a bit less secure than that, but I don't recommend it.
:)
    Choose your passwords intelligently.
Then they'll be easier to remember.
"W)Wg#jwe9^)SEG" is pretty hard to remember.
"BankPass" is a terrible password, but easy to remember.
Don't use it."Wh3rzIzM!M0ny?
" (Where is my money?
) is easier to remember, even though it's a nice secure password.
I dare any brute force attack to get that one.
:)
    For the sake of legacy access (like, when you get hit by a bus, and your wife needs to get into your accounts), make sure a second *TRUSTWORTHY* person knows the combination to the safe in your basement.</sentencetext>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_76</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057960
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_34</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054966
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059410
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059574
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_162</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055130
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_86</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056898
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054506
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057184
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_44</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055140
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057534
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_186</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057494
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_172</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056488
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_94</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056348
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055614
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_52</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_180</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054530
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054872
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_191</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055292
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_145</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30079116
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057744
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_62</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061644
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055710
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_73</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058778
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_119</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056904
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_151</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054646
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056962
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_49</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067090
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_47</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055518
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_81</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054660
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057654
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_129</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054628
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_175</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056872
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061710
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_161</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055042
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055826
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30070156
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_57</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055938
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054542
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056236
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_137</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056436
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_185</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054530
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067856
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_148</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055316
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_106</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058676
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056156
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_65</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054660
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055468
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_158</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056274
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_116</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054548
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058908
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_190</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057980
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_100</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057428
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_38</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055780
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_166</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056880
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_36</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055022
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_70</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055796
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_124</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054992
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055774
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_110</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056022
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057242
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_46</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056282
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055470
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_188</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054966
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058330
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_92</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054646
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057878
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_134</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054488
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055940
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054742
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055944
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_54</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055596
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_140</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056434
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_147</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056602
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_105</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058252
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_89</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058010
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059436
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055240
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_64</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054604
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056076
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_75</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057484
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_33</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057448
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_155</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061268
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_113</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054978
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065700
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_99</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054728
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_83</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062282
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_179</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055024
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059044
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_41</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055350
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_177</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058244
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_123</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062502
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_93</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054926
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055892
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058158
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_51</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054646
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060534
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057762
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_187</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059880
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_131</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30068500
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_108</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058864
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_142</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060672
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_78</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063864
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_118</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30066452
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_164</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30151246
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_150</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054526
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055034
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_88</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055024
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056214
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_72</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055378
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_126</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054610
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054852
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054780
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_174</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056528
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054530
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055386
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30099122
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_96</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055848
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_82</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058788
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_40</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056070
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058718
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_136</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30068824
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_182</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054706
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057492
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_193</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059662
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056394
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062374
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_107</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055140
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058048
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_153</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058192
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_37</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058194
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_35</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054660
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30163506
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_163</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054660
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056848
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_115</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067798
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_59</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061092
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_43</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054882
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056010
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_91</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061692
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_139</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057202
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_125</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059440
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054948
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_67</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054488
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054850
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058214
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_53</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054488
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060982
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_133</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058932
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_144</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057688
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_192</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054886
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057676
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_102</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055000
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054610
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055966
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_61</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058450
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059052
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_168</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056070
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056142
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_154</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056174
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061684
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_112</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058686
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_48</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055398
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_178</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30079464
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_176</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30140774
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_80</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054738
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058038
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_32</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055452
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_120</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064912
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_98</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057746
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_56</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054610
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056052
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055752
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_42</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30072040
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_184</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054646
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056102
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065786
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_130</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054634
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_149</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057524
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_66</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057518
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057290
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_77</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055658
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055776
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_50</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057208
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_157</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054978
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057548
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_143</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055418
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_101</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063608
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_39</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059334
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058958
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_85</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054526
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054766
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_60</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055458
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_71</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054882
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057904
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_167</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064128
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_171</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059284
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_165</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057376
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_95</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057886
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055108
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_189</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056366
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_181</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30107480
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_173</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055320
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055024
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061110
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_69</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056576
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055006
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_183</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_141</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056778
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_104</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055850
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_152</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059072
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054794
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_74</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054742
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056730
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_128</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058832
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_114</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054488
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057956
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_160</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056872
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065952
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_84</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061848
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_138</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055024
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059632
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_170</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065344
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_122</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057138
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_58</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_90</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056370
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_132</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054500
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054946
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_109</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057946
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_68</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061942
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061112
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_79</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056198
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_159</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058286
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_117</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054526
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056774
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_103</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055716
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_87</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057742
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_45</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055388
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_169</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055456
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_31</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056978
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_127</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056312
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_111</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054530
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054598
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056112
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_97</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057306
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_55</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057682
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_135</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30072200
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_146</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059320
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_121</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055140
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057456
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055466
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067006
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_63</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062390
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_10_2045258_156</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055466
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065284
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.46</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054526
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055034
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054766
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056774
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.40</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054548
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058908
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055042
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055826
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054488
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057956
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060982
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055940
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054850
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.43</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054518
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054742
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056730
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055944
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057762
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057242
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057980
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.59</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054710
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.58</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055282
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.52</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055840
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056508
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.60</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056104
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055466
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067006
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065284
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055016
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.53</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054800
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.35</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054880
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.34</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054978
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065700
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057548
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.66</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054926
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055892
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.48</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054494
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054718
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056370
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056694
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056528
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054794
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054948
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055000
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055006
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056394
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055108
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056274
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054634
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062374
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057448
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055418
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056576
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056880
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057208
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057688
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054668
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054628
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055316
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055140
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058048
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057456
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057534
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054530
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055386
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30099122
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054872
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067856
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054598
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056112
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054920
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30070630
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.63</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057416
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055254
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.42</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062412
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055044
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057508
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054646
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057878
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056962
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060534
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056102
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065786
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.45</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054514
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054728
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057484
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055292
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058958
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055022
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055518
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057960
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057682
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055452
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056174
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061684
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054780
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.54</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054902
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.36</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054574
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057428
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30068500
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056312
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055658
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055848
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056922
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055458
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055604
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054584
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054988
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.62</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054778
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061942
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057746
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30079464
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055780
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057376
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058450
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058214
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056602
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.55</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054982
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.68</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055644
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064476
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.37</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057354
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054704
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054890
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058194
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056198
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057290
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30068824
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055388
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062390
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055068
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055058
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.65</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056560
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.47</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057180
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055514
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054882
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056010
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057904
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054886
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057676
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.31</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054580
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.50</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054602
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056436
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056022
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058686
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057518
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054992
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055774
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059072
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062282
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058864
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059662
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061692
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059284
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055320
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.44</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054500
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054946
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054966
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059410
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059574
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058330
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.56</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054660
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055468
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30163506
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056848
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057654
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054610
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056052
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054852
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055966
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.41</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054486
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058286
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30062502
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055378
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055614
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055596
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055130
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056434
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054986
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058158
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30140774
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056978
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057744
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057306
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056904
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055776
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064912
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056778
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057742
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055398
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055716
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055264
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056872
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061710
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065952
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067090
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057946
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059880
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058778
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061848
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055938
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061644
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058244
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058788
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058832
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061112
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058192
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059052
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055024
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059044
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061110
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056214
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059632
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057202
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.38</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054604
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056076
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054640
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054542
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056236
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.61</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054600
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057138
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057886
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055796
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056156
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058252
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.57</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056324
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.39</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054738
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058038
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.51</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054682
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.32</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055088
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.64</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054544
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30064128
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056348
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055240
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056282
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058676
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055350
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30072200
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059334
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054706
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057492
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054506
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057184
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.67</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056070
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058718
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056142
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.49</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055132
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054472
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054822
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30079116
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063608
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30151246
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30070156
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30072040
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059320
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30067798
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30063864
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30065344
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30066452
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058010
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059436
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30060672
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30058932
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061092
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_10_2045258.33</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30054828
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30059440
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057524
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055470
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30107480
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055710
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30057494
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056898
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056366
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30056488
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055456
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055850
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30055752
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_10_2045258.30061268
</commentlist>
</conversation>
