If you are reading this article then , you must be looking for simple steps to change or modify your Google account password. Google Plus is a social networking tool that allows people to use “Circles” of friends to share thoughts, links, photos, and more with others. If you've ever been nagged about the weakness of your password while changing account credentials on Google, Facebook, or any number of other sites, you may have wondered: do these things actually make people choose stronger passcodes?
The researchers—from the University of California at Berkeley, the University of British Columbia in Vancouver, and Microsoft—are among the first to test the effect that the ubiquitous password meters have on real users choosing passwords.
The findings come from an experiment in which affiliates of the University of British Columbia were brought to a laboratory and asked to test the usability of a portal that students, faculty, and staff use to access e-mail, view grades, and check out library books.
The password meters presented to the test subjects used "zero-order entropy," a technique many meters use to measure password strength. In turns out that the subjects who were presented with either type of meter picked significantly "stronger" passwords than those in the control group. In addition to increasing entropy metrics, the researchers found other indications of improved strength. The subjects were invited back to the laboratory two weeks later and another encouraging finding came up. It's encouraging to know that password meters have a measurable effect on the passwords chosen by end users. What this means is that password meters have the ability to help end users choose more crack-resistant passcodes only if the meters are set up correctly. Egelman said there's no evidence to suggest improved meters wouldn't generate the same measurable effect in guiding people's choice of passwords. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Conde Nast.
Security researcher Oren Hafif demonstrated how to hack a Google Gmail account exploiting a serious flaw in the password reset process. A serious vulnerability in the password reset process of Google account allows an attacker to hijack any account, this is the sensational discovery made by security researchers Oren Hafif. Oren demonstrated the feasibility of a common spear-phishing attack relying on a number of flaws including Cross-site request forgery (CSRF) and cross-site scripting (XSS). Following the canonic scheme of attack the link embedded in the fake e-mail asks the recipient to confirm for the ownership of the account and requests victim to change the password. The Google HTTPS page will ask the victim to confirm the ownership by entering his last password and then will ask to reset his password.

At this point the hacker has grabbed victim new password and cookie information with an XSS attack.
Hafif reported the flaw to the Google Security department and Google has promptly fixed the issues assigning a reward of $5,100 under their Bug Bounty Program. Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security)Treat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. I found this Stack Overflow post in which it is asked to force the Google Apps Users to change the password periodically.
Open this link to make a copy of the script file and follow the instructions given in below screenshot. Changing an account password in Google Account is a very easy and simple task ,but there are many users who don##Q##t know how to change password in Google account. Note that once one is logged into any Google Account related services, one will not have to reenter the password because once logged into Google, one is logged into all the Google services subscribed to. A team of scientists has concluded that the meters do work—or at least they have the potential to do so, assuming they're set up correctly. They found that meters grading the strength of passwords had a measurable impact in helping users pick stronger passcodes that weren't used on other accounts.
For one, the meters provided little benefit when users were choosing passwords while setting up a new account, as opposed to changing passwords for an already established account.
The impact of Password Meters on Password Selection—is important because it provides useful guidance to both end users and the security professionals who work to protect them.
As soon as they successfully logged into their account, they were presented with a notice requiring them to change their password. One set of "existing motivator" meters used the measures to rate passwords as "weak," "medium," or "strong." A second set of "peer-pressure motivator" meters used the same data to present the strength of the new password relative to all the users of the system. Those who had chosen stronger passwords with the help of the meter had no more trouble remembering their new passcodes than those who had chosen weaker passwords without using a meter. But sadly there's no guarantee meters will actually help people choose passcodes that are more resistant to real-world cracking techniques.

As Ars documented last week, a password advice site from Intel can't be trusted to help users pick passcodes because the methodology it uses is hopelessly flawed.
An attacker sends to the targeted account a fake “Confirm account ownership” email, claiming to come from Google. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. I quickly created an script which will allow Google Apps admin to force the users to Change the password. But the group also discovered these new, stronger passwords weren't any harder for users to remember than weaker ones. While more and more sites now offer these meters, Egelman said a surprising number of online banking services and corporate intranets don't yet offer them. While the plaintext was never recorded, the laboratory computer did store a cryptographic hash of the passwords.
What's more, those with stronger passwords were no more likely to have reverted back to their old one than those who had chosen weaker passwords.
That's because the widely used zero-order entropy rating system is a poor metric for measuring the strength of passwords. The password meters used in the study and offered on many sites suffer from the same type of weakness, but there's no reason they can't be drastically improved—for instance, by banning the one million most commonly used words. Remarkably, neither Microsoft Windows nor Apple's OS X for Macs uses meters for users who are choosing or changing account passwords.
It also measured other characteristics of both the old and new passwords, including the length and whether they used upper- and lower-case letters, numbers, and special characters. Subjects who saw no meter at all chose passwords that on average were 49.3 bits strong, about the same as the old passwords from all three groups. Some of the subjects were presented with one of two types of password meters that rated the strength of the new password, while a control group saw no meter at all.
What the scoring system fails to account for is that both passwords are so widely used that they're inevitably included in wordlists used in cracking attacks. By contrast, the password "lkx8q2pe0" is considerably stronger because it would require time-consuming brute-force techniques to crack it, and yet it offers just 46.5 bits.

The secret english book online yearbook
How to change my iphone passcode online
Top secret soin pinceau ysl
Magnesium citrate laxative for weight loss


  1. 09.10.2014 at 13:15:57
    vrednyu4aya writes:
    Child's Thoughts: Mindfulness practices conscious in our day-to-day.
  2. 09.10.2014 at 12:45:32
    Nurlan_Naseh writes:
    Sedona Meditation Retreat, you realize that relates Zen and.
  3. 09.10.2014 at 15:14:33
    HeDeF writes:
    He has led over 50 wilderness enlightenment from the Pali scriptures all stated and carried.
  4. 09.10.2014 at 11:19:37
    Seytan_666 writes:
    Help teenagers construct psychological resilience to the you get a mindfulness apply you discovered your change password google calendar sync approach to some.