Windows Support Tools

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 16 April 2008

Military-grade password protection!

Posted on 12:19 by Unknown

Unfortunately, we all have to deal with modern life’s little cyber-burden, the password. Some of us do so by simply re-using an old password when the system asks you to change it. Other times we use the same password but just add the month at the end. Some people even resort to keeping their passwords written on yellow stickey notes or in their wallet. None of these options, however, is very effective for protecting your valuable data. Instead, we would like to present a superior solution brought to you compliments of the US Military.

The Mandylion Password Manager is a secure, convenient and cost-effective device built specifically for generating and protecting your passwords. Tested and matured for 3 years in real warfare environments, it is now available for commercial use. Built as a small keyring device, it can securely manage up to 50 logins, safe combinations, security codes, etc. that can be individually generated to meet the composition requirements of any login policy. Passwords can be any length up to 14 characters or namespaces. It can create passwords based on your settings for various criteria (such as length, alpha-numeric, special characters, etc.) and prompt you to change your passwords at preset time intervals (90 days, 1 year, etc.) Also, all data is stored in permanent memory, so it is unaffected by battery life or loss of power. Tamper-resistant features have been employed both inside and out, making the device a superior choice to storing passwords on your PDA, PC or worse, writing them down.

Using the device is very easy. There are 5 buttons used for navigation and data entry. The device is activated by entering a unique button sequence that is user-defined. Totally self-contained and air-gapped from any system, passwords are viewed on the token's LCD display which has a limited viewing angle to prevent shoulder surfing. There are also user-defined lockout settings, including a self-destruct feature for high risk scenarios. The device will also indicate failed activation attempts (with a "Tampered" message displayed upon successful activation.) Included Policy Master software makes describing the login policy (length, expiration, composition) for each login record and configuring the token a snap. The token does the rest.

This little unit has been designed to meet U.S. Military standards for secure creation and management of passwords (use authorized under Army Regulation 25-2 IA.) This device helps creates a strong security policy for your work environment (so naturally you can brag to the boss about it) and provides cost savings in the form of reduced help desk support and password changing downtime. When used for personal password management the personal password manager eliminates having to remember all those annoying passwords and usernames.

Has these great features.


* Manages up to 50 login records simultaneously
* Generates cryptographically strong passwords
* Complies with all DoD, Govt. & Industry Password Security Policies
* Multiple tamper-resistant features and lockout alarms
* Manages Root and Group passwords
* Cradle connection via USB
* Kit containing: token, a configuration cradle, Policy Master Configuration Software (Windows only)
* Device and software not Mac compatible (sorry)
* Dimensions: Approx. 2.5" x 1.5" x .375" (65mm x 45mm x 10mm)
* Takes a CR2032 battery (replaceable)
* One-year warranty
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Receiving Error 'ORA-01041: internal error. hostdef extension doesn't exist.' on re-establishing a connection to Oracle.
    You can receive the error message 'Error ORA-01041: internal error. hostdef extension doesn't exist' when attempting to re-esta...
  • Google Sinks Cash into Undersea Cable
    Google has joined the Unity consortium, which will build a $300 million fiber optic cable linking the US and Japan. The 7.68 Tbps, 10,000 ki...
  • Troubleshooting the Microsoft Exchange Transport Service When It Fails to Start on an Exchange 2007 Hub Transport Server with Event ID 1032 or 1036
    Event ID: 1032 Socket Access Denied. Binding: 0.0.0.0:25. Event ID: 1036 Failed to open one or more bindings. The service will be stopped....
  • C Traps and Pitfalls (Addison Wesley, 1989, English)
    C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual beha...
  • SoftMaker Office 2008 Free Full Version Download With Genuine License Key
    SoftMaker Office 2008 is reliable office productivity software that is designed for beginners and professional users. SoftMaker Office Suite...
  • Amazon Takes the Humans Out of Fulfillment With New API
    keeps adding to its Web services. Today, it is opening up an API for its Fulfillment by Amazon service, which allows online merchants to out...
  • AP Microsoft backs Icahn's bid to oust Yahoo board
    SAN FRANCISCO - Microsoft Corp. threw its weight behind investor Carl Icahn's effort to dump Yahoo Inc.'s board, saying Monday that...
  • Suba Vesak Mangallayak Weewa !!!!
    Keep your heart free from hate your mind from worry, Live simply expect little, give much Fill your life with love forget self, think of ot...
  • How to Remove Dosearches.com homepage (Virus Removal Guide)
    Dosearches.com  is a browser hijacker, which is promoted via other free downloads, and once installed it will change your browser homepage t...
  • Alcohol 120% v5 Blu-ray Burner Free Download with Registration Unlock Code
    Alcohol 120% is a CD and DVD burning, copying, backup, recording, duplication, emulation and creation software for Windows. In addition to c...

Categories

  • ISA Firewall
  • ISA Server 2006
  • Quick Tips
  • Reports
  • Tips

Blog Archive

  • ►  2013 (7)
    • ►  October (6)
    • ►  February (1)
  • ►  2012 (10)
    • ►  September (3)
    • ►  August (3)
    • ►  July (3)
    • ►  June (1)
  • ►  2011 (16)
    • ►  August (2)
    • ►  July (4)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  March (4)
    • ►  January (1)
  • ►  2010 (12)
    • ►  December (3)
    • ►  October (4)
    • ►  March (1)
    • ►  January (4)
  • ►  2009 (67)
    • ►  August (2)
    • ►  July (18)
    • ►  June (23)
    • ►  April (3)
    • ►  March (6)
    • ►  February (7)
    • ►  January (8)
  • ▼  2008 (319)
    • ►  December (30)
    • ►  November (43)
    • ►  October (45)
    • ►  September (12)
    • ►  August (18)
    • ►  July (27)
    • ►  June (15)
    • ►  May (7)
    • ▼  April (55)
      • Total Commander v7.03
      • FileGeneral ControlCenter v1.09
      • Total Uninstall 4.8.0.562
      • SpyHunter Security Suite V3.4.9 + Crack
      • See Password 2.05
      • Panda Antivirus 2008
      • LTTE terrorists commit bloodbath against civilians...
      • Access Administrator Pro 4.8
      • Startup Faster! 3.02
      • svn update
      • Lovely Sexy Strip
      • Porno xxx hot caliente
      • No title
      • Sharepoint Training
      • View photo slideshows in Yahoo! Mail
      • CTIA 2008 - Nokia N810 Internet Tablet WiMAX Editi...
      • Dell Goes Green with new Eco PC
      • Textbook of Surgery: Expert Consult
      • Nursing Procedures
      • Written by authors have a wide experience in teach...
      • Lippincott Manual of Nursing Practice
      • Free Encyclopedia Britannica 2008
      • Free Registry Repair Wizard 2008
      • Keeley Hazell
      • Linux Password Cracking: Explain unshadow and john...
      • Vacation checklist: prepare your PC
      • Get maximum performance from Windows Vista
      • Avoid the Commute: Work at Home
      • Linux Start up and Run Levels
      • Military-grade password protection!
      • In our effort to always bring you the latest and g...
      • Kristen Bell
      • Khet - The Laser Game
      • Gandhi daughter visits assassin
      • Suba Aluth Auruddak Weewa !!!!!!!!!!!
      • Linux Shell Scripting Tutorial v1.05r3 Linux Shell...
      • Hilary Duff’s Breasts Continue To Grow
      • Shutdown your Computer with a Cell Phone
      • shuting down somones computer remotely
      • Find out IP addresses and shut down computers from...
      • Hacking of Windows server 2003
      • Make any Windows Computer RUN FASTER and STOP ERRORS
      • Imageofmuse
      • I'm as cool as a body on ice or hotter than a roll...
      • SlySoft CloneDVD 2.9.1.6
      • Disney Print Fonts
      • Power Video Capture/Convert/Burn DVD Studio 8.0.8.24
      • Shooting within is more painful than shooting from...
      • Mariah Carey - Touch My Body (NEW SINGLE 2008) FUL...
      • Protests on Olympics Intensify Over China's Human-...
      • Keeley Hazell Topless Bikini Pictures
      • Gemma Atkinson
      • Why ignore the tips given by the foreign intellige...
      • Kim Kardashia
      • Deviant Art Misc. Creators Fonts
    • ►  March (65)
    • ►  January (2)
  • ►  2007 (10)
    • ►  December (2)
    • ►  November (8)
Powered by Blogger.

About Me

Unknown
View my complete profile