Windows Support Tools

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 16 April 2008

Military-grade password protection!

Posted on 12:19 by Unknown

Unfortunately, we all have to deal with modern life’s little cyber-burden, the password. Some of us do so by simply re-using an old password when the system asks you to change it. Other times we use the same password but just add the month at the end. Some people even resort to keeping their passwords written on yellow stickey notes or in their wallet. None of these options, however, is very effective for protecting your valuable data. Instead, we would like to present a superior solution brought to you compliments of the US Military.

The Mandylion Password Manager is a secure, convenient and cost-effective device built specifically for generating and protecting your passwords. Tested and matured for 3 years in real warfare environments, it is now available for commercial use. Built as a small keyring device, it can securely manage up to 50 logins, safe combinations, security codes, etc. that can be individually generated to meet the composition requirements of any login policy. Passwords can be any length up to 14 characters or namespaces. It can create passwords based on your settings for various criteria (such as length, alpha-numeric, special characters, etc.) and prompt you to change your passwords at preset time intervals (90 days, 1 year, etc.) Also, all data is stored in permanent memory, so it is unaffected by battery life or loss of power. Tamper-resistant features have been employed both inside and out, making the device a superior choice to storing passwords on your PDA, PC or worse, writing them down.

Using the device is very easy. There are 5 buttons used for navigation and data entry. The device is activated by entering a unique button sequence that is user-defined. Totally self-contained and air-gapped from any system, passwords are viewed on the token's LCD display which has a limited viewing angle to prevent shoulder surfing. There are also user-defined lockout settings, including a self-destruct feature for high risk scenarios. The device will also indicate failed activation attempts (with a "Tampered" message displayed upon successful activation.) Included Policy Master software makes describing the login policy (length, expiration, composition) for each login record and configuring the token a snap. The token does the rest.

This little unit has been designed to meet U.S. Military standards for secure creation and management of passwords (use authorized under Army Regulation 25-2 IA.) This device helps creates a strong security policy for your work environment (so naturally you can brag to the boss about it) and provides cost savings in the form of reduced help desk support and password changing downtime. When used for personal password management the personal password manager eliminates having to remember all those annoying passwords and usernames.

Has these great features.


* Manages up to 50 login records simultaneously
* Generates cryptographically strong passwords
* Complies with all DoD, Govt. & Industry Password Security Policies
* Multiple tamper-resistant features and lockout alarms
* Manages Root and Group passwords
* Cradle connection via USB
* Kit containing: token, a configuration cradle, Policy Master Configuration Software (Windows only)
* Device and software not Mac compatible (sorry)
* Dimensions: Approx. 2.5" x 1.5" x .375" (65mm x 45mm x 10mm)
* Takes a CR2032 battery (replaceable)
* One-year warranty
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • What is Cloud Computing ?
  • Setting up a DHCP server in Windows 2003
    The DHCP server assigns a client an IP address taken from a predefined scope for a given amount of time. If an IP address is required for lo...
  • Cartoons of the Week
  • Manage your home network better with Network Magic 5.0
    Cisco announced on Thursday Network Magic 5.0, a suite of network management software. This is is the first product released by Cisco since ...
  • Google Sinks Cash into Undersea Cable
    Google has joined the Unity consortium, which will build a $300 million fiber optic cable linking the US and Japan. The 7.68 Tbps, 10,000 ki...
  • Battle Progress Map
  • Exchange Server 2010 Beta available
    Microsoft Exchange Server 2010 brings a new and rich set of technologies, features, and services to the Exchange Server product line. This t...
  • Nambara Sanda Wage
  • Complete Wireless Design (McGraw-Hill, 2008, English)
    ON THE CD-ROM *PUFF RF/Microwave circuit simulation software *Sonnet Lite electromagnetic simulation software *National's PLL Design Pro...
  • Keyshia Cole - Just Like You (2007)
    1- Let It Go feat Missy Elliot and Lil Kim [03:58] 02- Didn't I Tell You feat Too Short [03:52] 03- Fallin Out [04:27] 04- Give Me More ...

Categories

  • ISA Firewall
  • ISA Server 2006
  • Quick Tips
  • Reports
  • Tips

Blog Archive

  • ►  2013 (7)
    • ►  October (6)
    • ►  February (1)
  • ►  2012 (10)
    • ►  September (3)
    • ►  August (3)
    • ►  July (3)
    • ►  June (1)
  • ►  2011 (16)
    • ►  August (2)
    • ►  July (4)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  March (4)
    • ►  January (1)
  • ►  2010 (12)
    • ►  December (3)
    • ►  October (4)
    • ►  March (1)
    • ►  January (4)
  • ►  2009 (67)
    • ►  August (2)
    • ►  July (18)
    • ►  June (23)
    • ►  April (3)
    • ►  March (6)
    • ►  February (7)
    • ►  January (8)
  • ▼  2008 (319)
    • ►  December (30)
    • ►  November (43)
    • ►  October (45)
    • ►  September (12)
    • ►  August (18)
    • ►  July (27)
    • ►  June (15)
    • ►  May (7)
    • ▼  April (55)
      • Total Commander v7.03
      • FileGeneral ControlCenter v1.09
      • Total Uninstall 4.8.0.562
      • SpyHunter Security Suite V3.4.9 + Crack
      • See Password 2.05
      • Panda Antivirus 2008
      • LTTE terrorists commit bloodbath against civilians...
      • Access Administrator Pro 4.8
      • Startup Faster! 3.02
      • svn update
      • Lovely Sexy Strip
      • Porno xxx hot caliente
      • No title
      • Sharepoint Training
      • View photo slideshows in Yahoo! Mail
      • CTIA 2008 - Nokia N810 Internet Tablet WiMAX Editi...
      • Dell Goes Green with new Eco PC
      • Textbook of Surgery: Expert Consult
      • Nursing Procedures
      • Written by authors have a wide experience in teach...
      • Lippincott Manual of Nursing Practice
      • Free Encyclopedia Britannica 2008
      • Free Registry Repair Wizard 2008
      • Keeley Hazell
      • Linux Password Cracking: Explain unshadow and john...
      • Vacation checklist: prepare your PC
      • Get maximum performance from Windows Vista
      • Avoid the Commute: Work at Home
      • Linux Start up and Run Levels
      • Military-grade password protection!
      • In our effort to always bring you the latest and g...
      • Kristen Bell
      • Khet - The Laser Game
      • Gandhi daughter visits assassin
      • Suba Aluth Auruddak Weewa !!!!!!!!!!!
      • Linux Shell Scripting Tutorial v1.05r3 Linux Shell...
      • Hilary Duff’s Breasts Continue To Grow
      • Shutdown your Computer with a Cell Phone
      • shuting down somones computer remotely
      • Find out IP addresses and shut down computers from...
      • Hacking of Windows server 2003
      • Make any Windows Computer RUN FASTER and STOP ERRORS
      • Imageofmuse
      • I'm as cool as a body on ice or hotter than a roll...
      • SlySoft CloneDVD 2.9.1.6
      • Disney Print Fonts
      • Power Video Capture/Convert/Burn DVD Studio 8.0.8.24
      • Shooting within is more painful than shooting from...
      • Mariah Carey - Touch My Body (NEW SINGLE 2008) FUL...
      • Protests on Olympics Intensify Over China's Human-...
      • Keeley Hazell Topless Bikini Pictures
      • Gemma Atkinson
      • Why ignore the tips given by the foreign intellige...
      • Kim Kardashia
      • Deviant Art Misc. Creators Fonts
    • ►  March (65)
    • ►  January (2)
  • ►  2007 (10)
    • ►  December (2)
    • ►  November (8)
Powered by Blogger.

About Me

Unknown
View my complete profile