Hot Apps: Password Management - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News
Commentary
4/14/2006
02:42 PM
Commentary
Commentary
Commentary
50%
50%

Hot Apps: Password Management

Memorize one master password of your choice to access all your password-based Web sites from any computer--with strong encryption tossed in as a bonus.

How many Web-based passwords do you need to remember? Ten? Twenty? Far more?

More to the point, how do you remember them? Do you resort to using one password for all sites? That has an obvious downside: any malware that steals your password can access all your Web sites. Do you scribble your passwords on sticky notes or a piece of paper? (Downside: any person who finds the documents can access any of your Web sites.) Do you use password-storage software? (Downside: malware that can grab your password files can decipher its passwords with relative ease these days.) Or are you one of a rare breed who has a mental algorithm that lets you figure out your passwords on the fly? (Downside: you’re as compulsively odd as I have been over the years.)

Despite some version 1.0 rough edges that make initial setup a wee challenging, AMUST 1-Login offers a conceptually exciting alternative. You provide a single, master password and 1-Login generates a unique password based on that master password and the URL for any site you visit -- such as your bank and favorite online retailers.

You’ll need a recent version of Microsoft Windows as well as Internet Explorer to exploit 1-Login. (A Firefox version is in the works, the company says.) 1-Login works for me under Windows XP Pro with SP2 installed; it bombed under Windows 98 SE.

You can use 1-Login in various ways, but the beauties are that the passwords you generate aren’t stored on your computer, and simply by remembering your master password you can log into your password-protected Web sites from any computer. So malware can’t capture typed entries because you don’t type them, or steal stored password files because they aren’t there.




1-Login prompts you through the process of creating and setting your username and password for each site you visit.
Click to Enlarge

How does 1-Login perform its magic? It applies an algorithm based on your master password and a Web site’s URL. For the technically inclined, the algorithm uses a one-way hash with HMAC-MD5 encryption on the fly. The result also is stronger passwords than most of us are willing to manually create and memorize. The product can use passwords currently installed on your computer, but you’ll want to delete your current stored passwords if you rely on 1-Login.

A free version of the product is limited to 10 login passwords. If it works as well for you as it has for me, you can pay a pittance for unlimited login passwords.

My biggest gripe is that 1-Login fails to install unless you consent to loading it every time you start Windows. (Please, let me decide for myself given all the potentially contentious startup processes competing for the heart and mind of my computer.) But that and a few other discomforts aside, my advice is to test drive the product and see how it works for you. Lately, AMUST Software has been at the leading edge of desktop security products.


AMUST 1-Login 1.0
AMUST Software
www.amustsoft.com
Price: $29.99 ($19.99 until May 20, 2006)
Summary: 1-Login lets you access all your password-protected sites from any computer simply by remembering your chosen master password

J.W. Olsen has been a full-time IT author, columnist, editor, and freelance book project manager with more than 1000 editorial credits since 1990, and has provided computer, Web site, and editorial services to other clients since 1985. He welcomes feedback via the response form at www.jwolsen.com.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Slideshows
IT Careers: 10 Industries with Job Openings Right Now
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/27/2020
Commentary
How 5G Rollout May Benefit Businesses More than Consumers
Joao-Pierre S. Ruth, Senior Writer,  5/21/2020
News
IT Leadership in Education: Getting Online School Right
Jessica Davis, Senior Editor, Enterprise Apps,  5/20/2020
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll