This action might not be possible to undo. Are you sure you want to continue?
ITS Creates Unix Login Id and Password for new users to use Al Yousuf Business Applications. 2. ITS Creates Password same like Login Id ( Ex : login : abcdefgh , Password : abcdefgh ) 3. You can find one Icon in your Desktop ( Telnet or user1 ) double click the Icon. 4. You will get below login prompt Screen.
SunOS 5.9 login: password: Here enter your Login id Here enter password same like Login Id(Password will not be visible to you.)
( While Creating Login Id ITS set your password. that is the reason we are forcing to change your Password ) Choose a new password.The first 6 characters of the new password must contain at least two alphabetic characters and at least one numeric or special character. . New Password: Choose your own Password Re-Enter New Password : Reenter the same password for confirm. you have to change your own password. ---------------------------------------------------------------------------------------------------- You will get next Screen Enter Database Password : Here either you can use same password or can choose different password .
Application User Manual is available in Intranet Web Site : www.alyousuf.After that you can see the application Main Menu to use the applications.this will take you to Main Page and Select Al Yousuf Application Documentation ) .net ( Key board hold Ctrl Key and Click Mouse from web site link .
Menu Keys: Once you login using login_id and password you will get Main Menu. : To Save or to Commit the instruction. : To bring the cursor to the Previous Block. 3. 5. : Cursor will move next Field : Up Arrow and Down Arrow keys for Scrolling Records up and down Basic System Password Requirements 1. 4. 2. Pressing Pressing Up Arrow and Right Arrow and Down arrow Keys and Press Enter key to Choose Application Left Arrow to Choose and Press Enter to get Data Entry Forms / Query Forms / Reports. (Block Navigation) : To bring the cursor to the Next Block (Block Navigation) : To Exit without Saving. The password shall contain both upper and lowercase characters The password shall contain at least one non-alphanumeric character The password shall be a minimum of eight (8) characters in length The password shall be changed every 180 days The password shall remain restricted from public viewing at all times . Form Keys: Below keys can use query forms as well as data entry forms F1 F3 F4 F10 F12 Enter ↑↓ : For the List of Values of the Current Field.
Longer words do not generally add much protection. A poor password creates a false sense of security. and may endanger your personal information. German. 9. No password is ultimately secure. street address. 7.6. slang. but if it takes the password cracker longer to crack the password than it takes for the password to become useless. making these passwords the least secure passwords. parents names.). names of pets. All personal passwords shall not be shared with any other person The password policy applies to individual users and/or system administrators Do not re-use a password The password shall not be a word in any language (English. you will have succeeded in thwarting the cracker's attack. Selecting a secure password will help to ensure that the password cracker must take as much time as possible to guess or otherwise identify your password. 8. A password cracker with incentive to break your personal password will use this information first. birthplace. names of siblings and the like. Examples of bad passwords of this type are: your name. Insecure methods • • Passwords should not be created using personal information about yourself or your family. or jargon Selecting a good password Choosing a good password is critical for personal security requiring password crackers to take additional time and resources to get access to your personal information and computer credentials. family name. Passwords should not be formed of words out of any dictionary or book. nickname. Password Construction Password crackers have many tools at their disposal to cut down the amount of time it takes to crack your password. or even allow another individual to spawn attacks and viruses using your personal credentials. access to computer resources. Using known words in any language allows the password cracker to take shortcuts in his password cracking schemes. allowing him to guess . etc.
Examples of passwords of this type are drowssap. ensure it is in a locked location that is only accessible to you. Ask for administrative assistance if you have trouble changing your password. at least every six months. catspajamas. Do not write your password down where others may find it. If you find it difficult to pick a new password. . l0ve. and similar words. Although these passwords don't appear in a book or dictionary. dr@gon. instant messenger client. Use substitution of numbers for letters and letters for numbers in your passwords. It also helps you if somehow you have compromised your password in some other way without knowing it. These words are commonly found in password cracker databases. some systems do not allow you to use some or any special characters. Always do this directly. Take heed however. ilove. Password crackers have a criminal mind. Secure methods • • • • • Always change your password immediately if you feel that your password has been compromised. but still fall far short for password security Examples of these kinds of passwords are: whatfor. and generally know where to look. Passwords should not be simple variations of words. or people. and special characters. Hiding your password in places you feel it is unlikely to be found is not helpful. secret. and similar word-like terms. Although this is not a primary method of securing your password. Passwords should not be a concatenation of two words commonly following each other in a sentence. Do not reuse recently employed passwords again. love. or from a phone call you received. it will add another layer of security on top of a good password. through an instant messenger client. beesknees. Make sure you check the password criteria for the system you are using ahead of time. transformers. you should wait until you changed you password at least 5 times before reusing an old password. Coolio. and will prevent the accidental guess of your password due to circumstances. cheese. god. ideas. it is a simple matter to generate a replacement word list automatically. Examples of bad passwords of this type are: dragon. edutainment. farfetched. Never follow links sent to you in email. Select passwords that use a mixture of capital letters.• • • • your password in a very small fraction of the time it would take otherwise. or 12 months if password changes are common. but not significantly more secure. numbers. Examples are: Jehovah. It is important that you change your password on a regular schedule. These passwords are more secure than the above two examples. but have not yet been completed. If you must write it down. divineright. Passwords should not be composed of proper nouns of places. s3cr3t. These passwords are more secure than the above password concepts. This assists you by throwing off any cracking efforts that might be in progress. if possible.
The best passwords are complete phrases if the system will allow them.• • Where it is not possible to use many characters in your password (less than 14). it is easy to remember when you note the passphrase "John Jacob Jingleheimer Schmidt. An example of this is "jJjshnImn2". . For example. Longer passphrases generally mean better password security. it is advisable to create a password by creating a passphrase. and selecting letters in a specific position in each word. Notice the use of number substitution and capitalization in the password." You can also use number and letter substitution on passphrases as well. They are sometimes called "passphrases" in reflection of this. As you notice. a good passphrase might be "I clean my Glock in the dishwasher. his name is my name too". however. it's unlikely that any cracker would guess this password.
This action might not be possible to undo. Are you sure you want to continue?