Solved

What's the best proactice for user id's

Posted on 2007-11-27
3
249 Views
Last Modified: 2010-04-02
Liked to know if short user id's not not a best practice.  What would be a best practice for user IDs
0
Comment
Question by:mutec1
3 Comments
 
LVL 6

Assisted Solution

by:ashutosh_kumar
ashutosh_kumar earned 100 total points
ID: 20358365
there is no such rule but usually its advised to keep it greater than 5 or 6 characters, so that its not easy to guess them.
0
 
LVL 1

Accepted Solution

by:
AMountaineer earned 300 total points
ID: 20358375
Opinions will vary on this. However as a rule, the longer the user ID, the more difficult for someone else to guess it.

Personally I would reccommend no less than 8 characters and have at least one letter, one number and one 'special character' &*( etc. within those eight.

This combined with a password of similar length will help to protect your data
0
 
LVL 4

Assisted Solution

by:deltronic
deltronic earned 100 total points
ID: 20358517
I would suggest using something unique to each employee like there employee number or a standard like first 3 letters of there first name and 3 first of there last name. Ex: John Doe would be johdoe. The real emphasis should be on password complexity. The password should be complex to prevent unauthorized people from logging in the system and causing security issues.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question