Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    Help: stolen identity of bunanson

    Reply
    Page 3 of 3 | Prev |   1     2   3 |
    geneven | # 21 | 2010-10-28, 19:01 | Report

    Originally Posted by TomJ View Post
    Would this be a good time for me to pipe up with my favorite methods for coming up with memeorable strong passworeds? Yes? Alrighty then...

    Take a phrase you know well and are unlikely to forget; a quotation or lyric is often good. Let us take something from George Orwell:

    Four legs good, two legs bad!

    Now all we have to do is take the first letters:

    Flgtlb

    Flor extra strength, we can keep the punctuation ad us numeral where appropriate:

    4lg,2lb!

    You can use other rebus type techniques to get an approriately strong yet memorable password. One I used for a while was the opening of The Rime of the Ancient Mariner:

    it is an anicient mariner,
    And he stoppeth one of three.

    which became:

    IiaAM,&hs1/3.

    Lets see a dictionary attack break that one... not that I can use it any more having shared it, but you see the point.
    Yes, that's more or less exactly what I was trying to describe in the post above yours.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    bunanson | # 22 | 2010-10-28, 19:41 | Report

    Thanks for all the suggestions.

    I just want to report, that it has been 17 days since it happened, it has NOT happened again, so far, keep my fingers cross.

    I deleted ALL my contacts from yahoo.com right away, 17 days ago, when happened. exported the contacts into a file, virus checked the file and imported into another email account, and absorbed the loss and moved into a different account. It took me 1 evening and 1 morning to take care of it, so far so good. I am now using the new email account and slowly phase out the old account. So far, there is no more trouble... keep my fingers cross,

    bun

    Edit | Forward | Quote | Quick Reply | Thanks

     
    juise- | # 23 | 2010-10-28, 20:40 | Report

    I just managed to reset my Yahoo password, knowing only my username, date of birth, country, zip code, and my father's middle name. No hacking necessary. If I can do it, someone else can do it too.

    All of that is stuff that can be easily obtained by someone who knows me.

    I'd recommend using some safer solution for e-mail. (I don't use Yahoo for mail myself, but Flickr requires a Yahoo ID). Or answering wrong to those stupid "safety" questions (in a way you can remember).

    Also, your username and password probably have been compromised by something much more common than WiFi eavesdropping. Maybe your PC has a keylogger trojan. Or some other place you've been accessing your mailbox at.

    Or maybe you've typed your username and password to a website after clicking a link in e-mail you just received. And that happened to be a phishing site. (Almost happened to me once, with some very authentic looking FB notification. I only noticed the trick, wrong URL on the address bar, because the e-mail field was pre-filled with some strange address.)

    Unfortunately, https won't protect any of the above.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    F2thaK | # 24 | 2010-10-29, 02:43 | Report

    nice one TomJ, mite upgrade my pw

    Edit | Forward | Quote | Quick Reply | Thanks

     
    geneven | # 25 | 2010-10-29, 15:41 | Report

    Originally Posted by juise- View Post
    I just managed to reset my Yahoo password, knowing only my username, date of birth, country, zip code, and my father's middle name. No hacking necessary. If I can do it, someone else can do it too.

    All of that is stuff that can be easily obtained by someone who knows me.

    I'd recommend using some safer solution for e-mail. (I don't use Yahoo for mail myself, but Flickr requires a Yahoo ID). Or answering wrong to those stupid "safety" questions (in a way you can remember).

    Also, your username and password probably have been compromised by something much more common than WiFi eavesdropping. Maybe your PC has a keylogger trojan. Or some other place you've been accessing your mailbox at.

    Or maybe you've typed your username and password to a website after clicking a link in e-mail you just received. And that happened to be a phishing site. (Almost happened to me once, with some very authentic looking FB notification. I only noticed the trick, wrong URL on the address bar, because the e-mail field was pre-filled with some strange address.)

    Unfortunately, https won't protect any of the above.
    Unfortunately, I don't remember my father's middle name

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Descalzo | # 26 | 2010-10-29, 16:16 | Report

    What I want to know is: who really started this thread? And why are we giving this impostor all this free security advice?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    bunanson | # 27 | 2010-10-29, 16:43 | Report

    Thanks again, I appreciate those advice and will take steps to implement them.

    bun

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Texrat | # 28 | 2010-11-04, 06:13 | Report

    Oops... this is scary:

    Originally Posted by
    A Swiss security company called Objectif Sécurité has created a cracking technology that uses rainbow tables on SSD drives.

    Apparently it is the hard drive access time and not the processor speed that slows down cracking speed. So using SSD drives can make cracking faster, but just how fast?

    One article in March of this year stated that the technique using SSD drives could crack passwords at a rate of 300 billion passwords a second, and could decode complex password in under 5.3 seconds.
    http://cyberarms.wordpress.com/2010/...-in-5-seconds/


    Edit | Forward | Quote | Quick Reply | Thanks

     
    geneven | # 29 | 2010-11-18, 07:55 | Report

    Originally Posted by Texrat View Post
    Oops... this is scary:



    http://cyberarms.wordpress.com/2010/...-in-5-seconds/

    Well, I'm waiting for the fingerprint scanner instead of password. I know they exist -- I've even worked where I had to use one whenever entering or leaving. But they aren't really widespread yet.

    And for further security, companies can do full body scans and scan different body parts at random. ("Enter your knee below the flashing light.") I read in I think Slashdot the other days that ears were good...

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Wikiwide | # 30 | 2010-11-23, 00:52 | Report

    Quick reply...
    Keep computer clean of malware.
    Don't use insecure Wi-Fi while entering a password.
    Don't open attachments.
    Forward all received spam to spam@uce.gov (I'm not sure I remember it correctly).
    Disable Flash.
    Use different but memorable passwords.

    For instance:
    on newscientist.com you have no special private information, in the worst case subscriptions can be changed. So I use: NewScientist.
    Can be cracked, but it's of no use to the cracker, because I don't give any private information to this account.

    I hope that possibility to see IPs of all sessions using the account and switch off all of them (with inputting password and image captcha and audio captcha) will become standard. Video captcha isn't much different from image captcha, but audio captcha IS, especially if you choose unusual language in your settings (this setting reading/writing should be guarded by audio captcha, too, so that the cracker couldn't know the language and its pronunciation).

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Page 3 of 3 | Prev |   1     2   3 |
vBulletin® Version 3.8.8
Normal Logout