You are not logged in.
Nelias2096 wrote:Or you just use a password manager and randomly generated passwords.
Who the fuck are you?
who the fuck are you to invalidate an opinion/suggestion because it comes from a newcomer
it's pretty valid imo
Offline
He just asked who the guy is you mongrel - it's a Boat thing, he's a bit weird. Nelias2096 sounds like the guy who'd put his name as the password. :p
Offline
or it's ippe's ruse and we're all being baited on
Offline
If they can get your master password + other verification method or they reverse engineer the algorithm and find out when you made the password then you probably would get fucked anyway. E: Also I just made up this name because I didn't think up anything else and wanted to create an account.
Last edited by Nelias2096 (2016-07-31 21:24:29)
Offline
Teletubbies29 is about as secure as you can get with a password. This post is sponsored by PayPal.
Offline
You'd be fucked if you'd rely on this. Its just another attack point you're giving there, which you should avoid.
The more dependencies you have, the more likely it is that something breaks and you're fuk'd. Basically, you want the attacker to know as little as possible (somewhat related: social engineering is actually the more successful method of fishing passwords, over Bruteforcing. Not sure how succesful keyloggers are in relation to these two.) (also this is why sites forcing you to have your password between 6-10 symbols, with numbers and capitalized letters and all too often without alt codes... is stupid*.) and as few attack points as possible.
*Theres some merit for the layman: You can have a cascaded attack where the attacker first uses only letter, then only numbers and and so on, but in general, you're decreasing the amount of valid passwords and thus the time needed to crack them. If theres no such limit on the password the attacker needs to run the number only (etc...) runs first, but if its there, he can skip those passwords altogether! So for the sake for those who dont use number only (or variations), it would be better if these limitations WERENT there.
Last edited by Granger (2016-07-31 21:39:11)
Life is like a box of chocolates.
Offline
If you get social engineered then you probably are just gullible and those two methods are valid only if they are the nsa/extremely high-profile group. The only realistic way you will lose your information is if your computer is compromised because of malware or someone that you rely on for security gets social engineered (for example the recent phone company cases). The best way not to get fucked is just to use proper passwords and watch out what you download on your computer imo.
Offline
Well, social engineering is much more than asking "hey whats your password?". Many people base their passwords on things they like/people they know (looking at you anus!) and that gives the people passwords to try before others, significantly speeding up the cracking process.
Basing your password on your mothers birthdate seems like a good idea until you realize that that information is quite easily available and similary easily connected to you. So dont.
Its how i cracked my mothers computer password. Why do you think a password with your occupation then the year you started to work is any means of secure?!
At least the admin password is more secure. Or maybe it isnt and i wasnt trying out the right things.
Last edited by Granger (2016-07-31 21:47:39)
Life is like a box of chocolates.
Offline
Tbh if people just use the pseudo-random passwords it would be nearly as safe as your method as long as they have other parts covered like anti-malware and not getting social engineered. Because if either of those happen it pretty much doesn't matter what your passwords are, how they are created or where are they stored. In this case the problem would be solved by just increasing complexity be it by your method or just using a pseudo-random number. I mean if they were able to decode the time you created your password (the exact nanoseconds etc.) and the pseudo-random number generator algorithm why couldn't they just as easily get into tuuba's database and reverse-engineer the encryption algorithm to get all the passwords?
Offline
FuZ wrote:am i in the 22%
Yes.
nice
i use my WEP key on all important website tho, it's random letters and numbers
Last edited by FuZ (2016-07-31 22:16:54)
Offline
odd, I didn't get any messages regarding that subject. I guess I'm cool.
Offline
In a constant state of being high, I'm sure you'd have no trouble thinking up of some wacky ass password that not even the best hacker in the world could crack.
Offline
pfft, that's NEDM, he's constantly high, I'm just me, thanks for asking.
speaking of him, I haven't seen them in a while, like others. Maybe he transcended Nirvana.
Last edited by Hades Izanami (2016-07-31 22:52:06)
Offline
Tbh if people just use the pseudo-random passwords it would be nearly as safe as your method as long as they have other parts covered like anti-malware and not getting social engineered. Because if either of those happen it pretty much doesn't matter what your passwords are, how they are created or where are they stored. In this case the problem would be solved by just increasing complexity be it by your method or just using a pseudo-random number. I mean if they were able to decode the time you created your password (the exact nanoseconds etc.) and the pseudo-random number generator algorithm why couldn't they just as easily get into tuuba's database and reverse-engineer the encryption algorithm to get all the passwords?
no but who the actual DICK are you
I'm back from my music festival and I feel like I've been heavily drinking when reality I only had half a sip of my mum's shitty cocktail yesterday and instantly complained it's too bitter
(´・ω・`)
Offline
Offline