Go | New | Find | Notify | Tools | Reply |
Member |
Thank you ensigmatic. I just changed mine. ——————————————— The fool hath said in his heart, There is no God. Psalm 14:1 | |||
|
Unapologetic Old School Curmudgeon |
Some sites want 8 characters max, others 6 to 9, some want special characters and a number, others dont. Too many to remember them all and my company won't let you use a password manager. So my super secret method is a piece of paper with all my passwords on it. Don't weep for the stupid, or you will be crying all day | |||
|
Member |
^^^^ so long as that piece of paper is folded. And inserted into a book of some dubious history and storyline. lol. We are all born ignorant, but one must work hard to remain stupid." ~ Benjamin Franklin. "If anyone in this country doesn't minimise their tax, they want their head read, because as a government, you are not spending it that well, that we should be donating extra...: Kerry Packer SIGForum: the island of reality in an ocean of diarrhoea. | |||
|
Unapologetic Old School Curmudgeon |
It's written in reverse Klingon with infra red ink and in a secret vault.... Or maybe just sitting on my desk Don't weep for the stupid, or you will be crying all day | |||
|
Member |
+1 A good reminder as I now take care of a few of my mother's online accounts and they needed some PW updates. | |||
|
Nullus Anxietas |
You're welcome, but not to worry. Seriously Your best defense, again, is having a strong password. Look at it this way: I know this is going on. Heck, I can watch it in real time if I want. And I'm doing nothing other than monitoring it (*). I don't need to do anything, because my passwords are strong. Changing an otherwise strong password when you know you're under attack boots nothing. To what would you change it? You have no idea what the attacker's using for a guessing algorithm. You could well change it to something he's just about to try.
Not exactly. What I'm saying is if your password is weak, now is the time to change it to a strong one. I've had "strong" passwords that were as little as eight characters long, used on services exposed to the Internet for nigh on twenty years, never get cracked. That's in part because brute-forcing passwords by network-connection-after-tediously-slow-network-connection is exceedingly inefficient. (Yes, there's the xkbd example, above. That's an extreme, not impossible, but extreme example.) (N.B.: I would never consider using such a short password in this day and age.)
It is. Ensure your passwords are strong and make sure you're not sharing them on any two or more sites. (*) Ok, I lied. The one on the Irish network annoyed me so I dumped the entire netblock of 1024 IP addresses into router blocks "America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe "If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher | |||
|
Member |
^^^ all good with the above, thanks ensig! Apologies, I shouldn't let this thread drift in this direction ... moving the entire Irish IP address allocation is a good step, next a VPN? We are all born ignorant, but one must work hard to remain stupid." ~ Benjamin Franklin. "If anyone in this country doesn't minimise their tax, they want their head read, because as a government, you are not spending it that well, that we should be donating extra...: Kerry Packer SIGForum: the island of reality in an ocean of diarrhoea. | |||
|
easy money |
Hello! Fascinating topic! Another question - sorry I hope it’s ok. Does using a paid mail service - like proton mail - offer any added security? Thank you for sharing your knowledge! Jim That which doesn't kill you only makes you stronger | |||
|
Nullus Anxietas |
I'm sorry, but I don't know anything about Proton Mail in particular. In the context of my warning and recommendations: This is pretty much on you, the end-user. Sure, if Proton Mail's staff is keeping an eye on this kind of thing, and I've no reason to believe they're not, they might take measures to mitigate against the attacks if they deem it necessary. As I noted: As attacks go: So far this is very low-level stuff. I don't feel it cause for alarm. I only mentioned it because I saw an increase.
You're welcome. Also to the others of you who've extended me thanks: You're likewise welcome. "America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe "If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher | |||
|
אַרְיֵה |
Post-It note, stuck on the side of your monitor. הרחפת שלי מלאה בצלופחים | |||
|
10mm is The Boom of Doom |
I use "password" as my password for all my accounts. It's so simple know one would ever guess it. God Bless and Protect the Once and Future President, Donald John Trump. | |||
|
Member |
Dude, you gotta capitalize the P. Everyone knows that... | |||
|
Back, and to the left |
Thanks for posting this thread. I originally read it and planned to select a 'KeyRing' program and start using it. I had done most of the reading I was going to do and settled on LastPass. I just hadn't done it yet. Last night before going to bed, I checked email and, in the spam folder is one titled: Your Name: your password Except it was my name and a password I used extensively 15-20 years ago (yes, multiple sites) and is still present on some forums I don't visit anymore. I didn't open it. But I just installed LastPass and will be adding entries as fast as possible. Any other actions you would take or advise? I returned, and saw under the sun, that the race is not to the swift, nor the battle to the strong, neither yet bread to the wise, nor yet riches to men of understanding, nor yet favour to men of skill; but time and chance happeneth to them all. -Ecclesiastes 9:11 ...But the king shall rejoice in God; every one that sweareth by Him shall glory, but the mouth of them that speak lies shall be stopped. - Psalm 63:11 [excerpted] | |||
|
Nullus Anxietas |
Yes: Begin using "tagged" (aka: "plussed") email addresses where you can, if your email service provider supports them. This is where you give on-line vendors and forums such as SF an email address such as "jdoe+something@example.com", where: "jdoe" is the regular username portion of your email address "something" is a string unique to that site "example.com" is your email provider's domain What modern, Internet-standard email systems do, when receiving email directed to such addresses is strip the "+something" and deliver to the remainder. Thus email sent to "jdoe+something@example.com" will be delivered to "jdoe@example.com". Doing this has several advantages:
N.B.: Some email service providers may not properly support delivery to tagged addresses. Gmail and Apple mail do. The common email server software used by Unix/Linux systems do. Last time I checked, Microsoft did not. Further: Many (broken) on-line order and fulfillment systems software will not allow the use of a "+" in an email address. If in doubt you can test it by having somebody send an email to you using a made up tagged email address. "America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe "If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher | |||
|
Back, and to the left |
Thanks for the quick replay Ensigmatic. THAT. tagged addresses is what I was looking for. I remember reading it in another thread maybe. Thanks for all your help. I am going through and revisiting (as I am with all site) any sites that might still use that password and change it/place it in the vault or just delete my accounts from them. The email I accessed through Gmail but it very likely was POP forwarded from one of two hotmail accounts. Not sure how to see without opening it. I already changed all my different email account passwords to 25 digit random ones generated by the LastPass PW generator. They were the first into my KeyRing. Ultimately I will delete it, but is there anything info I should try to glean from the spam message beforehand? | |||
|
Nullus Anxietas |
Depends upon what you're using for an email client application. Many of them allow you to see "full email headers" with either a menu option or a hotkey (often Ctrl-H while displaying the email in question.) What you're looking for are the "Received:" headers, with the last one first, first one last. One-or-more will be added for each server through which the email passed. Other than that: There's no way to tell. "America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe "If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher | |||
|
Back, and to the left |
Yeah it looks like you can't without opening the email when using the Gmail webpage. I don't use Outlook or anything else. | |||
|
Nullus Anxietas |
Can't help you with that. I never use web mail. Clunky interface and the browser leaves one open to browser bug vulnerabilities via email. "America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe "If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher | |||
|
member |
I always use 31 character alpha/numeric/special character passwords, where permitted, because my password manager makes it easy (1Password). Using Postbox (on a Mac), which is a Thunderbird knockoff, or even TB itself, it is just a keystroke combo to view the actual source content of an email (all headers plus content in the original text form it was transmitted in). Any email I am suspicious of, and which is not obviously spam, I view source to see just where it originated. I get ones occasionally "from" Netflix, Apple, and others that look on the surface to be legitimate, at least from the visible From: and Subject:. Seeing that it comes from a server in .jp, no thanks and I never even open it. I wish other clients made it so easy to view source. On Apple Mail, you actually have to open the email before you can view source, for example. When in doubt, mumble | |||
|
Powered by Social Strata | Page 1 2 |
Please Wait. Your request is being processed... |