• Home
    • Recent
    • Calendar
    • Register
    • Login
    Iron Heart Forum
    Iron Heart Forum

    Iron Heart Fall/Winter 2025 Collection Preview - Now Live

    Random Rants

    General Chat
    406
    13.4k
    4.3m
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • CutlasshoundC
      Cutlasshound
      見習いボス
      Joined:

      Hopefully thats not a pint of "Husband beater".

      If it is, I am sure that Paula would sign up for a crate.

      Sent from my iPhone using Tapatalk

      I ain't got time to bleed.

      last edited by 1 Reply Last reply Reply Quote 0
      • den1mheadD
        den1mhead
        Raw and Unwashed
        Joined:

        It is "husband beater" but luckily for me it isn't me who she's angry with . . . this time [emoji4]

        Sent from my iPhone using Tapatalk

        last edited by 1 Reply Last reply Reply Quote 0
        • GilesG
          Giles
          IHUK Crew
          Joined:

          What have I done….....?

          "OK face up to it - you're useless but generally pretty honest and straightforward . . . it's a rare combination of qualities that I have come to admire in you" - Geo 2011

          last edited by 1 Reply Last reply Reply Quote 0
          • ROmanR
            ROman
            Haraki san Prodigy
            Joined:

            Possibly she was watching a US news conference.

            last edited by 1 Reply Last reply Reply Quote 0
            • xtcclassicX
              xtcclassic
              啓蒙家
              Joined:

              @xtcclassic:

              I ordered a wool scarf from Lochcarron on New Years Eve. Ten days later, the order is still "processing". I've emailed them three times over the last five days asking if the scarf was out of stock or if there was a problem with the transaction, and I've yet to receive a response. I guess not every company is IHUK. Disappointing.

              I got an email today, they said they just got back from their Christmas holiday. I wish they had said something about that on their website.

              last edited by 1 Reply Last reply Reply Quote 0
              • louisboscoL
                louisbosco
                啓蒙家
                Joined:

                @Giles:

                What have I done….....?

                nothing and everything 😃

                "Loyalty is a two way street. If i'm asking for it from you, then you're getting it from me."

                • Harvey Specter
                last edited by 1 Reply Last reply Reply Quote 0
                • ROmanR
                  ROman
                  Haraki san Prodigy
                  Joined:

                  The worst thing to me about my job is, I have to change all corporate passwords every 3 months. I stumbled for a while trying to figure out new ones, making myself crazy, then I had an idea, which I still do today, using description codes from here, making some minor changes. As an example, ih666S!!  I've never used this one, but has made changing a password every 3 months easy.

                  last edited by 1 Reply Last reply Reply Quote 0
                  • mikebarhootM
                    mikebarhoot
                    Iron Heart Deity
                    Joined:

                    just pick a word.  example = example. and substitute digits for vowels and decide which alpha to cap.  then you ALWAYS have the same password, with digit variances.  especiallyif your having to change frequently.

                    so x = 3 month interval
                    x - 01X01mpl01
                    x - 02X01mpl01

                    or of double digits too much just use one with one exception
                    x - eX1mpl01 or eX01mpl1
                    x - eX1mpl02
                    …

                    example = Iron Heart
                    x - 1r0nH301rt

                    enjoy

                    last edited by 1 Reply Last reply Reply Quote 0
                    • ROmanR
                      ROman
                      Haraki san Prodigy
                      Joined:

                      That works, Thanks.

                      last edited by 1 Reply Last reply Reply Quote 0
                      • H
                        hotel_hotel
                        Joined:

                        *as always, a relevant xkcd

                        last edited by 1 Reply Last reply Reply Quote 0
                        • GilesG
                          Giles
                          IHUK Crew
                          Joined:

                          We use 1password at work, it is great….

                          "OK face up to it - you're useless but generally pretty honest and straightforward . . . it's a rare combination of qualities that I have come to admire in you" - Geo 2011

                          last edited by 1 Reply Last reply Reply Quote 0
                          • mikebarhootM
                            mikebarhoot
                            Iron Heart Deity
                            Joined:

                            good to know… 😉

                            last edited by 1 Reply Last reply Reply Quote 0
                            • S
                              Snowy
                              Joined:

                              NERD MODE !!!

                              I use a form of correct battery horse staple - styled passwords with rotating digits to log in.

                              I have TWO FACTOR enabled for my domain names, GMAIL (Looking @ all you guys who use Google Apps ;)), and hosting providers.

                              I have TWO different YubiKeys for 2 different sets of systems to authenticate me as 'something I have'. This to me is the future, screw all this numbers stuff, press a button on a physical device, and in.

                              I use OnePassword to generate site-specific passwords. My YubiKey's randomly generated static password unlocks my OnePassword library. I keep a backup of this specific password protected encrypted on another machine with a password I'm aware of/know.

                              TWO FACTOR is a must these days. For all of you, especially any business - looking @ you @Giles and Co, if you've not set it up, For the 5 minutes of hassle, you'll get real security increases from it. Easy enough to do with the Google Authenticator App.

                              The Yubikey is a future thing really, really nice to authenticate me, only needs to be used once a day to ensure I'm still me..

                              last edited by 1 Reply Last reply Reply Quote 0
                              • mikebarhootM
                                mikebarhoot
                                Iron Heart Deity
                                Joined:

                                I was gonna go there but wasnt sure if rOman was ready for the rectinal scan discussion.

                                last edited by 1 Reply Last reply Reply Quote 0
                                • S
                                  Snowy
                                  Joined:

                                  @mikebarhoot I think your advice was solid for Roman's requirements. I was aiming more general awareness singing the praise of TWO FACTOR :).

                                  last edited by 1 Reply Last reply Reply Quote 0
                                  • ROmanR
                                    ROman
                                    Haraki san Prodigy
                                    Joined:

                                    Thanks for the advice @mikebarhoot and @Snowy . I will give it a try.

                                    last edited by 1 Reply Last reply Reply Quote 0
                                    • GraemeG
                                      Graeme
                                      啓蒙家
                                      Joined:

                                      The trouble with the xkcd password is that it depends on the hacker using brute force to try to guess it on a letter by letter basis.

                                      A common attack is to use a dictionary, or a list of words. For example, there are about 200 billion combinations of eight characters (ignoring numbers and upper and lower case), but about 45,000 words in English. Now if the hacker thinks we're using a combination of words, he could run with the assumption that they're likely to be pretty simple. No-one is likely to come up with a combination like EigenvectorFloccinaucinihilipilificationDisestablishmentarianism…

                                      Let's say that there are 10,000 words that might be used, then the search space for a combination of four becomes about 10^16. (That's a one followed by sixteen zeroes.)

                                      OK, let's take characters. If you throw in lower and upper case, numbers, and symbols (!, £, %, &, @, etc.), then you might end up with 80 you could use. For an eight character password, you've got 10^15 options. But going up to ten would give you 10^19.

                                      Of course, the hacker might assume that you're using L337 speak to swap out characters in a regular word to form a password, which gets you back to square one…

                                      As @Snowy says, use two-factor authentication. That's more secure, because you need to lose your device to prevent your account from being compromised. A password manager, with randomised long strings will also help. But security isn't my speciality.

                                      last edited by 1 Reply Last reply Reply Quote 0
                                      • SeulS
                                        Seul
                                        Joined:

                                        @Graeme:

                                        But security isn't my speciality.

                                        😉

                                        last edited by 1 Reply Last reply Reply Quote 0
                                        • louisboscoL
                                          louisbosco
                                          啓蒙家
                                          Joined:

                                          i'm not worth enough to be hacked…

                                          "Loyalty is a two way street. If i'm asking for it from you, then you're getting it from me."

                                          • Harvey Specter
                                          last edited by 1 Reply Last reply Reply Quote 0
                                          • S
                                            Snowy
                                            Joined:

                                            Modern password cracking isn't done (generally) by trying to log in as you onto a website over and over. It's done trying to authenticate/spoof your identity. It's knowing your name and address, then calling a telco, finding out they tell you the last 4 digits of your credit card by mistake. Then you call up Yahoo who authenticate you using the last 4 digits you now have. Then your gmail account or whatever, you can now do a password reset, as you've set that password to reset to the yahoo account. Game over man.

                                            ^Is a real attack that has/does get used it's how a lot of the celeb icloud hacks happened.

                                            The modern form of password cracking itself is now usually done offline. They aim to get the database and crack it offline. Most cracks don't look to work out the password, they have 1-time pre-computed hashes up front. They hire these huge instances from cloud providers and one time work out every password ever. It costs a few thousand dollars.

                                            Then they hack into a company like Yahoo, Tumblr and pull the entire database of passwords. They figure out how the password was stored in the database, then run their precomputed matching against it. That's the annoying attack. It's not targetted at you, but you've still lost all your shit. Or the details here will be kept/sold and re-used YEARS later, for something else..

                                            An example of the precomputed password stuff;

                                            Say my password is "hello world";
                                            1)The computer when it saves to the database would save that as "5eb63bbbe01eeed093cb22bb8f5acdc3" if I was using MD5 as a checksum.
                                            2)When I try log in, it generates a MD5 checksum of what I type in to make sure it matches "5eb63bbbe01eeed093cb22bb8f5acdc3".
                                            3)If it does, it knows that I typed in the right password as ONLY "hello world" can generate that string (within reason).

                                            So the hackers have a DB with all these MD5 checksums, what they then do is generate every possible word and combination ahead of time like;

                                            
                                            MD5 ("a") = 0cc175b9c0f1b6a831c399e269772661
                                            MD5 ("b") = 92eb5ffee6ae2fec3ad71c777531578f
                                            MD5 ("c") = 4a8a08f09d37b73795649038408b5f33
                                            MD5 ("..") = 58b9e70b65a
                                            MD5 ("Hello World") = b10a8db164e0754105b7a99be72e3fe5
                                            MD5 ("Hello w0rld") = e7a9e19587c07e67b205ae2d94cbad13
                                            MD5 ("h3llo w0rld") = 0dedd75e7d5b93afef109aae6a3e73a5
                                            
                                            

                                            When they get the password database, what they do is run it through the dictionary, if they get a match, they know your password. This takes under a day and only a few hundred dollars. Password complexity is not a thing anymore. Single factor is NOT secure. Hopefully you guys don't have your credit cards or bank accounts behind just a single password. And hopefully your bank password is not the same as your e-mail account. And hopefully the password reset for your bank isn't the same as the email address that was cracked above :o. 2 factor is mandatory for any business  IMO.

                                            Some of the larger breaches of the database style attacks can be seen @ https://haveibeenpwned.com/ The website owner downloads every release hack and keeps the emails on file. DO put in your e-mail and subscribe to the service to let you know if you get owned. The owner of that website is one of the most vocal IT security guys in the game (Troy Hunt).

                                            #'s of DB hacks in last few years;
                                            359,420,698 MySpace accounts 
                                            234,842,089 NetEase accounts 
                                            164,611,595    LinkedIn accounts 
                                            152,445,165 Adobe accounts 
                                            112,005,531 Badoo accounts 
                                            93,338,602 VK accounts 
                                            91,436,280 Rambler accounts 
                                            68,648,009 Dropbox accounts 
                                            65,469,298 tumblr accounts 
                                            58,843,488 Modern Business Solutions accounts

                                            My name is Snowy and I have worked and continue to work around the Information Security Industry.

                                            last edited by 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright Iron Heart 2025.