• Home
    • Recent
    • Calendar
    • Register
    • Login
    Iron Heart Forum
    Iron Heart Forum

    Iron Heart Fall/Winter 2025 Collection Preview - Now Live

    Random Rants

    General Chat
    406
    13.4k
    4.3m
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • den1mheadD
      den1mhead
      Raw and Unwashed
      Joined:

      It is "husband beater" but luckily for me it isn't me who she's angry with . . . this time [emoji4]

      Sent from my iPhone using Tapatalk

      last edited by 1 Reply Last reply Reply Quote 0
      • GilesG
        Giles
        IHUK Crew
        Joined:

        What have I done….....?

        "OK face up to it - you're useless but generally pretty honest and straightforward . . . it's a rare combination of qualities that I have come to admire in you" - Geo 2011

        last edited by 1 Reply Last reply Reply Quote 0
        • ROmanR
          ROman
          Haraki san Prodigy
          Joined:

          Possibly she was watching a US news conference.

          last edited by 1 Reply Last reply Reply Quote 0
          • xtcclassicX
            xtcclassic
            啓蒙家
            Joined:

            @xtcclassic:

            I ordered a wool scarf from Lochcarron on New Years Eve. Ten days later, the order is still "processing". I've emailed them three times over the last five days asking if the scarf was out of stock or if there was a problem with the transaction, and I've yet to receive a response. I guess not every company is IHUK. Disappointing.

            I got an email today, they said they just got back from their Christmas holiday. I wish they had said something about that on their website.

            last edited by 1 Reply Last reply Reply Quote 0
            • louisboscoL
              louisbosco
              啓蒙家
              Joined:

              @Giles:

              What have I done….....?

              nothing and everything 😃

              "Loyalty is a two way street. If i'm asking for it from you, then you're getting it from me."

              • Harvey Specter
              last edited by 1 Reply Last reply Reply Quote 0
              • ROmanR
                ROman
                Haraki san Prodigy
                Joined:

                The worst thing to me about my job is, I have to change all corporate passwords every 3 months. I stumbled for a while trying to figure out new ones, making myself crazy, then I had an idea, which I still do today, using description codes from here, making some minor changes. As an example, ih666S!!  I've never used this one, but has made changing a password every 3 months easy.

                last edited by 1 Reply Last reply Reply Quote 0
                • mikebarhootM
                  mikebarhoot
                  Iron Heart Deity
                  Joined:

                  just pick a word.  example = example. and substitute digits for vowels and decide which alpha to cap.  then you ALWAYS have the same password, with digit variances.  especiallyif your having to change frequently.

                  so x = 3 month interval
                  x - 01X01mpl01
                  x - 02X01mpl01

                  or of double digits too much just use one with one exception
                  x - eX1mpl01 or eX01mpl1
                  x - eX1mpl02
                  …

                  example = Iron Heart
                  x - 1r0nH301rt

                  enjoy

                  last edited by 1 Reply Last reply Reply Quote 0
                  • ROmanR
                    ROman
                    Haraki san Prodigy
                    Joined:

                    That works, Thanks.

                    last edited by 1 Reply Last reply Reply Quote 0
                    • H
                      hotel_hotel
                      Joined:

                      *as always, a relevant xkcd

                      last edited by 1 Reply Last reply Reply Quote 0
                      • GilesG
                        Giles
                        IHUK Crew
                        Joined:

                        We use 1password at work, it is great….

                        "OK face up to it - you're useless but generally pretty honest and straightforward . . . it's a rare combination of qualities that I have come to admire in you" - Geo 2011

                        last edited by 1 Reply Last reply Reply Quote 0
                        • mikebarhootM
                          mikebarhoot
                          Iron Heart Deity
                          Joined:

                          good to know… 😉

                          last edited by 1 Reply Last reply Reply Quote 0
                          • S
                            Snowy
                            Joined:

                            NERD MODE !!!

                            I use a form of correct battery horse staple - styled passwords with rotating digits to log in.

                            I have TWO FACTOR enabled for my domain names, GMAIL (Looking @ all you guys who use Google Apps ;)), and hosting providers.

                            I have TWO different YubiKeys for 2 different sets of systems to authenticate me as 'something I have'. This to me is the future, screw all this numbers stuff, press a button on a physical device, and in.

                            I use OnePassword to generate site-specific passwords. My YubiKey's randomly generated static password unlocks my OnePassword library. I keep a backup of this specific password protected encrypted on another machine with a password I'm aware of/know.

                            TWO FACTOR is a must these days. For all of you, especially any business - looking @ you @Giles and Co, if you've not set it up, For the 5 minutes of hassle, you'll get real security increases from it. Easy enough to do with the Google Authenticator App.

                            The Yubikey is a future thing really, really nice to authenticate me, only needs to be used once a day to ensure I'm still me..

                            last edited by 1 Reply Last reply Reply Quote 0
                            • mikebarhootM
                              mikebarhoot
                              Iron Heart Deity
                              Joined:

                              I was gonna go there but wasnt sure if rOman was ready for the rectinal scan discussion.

                              last edited by 1 Reply Last reply Reply Quote 0
                              • S
                                Snowy
                                Joined:

                                @mikebarhoot I think your advice was solid for Roman's requirements. I was aiming more general awareness singing the praise of TWO FACTOR :).

                                last edited by 1 Reply Last reply Reply Quote 0
                                • ROmanR
                                  ROman
                                  Haraki san Prodigy
                                  Joined:

                                  Thanks for the advice @mikebarhoot and @Snowy . I will give it a try.

                                  last edited by 1 Reply Last reply Reply Quote 0
                                  • GraemeG
                                    Graeme
                                    啓蒙家
                                    Joined:

                                    The trouble with the xkcd password is that it depends on the hacker using brute force to try to guess it on a letter by letter basis.

                                    A common attack is to use a dictionary, or a list of words. For example, there are about 200 billion combinations of eight characters (ignoring numbers and upper and lower case), but about 45,000 words in English. Now if the hacker thinks we're using a combination of words, he could run with the assumption that they're likely to be pretty simple. No-one is likely to come up with a combination like EigenvectorFloccinaucinihilipilificationDisestablishmentarianism…

                                    Let's say that there are 10,000 words that might be used, then the search space for a combination of four becomes about 10^16. (That's a one followed by sixteen zeroes.)

                                    OK, let's take characters. If you throw in lower and upper case, numbers, and symbols (!, £, %, &, @, etc.), then you might end up with 80 you could use. For an eight character password, you've got 10^15 options. But going up to ten would give you 10^19.

                                    Of course, the hacker might assume that you're using L337 speak to swap out characters in a regular word to form a password, which gets you back to square one…

                                    As @Snowy says, use two-factor authentication. That's more secure, because you need to lose your device to prevent your account from being compromised. A password manager, with randomised long strings will also help. But security isn't my speciality.

                                    last edited by 1 Reply Last reply Reply Quote 0
                                    • SeulS
                                      Seul
                                      Joined:

                                      @Graeme:

                                      But security isn't my speciality.

                                      😉

                                      last edited by 1 Reply Last reply Reply Quote 0
                                      • louisboscoL
                                        louisbosco
                                        啓蒙家
                                        Joined:

                                        i'm not worth enough to be hacked…

                                        "Loyalty is a two way street. If i'm asking for it from you, then you're getting it from me."

                                        • Harvey Specter
                                        last edited by 1 Reply Last reply Reply Quote 0
                                        • S
                                          Snowy
                                          Joined:

                                          Modern password cracking isn't done (generally) by trying to log in as you onto a website over and over. It's done trying to authenticate/spoof your identity. It's knowing your name and address, then calling a telco, finding out they tell you the last 4 digits of your credit card by mistake. Then you call up Yahoo who authenticate you using the last 4 digits you now have. Then your gmail account or whatever, you can now do a password reset, as you've set that password to reset to the yahoo account. Game over man.

                                          ^Is a real attack that has/does get used it's how a lot of the celeb icloud hacks happened.

                                          The modern form of password cracking itself is now usually done offline. They aim to get the database and crack it offline. Most cracks don't look to work out the password, they have 1-time pre-computed hashes up front. They hire these huge instances from cloud providers and one time work out every password ever. It costs a few thousand dollars.

                                          Then they hack into a company like Yahoo, Tumblr and pull the entire database of passwords. They figure out how the password was stored in the database, then run their precomputed matching against it. That's the annoying attack. It's not targetted at you, but you've still lost all your shit. Or the details here will be kept/sold and re-used YEARS later, for something else..

                                          An example of the precomputed password stuff;

                                          Say my password is "hello world";
                                          1)The computer when it saves to the database would save that as "5eb63bbbe01eeed093cb22bb8f5acdc3" if I was using MD5 as a checksum.
                                          2)When I try log in, it generates a MD5 checksum of what I type in to make sure it matches "5eb63bbbe01eeed093cb22bb8f5acdc3".
                                          3)If it does, it knows that I typed in the right password as ONLY "hello world" can generate that string (within reason).

                                          So the hackers have a DB with all these MD5 checksums, what they then do is generate every possible word and combination ahead of time like;

                                          
                                          MD5 ("a") = 0cc175b9c0f1b6a831c399e269772661
                                          MD5 ("b") = 92eb5ffee6ae2fec3ad71c777531578f
                                          MD5 ("c") = 4a8a08f09d37b73795649038408b5f33
                                          MD5 ("..") = 58b9e70b65a
                                          MD5 ("Hello World") = b10a8db164e0754105b7a99be72e3fe5
                                          MD5 ("Hello w0rld") = e7a9e19587c07e67b205ae2d94cbad13
                                          MD5 ("h3llo w0rld") = 0dedd75e7d5b93afef109aae6a3e73a5
                                          
                                          

                                          When they get the password database, what they do is run it through the dictionary, if they get a match, they know your password. This takes under a day and only a few hundred dollars. Password complexity is not a thing anymore. Single factor is NOT secure. Hopefully you guys don't have your credit cards or bank accounts behind just a single password. And hopefully your bank password is not the same as your e-mail account. And hopefully the password reset for your bank isn't the same as the email address that was cracked above :o. 2 factor is mandatory for any business  IMO.

                                          Some of the larger breaches of the database style attacks can be seen @ https://haveibeenpwned.com/ The website owner downloads every release hack and keeps the emails on file. DO put in your e-mail and subscribe to the service to let you know if you get owned. The owner of that website is one of the most vocal IT security guys in the game (Troy Hunt).

                                          #'s of DB hacks in last few years;
                                          359,420,698 MySpace accounts 
                                          234,842,089 NetEase accounts 
                                          164,611,595    LinkedIn accounts 
                                          152,445,165 Adobe accounts 
                                          112,005,531 Badoo accounts 
                                          93,338,602 VK accounts 
                                          91,436,280 Rambler accounts 
                                          68,648,009 Dropbox accounts 
                                          65,469,298 tumblr accounts 
                                          58,843,488 Modern Business Solutions accounts

                                          My name is Snowy and I have worked and continue to work around the Information Security Industry.

                                          last edited by 1 Reply Last reply Reply Quote 0
                                          • organisysO
                                            organisys
                                            Raw and Unwashed
                                            Joined:

                                            Which is why owners of sites need to salt their hashes.  😛

                                            Pride of Japan :-)

                                            last edited by 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright Iron Heart 2025.