lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3E71BE64C6ECD8449CD5A236F700FA9681462D@odcexch.wei.owhc.net>
From: mbassett at omaha.com (Bassett, Mark)
Subject: RE: Linux (in)security

<snip>
Now, lest you get your hopes up and think it's possible to change the
world, read this:

http://www.ukauthority.com/articles/story898.asp

After reading this, I had a good cry and then took some aspirin.  :-(
</snip>

<snip>
The final question in the survey asked respondents to enter their
password to be included in a prize draw. Despite the fact that this
information would give a hacker open-access to private IT networks, an
incredible 15 percent of people opted to give their password - before
the on-line survey pointed out their mistake.
</snip>

And 14 of those 15% entered bogus passwords just to enter into the prize
drawing.  I'm sure there are some dumbasses out there, but why put in a
real password when a fake one will do? 

Mark Bassett
Network Administrator
World media company
Omaha.com
402-898-2079


-----Original Message-----
From: Schmehl, Paul L [mailto:pauls@...allas.edu] 
Sent: Wednesday, October 22, 2003 9:12 AM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] RE: Linux (in)security


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ