>9000
100 million
42 years for bf2s
42 years for bf2s
..spaceballsMorpheus wrote:
http://static.bf2s.com/files/user/31499 … sword-.png
good thing it's only on my luggage....
Uh huh. It reckons my super easy password is 11 years, yet my mega bastard password (a serial number on the front of my television, including capital letters and symbols for good measure) is 200 days.
gg.
gg.
My state was founded by Batman. Your opinion is invalid.
Fuck Yea.
XD XD
everything i write is a ramble and should not be taken seriously.... seriously. ♥
From what I tried, it is based more on a brute force crack than guessing words...Cheez wrote:
Uh huh. It reckons my super easy password is 11 years, yet my mega bastard password (a serial number on the front of my television, including capital letters and symbols for good measure) is 200 days.
gg.
e.g. the number of letters affects it more than how complicated it is....
Your thoughts, insights, and musings on this matter intrigue me
I lol'd at the guys faq page.FloppY_ wrote:
From what I tried, it is based more on a brute force crack than guessing words...Cheez wrote:
Uh huh. It reckons my super easy password is 11 years, yet my mega bastard password (a serial number on the front of my television, including capital letters and symbols for good measure) is 200 days.
gg.
e.g. the number of letters affects it more than how complicated it is....
He's such a comedian. Read it.
everything i write is a ramble and should not be taken seriously.... seriously. ♥
about a billion years
Most basic password: 5 hours.
Next password: 242 days.
Mostly used password: 252 days.
Password used for important stuff: 237 years.
Next password: 242 days.
Mostly used password: 252 days.
Password used for important stuff: 237 years.
Ever wonder if this guy is just harvesting people's passwords?
“Everybody is a genius. But if you judge a fish by its ability to climb a tree, it will live its whole life believing that it is stupid.”
― Albert Einstein
Doing the popular thing is not always right. Doing the right thing is not always popular
― Albert Einstein
Doing the popular thing is not always right. Doing the right thing is not always popular
you've got me scared nowFEOS wrote:
Ever wonder if this guy is just harvesting people's passwords?
I'm just saying...it's a great way to do it.SEREVENT wrote:
you've got me scared nowFEOS wrote:
Ever wonder if this guy is just harvesting people's passwords?
“Everybody is a genius. But if you judge a fish by its ability to climb a tree, it will live its whole life believing that it is stupid.”
― Albert Einstein
Doing the popular thing is not always right. Doing the right thing is not always popular
― Albert Einstein
Doing the popular thing is not always right. Doing the right thing is not always popular
>Implying he doesn't need a username & location tooFEOS wrote:
I'm just saying...it's a great way to do it.SEREVENT wrote:
you've got me scared nowFEOS wrote:
Ever wonder if this guy is just harvesting people's passwords?
Last edited by FloppY_ (2010-10-16 07:14:15)
Your thoughts, insights, and musings on this matter intrigue me
Put the input gathered from this to brute force database and yeah you don't need to know exact place.
Everyone who puts their best passwords on webpage like that forgot the most basic rule of security: NEVER tell your password to ANYONE
Everyone who puts their best passwords on webpage like that forgot the most basic rule of security: NEVER tell your password to ANYONE
3930K | H100i | RIVF | 16GB DDR3 | GTX 480 | AX750 | 800D | 512GB SSD | 3TB HDD | Xonar DX | W8
Location is irrelevant.FloppY_ wrote:
>Implying he doesn't need a username & location tooFEOS wrote:
I'm just saying...it's a great way to do it.SEREVENT wrote:
you've got me scared now
True, username is helpful, but the password is the difficult part. If you harvest an assload of passwords--to include difficult ones--you've populated a database that reduces your brute-force requirements. You have KNOWN passwords. And since people often use the same password for multiple uses...
This is social engineering 101. They get usernames some other way and just start bashing the passwords against them.
You're acting as if this single website is the only method of collecting the data they would need.
“Everybody is a genius. But if you judge a fish by its ability to climb a tree, it will live its whole life believing that it is stupid.”
― Albert Einstein
Doing the popular thing is not always right. Doing the right thing is not always popular
― Albert Einstein
Doing the popular thing is not always right. Doing the right thing is not always popular
we report to the local authoritesFEOS wrote:
Location is irrelevant.FloppY_ wrote:
>Implying he doesn't need a username & location tooFEOS wrote:
I'm just saying...it's a great way to do it.
True, username is helpful, but the password is the difficult part. If you harvest an assload of passwords--to include difficult ones--you've populated a database that reduces your brute-force requirements. You have KNOWN passwords. And since people often use the same password for multiple uses...
This is social engineering 101. They get usernames some other way and just start bashing the passwords against them.
You're acting as if this single website is the only method of collecting the data they would need.
he's al qaeda
Lest secure: 8 years, two thousand with one modification
Most secure: 10 million years
Most secure: 10 million years
*******
Last edited by Obiwan (2010-10-16 16:55:44)
I seriously lol'dIS THIS SAFE?
It is actually. I'm not harvesting passwords into an EVIL database. Of course that's exactly the sort of thing I would say if I were harvesting them. And it wouldn't be hard to do it: a couple of lines of code and I'd have all your passwords. MWUHAHAHAHAHAA! But, to be honest, I don't know what I'd do with them. Make a cake perhaps.
The bit of code that does the calculations is done in JavaScript. And JavaScript is a "client-side" language. That means it runs on your computer – not on ours. No data ever travels from your computer back to the website. You can check this by loading up the webpage and then turning off your internet connection. You'll still be able to use the website to your heart's content.
However, for the SUPER-paranoid among you, you could just type in something a bit like your password rather than your actual password. In fact, that's probably a good idea anyway. Just in case I'm lying.
SC: http://howsecureismypassword.net/faq/#safe
everything i write is a ramble and should not be taken seriously.... seriously. ♥
tazz. wrote:
I seriously lol'dIS THIS SAFE?
It is actually. I'm not harvesting passwords into an EVIL database. Of course that's exactly the sort of thing I would say if I were harvesting them. And it wouldn't be hard to do it: a couple of lines of code and I'd have all your passwords. MWUHAHAHAHAHAA! But, to be honest, I don't know what I'd do with them. Make a cake perhaps.
The bit of code that does the calculations is done in JavaScript. And JavaScript is a "client-side" language. That means it runs on your computer – not on ours. No data ever travels from your computer back to the website. You can check this by loading up the webpage and then turning off your internet connection. You'll still be able to use the website to your heart's content.
However, for the SUPER-paranoid among you, you could just type in something a bit like your password rather than your actual password. In fact, that's probably a good idea anyway. Just in case I'm lying.
SC: http://howsecureismypassword.net/faq/#safe
Your thoughts, insights, and musings on this matter intrigue me
penis is one of the 500 most used passwords, it would be cracked almost instantly
Hah! my password isn't on the list of 500 worst passwords!
Nobody would guess "fluffysnugglebunny" , it's like the perfect password!
oh.. um.. right.
In other words, what kind of rocket surgeon puts a password they actually use into a potential farming website that asks "hey, gimmie your password, so I can.. um.. see how secure it is! yeah! Gimmie your IP and password. Just for fun!" ?
Nobody would guess "fluffysnugglebunny" , it's like the perfect password!
oh.. um.. right.
In other words, what kind of rocket surgeon puts a password they actually use into a potential farming website that asks "hey, gimmie your password, so I can.. um.. see how secure it is! yeah! Gimmie your IP and password. Just for fun!" ?
Last edited by rdx-fx (2010-10-17 10:49:09)
ITT: Everyonerdx-fx wrote:
Hah! my password isn't on the list of 500 worst passwords!
Nobody would guess "fluffysnugglebunny" , it's like the perfect password!
oh.. um.. right.
In other words, what kind of rocket surgeon puts a password they actually use into a potential farming website that asks "hey, gimmie your password, so I can.. um.. see how secure it is! yeah! Gimmie your IP and password. Just for fun!" ?
Your thoughts, insights, and musings on this matter intrigue me