Reading your posts, I thought I was on the “you know you’re old “ thread, till I scrolled up my iPhone and saw it wasn’tA computer keyboard is a LOT easier to type on than a touchscreen. The only cellphone I have is also a flip phone, it's enough of a PITA to enter phone #s in the contact list, let alone try to type a meaningful message. I don't know how anyone who has fingers larger than those of a teenage girl can type on a smartphone screen.
Not sure if Runner will let this one go, or not. In your defense, you did interject "Um" before "so".. Um, so... Passwords
I see the "remember username" a lot, haven't seen "remember password" yet, but I suppose I will at some point. It's probably tracking you by at least two or three other identifiers, at least two of three which must agree upon your return:A new trend seems to be "do you want this site to remember your password?" Doesn't that defeat the purpose?
Every time you get a notification about a data breach, whether it be Ticketmaster or Target, that data can be aggregated and parsed for patterns. A sophisticated password cracker will have access to this data, and start with combinations of birthdays, anniversaries, addresses, phone numbers, of you and everyone in your social network. For this reason, truly random character combinations are almost always more secure, than almost anything one can think up on their own.Without going into detail, I doubt that a random generator could be more vague than those which I make up.
How do the crackers get past the three attempt or similar safeguard before a site locks them out?Not sure if Runner will let this one go, or not. In your defense, you did interject "Um" before "so".
I see the "remember username" a lot, haven't seen "remember password" yet, but I suppose I will at some point. It's probably tracking you by at least two or three other identifiers, at least two of three which must agree upon your return:
1. IP address
2. MAC address
3. Cookie
I assume this is being used on low-impact sites, i.e. some forum about tractors, and not your online banking.
Every time you get a notification about a data breach, whether it be Ticketmaster or Target, that data can be aggregated and parsed for patterns. A sophisticated password cracker will have access to this data, and start with combinations of birthdays, anniversaries, addresses, phone numbers, of you and everyone in your social network. For this reason, truly random character combinations are almost always more secure, than almost anything one can think up on their own.
First, not all sites have a three failed attempt lock out. But even those that do typically auto-reset after several minutes. Since it's often weeks or even months before a breech is discovered and reported, and because a sophisticated hacker will not the fail-out and auto-reset parameters for most popular financial institutions, there's time (often months) for many attempts.How do the crackers get past the three attempt or similar safeguard before a site locks them out?