Given the seriousness of recent events, most of you may find this useful:
https://www.grc.com/passwords.htmIt even has a tip for safer passwords:
QUOTE
You may safely take these strings as they are, or use chunks from several to build your own if you prefer, or do whatever you want with them. Each set displayed are totally, uniquely yours.
Just kidding. Don't change your password to anything over 32 characters because you won't be able to login again otherwise. Changing your password to anything over 32 characters makes your account unusable. So, um, any administrator willing to help me out...that'd be great.
I think Moose did that to the Admin CP password.
How are you suppose to remember that? it would take atleast a min to type in your pass. :\
Copy and paste from a hidden notepad document.
I find that the best passwords are stupidly obvious things, like "bathtub" or "hamburgerbun". No one would even think of either of those being passwords. Oops, just gave away my secret...
Bruteforcers generally have a list of common dictionary words.
Thats why you put words together, or mispell them
QUOTE(Killer_Kow(MM) @ Aug 5 2006, 05:41 PM)
Thats why you put words together, or mispell them
[right][snapback]540464[/snapback][/right]
and add numbers and caps like..
oMg22pass34WORD76
Or you could just use the link I gave you.
ADDITION:
QUOTE
The use of these maximum-entropy passwords minimizes (essentially zeroes) the likelihood of successful "dictionary attacks" since these passwords won't appear in any dictionary. So you should always try to use passwords like these.
ROFL ur smrt
It's not really a good idea security wise, but I just chose a SENer's name and made it my password. I like to live dangerously.
or you can go h4mU[G3r](bunZZ**)
ADDITION:
QUOTE(SexyPinkPrincess @ Aug 5 2006, 07:40 PM)
ROFL ur smrt
It's not really a good idea security wise, but I just chose a SENer's name and made it my password. I like to live dangerously.
[right][snapback]540487[/snapback][/right]
now everyone is going to try their name. lol and if you picked people who dont come here for any reason then i will try theirs
First one to guess my password wins my debt and my non-existent reputation. Not to mention suspicions of a owning a double account.
I don't value my account a terribly large amount, so go ahead and try.
Putting words in general, misspelled or not is not a good idea. And simply adding caps and numbers does not greatly improve your password. Your best bet would be to put Alt Codes into your pass along with spaces.
Of course, if you get trojaned, your screwed either way.
so does that guy know all of our pass? he doesnt right? he just knew the admins, or something of that sort and could mess around with our account but dont know our pass though right?
I used a combination of letters, numbers, other characters, and various symbols that are not on any keyboard.
or you can make it so your password can't be typed in unless you modify the HTML for the password box.
Depends. It would be safe (and highly recomended) to change your password to something brand new.
If the passwords are actually stored anywhere on the server in plaintext form, we might as well paint ourselves with blood and go diving with some sharks.
We should just implement a limit to the number of trials per period of time so that regular brute forcing even a single digit could take, say, 2 days (5 tries / 24 hrs).
Yeah, there's definitely going to be a time delay on failures in v5. The problem is, this was probably just a security hole in the *cough*wonderful*cough* v4 Invision Board. My old password was just definitely not bruteforcable on any timeframe short of a week.
Are you certain he bruteforced it? I mean, if you are using the trial invision v2.0 like is listed at that bottom; there are quite a few possible exploits if I remember correctly (not pretending to be an expert, but I have dabbled in various cracking/hacking methods).
My pass has a company name and numbers, its pretty random so if you try to guess my pass, its a shot in the dark. Quite useful. I added a piece of that code to my existing password.
Doesn't look like password change helped Moose, he was hacked again.