IWETHEY v. 0.3.0 | TODO
1,095 registered users | 1 active user | 2 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

Now viewing page 5 of 54
[Prev] 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 54 [Next]
     so I was careless... - (rcareaga) - (29)
         does the mail app know about the new password? dumb question I know -NT - (boxley)
         Maybe had nothing to do with you - (drook)
         this is starting to look nasty - (rcareaga) - (3)
             resolved? - (rcareaga) - (2)
                 Glad you got it worked out. Two factor? - (Another Scott)
                 Do you know for sure that you were actually compromised? - (drook)
         a day later... - (rcareaga)
         sheesh! - (rcareaga) - (21)
             Likely scenario - (scoenye) - (10)
                 concur - (rcareaga) - (9)
                     Password storage. - (static)
                     Here's where I got my rule - (drook) - (4)
                         XKCD to the rescue - (static) - (3)
                             :-) -NT - (Another Scott)
                             That, too - (drook) - (1)
                                 Ford Credit will only take 8 -NT - (malraux)
                     Re: concur - (mvitale) - (2)
                         Entertaining story. - (Another Scott)
                         I get annoyed at password restrictions. - (static)
             password management - (boxley) - (9)
                 Chase doesn't allow special characters. - (mmoffitt) - (1)
                     Too many sites do passwords wrong. - (static)
                 Number substitution isn't recommended any more. - (Another Scott) - (6)
                     I like writing down - (drook) - (3)
                         so you go in person to pay all your bills? Nice to have that much free time -NT - (boxley) - (2)
                             Not the point - (drook) - (1)
                                 Having my wallet messed with in middle school taught me that it's not good to depend on it... - (Another Scott)
                     not necessarily - (rcareaga) - (1)
                         Re your last line: yes, that -NT - (drook)
     This Ars Technica note seems relevant.. - (Ashton) - (1)
         And unfortunately, they're not the only sellouts - (scoenye)
     Krebs on the Sony hack and others. - (Another Scott) - (5)
         Shades of spy thrillers - (drook)
         From the "other" category - (scoenye) - (2)
             Do I not see a n-MTon nuke with 8 of its 9 Safeties hors de combat? - (Ashton) - (1)
                 For this particular incident - (scoenye)
         NY Times: NSA had cracked NK networks years ago. - (Another Scott)
     Apple pushes first ever automated security update - (lincoln) - (1)
         Got mine yesterday. - (a6l6e6x)
     US-CERT on the Sony Pictures hack. - (Another Scott) - (2)
         Lots of Microsoft innovation there! -NT - (a6l6e6x) - (1)
             In all fairness to MS - (scoenye)
     phone calls and text messages still are protected - (lincoln) - (7)
         not an new issue the whole point of ss7 is interconnectability - (boxley)
         I'm sure the NSA has known this for a while - (drook) - (4)
             Re: NSA has known? - (a6l6e6x) - (3)
                 Re: NSA has known? - (dmcarls) - (2)
                     Kinda related - there are still laws about exporting encryption - (Another Scott)
                     All your base are belong to us! -NT - (a6l6e6x)
         stuff ss7 does for you - (boxley)
     Know where your two-factor keys are... - (Another Scott) - (3)
         Apple is pretty explicit about not losing that key - (malraux)
         no tickee no laundry, not surprised -NT - (boxley)
         Where convenience meets security. - (static)
     Live map of DDOS attacks. - (Another Scott) - (2)
         budweiser is under seige? -NT - (boxley) - (1)
             Apparently the company has a lot of honey-pots there. Or Ferguson, maybe... -NT - (Another Scott)
     geriactic brain needs some input regards encryption - (boxley) - (20)
         First step in writing your own encryption algorithm ... - (drook) - (2)
             And this... :-) -NT - (scoenye)
             In other words: - (static)
         It is different - (scoenye) - (9)
             Ah, a usefull reply - (boxley) - (8)
                 Hey, mine was useful! - (drook) - (1)
                     Me too. :-) -NT - (Another Scott)
                 Something like this? - (scoenye) - (2)
                     Love. It. Best hopeful-Aha! in a long time :-) - (Ashton)
                     enough like it to require a licence :-( -NT - (boxley)
                 What's wrong with cipher block chaining? -NT - (static) - (2)
                     As used in SSLv3/TLS1.0 - (scoenye) - (1)
                         Ah. Understood. -NT - (static)
         A more generic tool... - (Another Scott) - (6)
             good link, thanks - (boxley) - (5)
                 There is only one unbreakable cypher - (pwhysall) - (4)
                     my idea is to create an EOTP -NT - (boxley) - (3)
                         Two things. - (a6l6e6x) - (2)
                             Or in related puzzlements, - (Ashton)
                             It is mainly a key transport problem - (scoenye)
     Seeing lots of new phishing stuff today... - (Another Scott)
Now viewing page 5 of 54
[Prev] 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 54 [Next]

Your LRPD God[tm] is HERE!
193 ms