Hamster
Resident Rodent
- Joined
- Aug 22, 2006
- Messages
- 41,244
GeorgeHouseHorseTavernPenis
IdRatherNotTakeSecurityAdviceFromMyBBStaffWriter1
Trouble with that is it's not based on dictionary attacks - it's brute force only if I'm not mistaken.
e.g. it says this for the password 'Mailcreated5240'
![]()
...yet it's in one of the common password lists available in the wild... so realistically, using a wordlist, it will take a few minutes to crack in the case of an encrypted file. For web services, there are far easier tools to use like phishing and keyloggers - brute forcing any reputable web page should just plain not work.
That's why you misspell one of the words
28 days
Seems nobody can even agree on simple things like what to use for an un-guessable bloody password.
We can. Even the people saying length>complexity end up adding complexity to make it secure, so that is your answer.Seems nobody can even agree on simple things like what to use for an un-guessable bloody password.
Seems nobody can even agree on simple things like what to use for an un-guessable bloody password.
Mine is in Cantonese. Good luck hackers.
OK, thanks. 3 Million years for my default password.