editor
hiraethified
No user names to be found there squire. And many will share the same IP addresses anyway.password + IP, anyone?
No user names to be found there squire. And many will share the same IP addresses anyway.password + IP, anyone?

Fersackaly. If it aint in a dictionary, you're ahead of 95% of the general population.Eh. Mine rates "medium", but, well... when I was a student in the AI department, they used to run the latest password crackers on everyone and send out humiliating emails saying "we cracked your password, change it n00b" to anyone falling foul. I never got one, and I take the same attitude to creating passwords now. I'm not going to randomly generate a 32-byte string or anything.
Hmm. A checker that rates b1x7b5c9m1z8n5c6n3d8y3w7t2a0k6v6m3d7h3r7h4s4h2x6l1 as "Medium".




it's ok, i've already changed mine to firkyThat's got to be the best phishing scam ever, imagine getting hold of all the passwords people type in.![]()

No user names to be found there squire. And many will share the same IP addresses anyway.


Apart from the sheer improbability of them actually following the link back to these boards, and then on to this specific thread (afaik the tracking link wouldn't take them that deep anyway), there's no way of them knowing the user names of all those who tried the test, only those who posted here.
So they'd have quite a task going through 40,000 user names to, err, be able to post up under someone else's name on a bulletin board. What a prize!
Way To Go HacKrZ!
70.55.52.5 - - [10/Nov/2007:02:52:53 +0000] "GET /gallery2/d/68220-4/200711_0871.jpg HTTP/1.1" 200 105369 "http://www.urban75.net/vbulletin/showthread.php?p=6708631" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.9) Gecko/20071025 Firefox/2.0.0.9"
But that only applies to those people who have inputted their passwords and posted on the thread to say so. And assuming they actually posted in their real password.Like I said, assuming someone comes back to report within a couple of minutes of trying the test, then it narrows the field down to just a very few users if you've captured their password during the check.

The page uses javascript to assess the password, so it runs entirely on your own computer (if what they say on the page is true anyway), no information is passed to them.
I'm pretty sure if you "sniff" the traffic, you'll find that it's not sending any of your passwords.
I took a look at the source code and there didn't seem to be anything iffy going on.The page uses javascript to assess the password, so it runs entirely on your own computer (if what they say on the page is true anyway), no information is passed to them.
Sure. But of the password testing app was on something like ur-security-appz.info or bank-in-nigeria.com I wouldn't have posted it up here.YOne needs to assess each case on its merits and be aware that it could be used maliciously if things were different.
Test it here:
http://www.microsoft.com/protect/yourself/password/checker.mspx
Mine is "strong" although I might now lob in the extra digit to make it "best."


Test it here:
http://www.microsoft.com/protect/yourself/password/checker.mspx
Mine is "strong" although I might now lob in the extra digit to make it "best."



hey editor maybe you can require the password to be at least 10 alpha-numeric characters with a forced change every 30 days?![]()
![]()
![]()
Never, ever use words in the dictionary. Can be found very quickly...