G
GuestUser450
Guest
I was joking but that's awesome to hear. I was going for an old reference and that's what popped out.Nice.
Runescape taught me how to buy and sell for profit at a young age.
SPONSORED: GiganticWebsites.com: We Build Sites with THOUSANDS of Unique and Genuinely Useful Articles
30% to 50% Fastlane-exclusive discounts on WordPress-powered websites with everything included: WordPress setup, design, keyword research, article creation and article publishing. Click HERE to claim.Join over 90,000 entrepreneurs who have rejected the paradigm of mediocrity and said "NO!" to underpaid jobs, ascetic frugality, and suffocating savings rituals— learn how to build a Fastlane business that pays both freedom and lifestyle affluence.
Free registration at the forum removes this block.I was joking but that's awesome to hear. I was going for an old reference and that's what popped out.Nice.
Runescape taught me how to buy and sell for profit at a young age.
You on a MAC or PC?
Get yourself a brand new phone and brand new laptop exclusively for all activities where money is involved.
Trust me, it's worth it.
* Use your phone's internet connection instead
of a public wifi whenever you can.
As far was I know, this is safer than using a
VPN + public wifi combination.
kill -9 PROCESS_ID
Did Paypal get 2 step authentication? Because when I tried a few months ago they didn't have it. Which is one of the dumbest, most ignorant, stupid idiotic things NOT to have for an account that literally has full control of my bank account.
Great topic. By the way, can you recommend a reliable antivirus for windows that is not as incredibly annoying as most of them? Is there such a thing as an effective antivirus that won't make your life miserable?
It's probably not too hard to be self-employed, but it doesn't seem scaleable without having employees.
Any suggestions?
This news is a little late.
EQUIFAX, one of the Big 3 credit bureaus, just got hit with a data breach.
If you have ever checked your credit score with Equifax, your data may be compromised. IF you have used Equifax's online systems, your data may be compromised.
Massive Equifax data breach hits 143 million - BBC News
WHAT GOT STOLEN?
It's unclear at the moment, but it includes credit card numbers and personally identifying information. There isn't any evidence that commercial credit reporting has been compromised, but if it has: your business might be at risk.
WHAT DO YOU DO?
If you think your data has been compromised, you may benefit from putting a credit freeze on your account. Call up one of the credit bureaus and request a credit freeze. What this will do is prevent anyone (including yourself) from taking out additional debt in your name.
You may remove this freeze at any time.
https://www.equifaxsecurity2017.com/
Use this site (which is run by Equifax themselves) to check whether or not you have been affected. If you have, you will be provided free credit monitoring by Equifax, with the ability to request a credit freeze.
If your credit card info has been compromised, don't fear. Figure out which credit card you used by giving them a call (just ask for the last 4 digits) and report the card as lost or stolen. You'll get a new one in the mail in about a week or so. If you think you might be in trouble, don't F*cking wait!
If you try to call Equifax today, I guarantee you'll be put on hold and left there for several hours. You're not going to get a hold of a real person very easily just because of the size of this hit. Do it anyway.
NOTE: There is a chance that this hack is bigger than Equifax is willing to say. If that's the case, then we could be talking about an incident of cataclysmic proportions. We could be talking about a hit to the credit reporting system as a whole.
---
I guess I'll use this opportunity to talk about identity theft and how F*cking damaging it could be.
Identity theft is simply the use of someone else's identity in order to get something. Credit, loans, or even using one's name to commit a crime. Typically, identity theft is committed by the friends and family of the victim. However, data breaches are different.
Data breaches are like gold mines for identity fraudsters. Often times, the people who get hit are caught unaware because they don't know that their info has been caught in the breach!
Equifax announces that 209,000 customers were affected, however BBC estimated it could be up to 143 million people. That's more than a third of the population of the US. Is a 1 in 3 coinflip a chance you're willing to take?
If someone knows your legal name, DOB, and your social, they could take out loans in your name ranging from credit cards to mortgages. If they go delinquent, this affects your credit score and it could take years for it to recover (even after you get it all sorted out).
Identity theft insurance might help you, and Equifax is offering this to people affected. However it's not a foolproof solution.
---
Please don't WORRY. ACT. If you think you might be in trouble, go to https://www.equifaxsecurity2017.com/ and check to see if your information has been breached.
Other data breaches have happened recently. Check out Have I been pwned? Check if your email has been compromised in a data breach to see if your email has been compromised.
Great idea but why have you never considered tools like VeraCrypt? It's the successor to TrueCrypt which for a long time was probably the most used encryption program to date.
It offers a bunch of different encryption algorithms, as well as tons of other features. It's also free and open-source.
Is this still true/valid? xkcd: Password Strength
Is this still true/valid? xkcd: Password Strength
The level of unpredictability of a Diceware passphrase can be easily calculated: each word adds 12.9 bits of entropy to the passphrase (that is, log (base 2) (6^5) bits). Originally, in 1995, Diceware creator Arnold Reinhold considered five words (64 bits) the minimal length needed by average users. However, starting in 2014, Reinhold recommends that at least six words (77 bits) should be used.
This level of unpredictability assumes that a potential attacker knows that Diceware has been used to generate the passphrase, knows the particular word list used, and knows exactly how many words make up the passphrase. If the attacker has less information, the entropy can be greater than 12.9 bits per word.
Thanks for the wake up call, and I hope your situation gets cleared up quickly.
I have a previous history of losing quite significant amounts of money (much more than J) due to not complying with more advanced security measures.
I didn't think it would happen to me.
...
3) Different, and strong, passwords for every single site you use. 16 characters minimum. Seriously. Brute forcing is no joke, especially on sites where they allow unlimited login tries. Not only that, they must be different so you're not caught with your pants down if a website's database gets leaked.
4) A way so you don't have to TYPE those passwords. Keyloggers are a bitch, and will steal your passwords, your credit card info, and more, right as your typing them. You can use an encrypted Notepad file stored on the cloud (not the safest thing in the world, because your clipboard could be at risk too), or you can use a password manager like Lastpass or KeePass. Password managers are excellent, because (1) you don't have to type passwords for every site you use, and (2) they're encrypted with a master password as your key. There's also programs like KeyScrambler which are reported to be pretty good.
...
After reading about it here, I looked for it and couldn't find it either.
Similar to Qubes, you can use Virtual Machine's to containerize your activities. If you are a gamer who downloads a lot of risky "mods", you could do your banking/shopping inside a VM. Your games would still run fast, but your private data would be somewhat safe. If you just browse high-risk sites (*cough* pornhub *cough*), you could do that inside a VM. Qubes uses Linux Containers for everything.
Yup, and a huge market with tons of opportunity.
Also have Malwarebytes as a backup or hitmanPro. If you can't login normally go through safe mode with networking so you can update the software then run a scan.Great topic. By the way, can you recommend a reliable antivirus for windows that is not as incredibly annoying as most of them? Is there such a thing as an effective antivirus that won't make your life miserable?
I need to point out you might need to edit the .bat file a bit more. I left the path to my install hard coded in there in more than 1 spot. But then again, this is just a concept right now.
So for the 3 passwords, there are multiple reasons:
- A lot of people want to say only 1 password is needed if it's strong and secure. You know, those 84+ char. type passwords. If I zipped up a file and it had a 84+ char password and then I sent that file to my mom/client/journalist/lay tech person in TXT on cell phone or on a sheet of paper, you know how hard that is going to be to type manually on their desktop to unlock the file? It's gonna be a pain. My eyes cross at like the 10th char and I second guess myself what the last char was. I couldn't imagine doing that with 84+
So I decided instead of 1 strong password of long length, 3 shorter passwords would do. Even at 16 char, you're talking a lot of computer power taking many years to crack. 3 shorter passwords would help with ease and simplicity.. a goal of this project.
- When other people encrypt the files to send off, it may be a lay tech person who creates them. They put in a 8-16 char password and it's "abcdef123456789". That's not gonna fly well for security, right? Easily cracked. However, now there are 2 more the hacker has to deal with that could be slightly better or stronger that could take a lot of computing power to crack and years. They might crack one, but possibly not the other 2. This is why I put in 3.. a bit better security in case the lay tech user has 1 or 2 weak passwords.. there will still be some security hopefully left.
Think about it, if your customers use the same password for everything, the hacker might already know that password and that could be the first password the customers used for one of the archives. Now the hacker would need to figure out the other 2 still. Unless your customer just uses the same password 3 times, well there is not much that can be done other than for one of the archives to have an automatic password generated which I might add in to a later version.
- I thought about just 2 passwords. Since I couldn't do a 2FA after the 1st password ( like websites ), I thought I'd do 2 passwords back to back. When I accepted that would be good, I thought 3 would be even better for no real specific reason other than it might piss off a hacker if they actually did crack the first 2. Past 3 ( going into 4+ ), I thought it would just be a damn pain for the end user. 3 was just a good number it seemed to stay simple, but also secure.
The best way I use it, is to store files on Dropbox or S3. I deal with a lot of my customers data and I don't want it exposed when transferring or having it available.
Sometimes I also need to keep my very personal data on Dropbox ( like my bank info, credit cards, or drivers lic when I am traveling ) and I like knowing I can access it easily on Dropbox while it is still secure if needed in an emergency.
Join Fastlane Insiders.