Calgarypuck Forums - The Unofficial Calgary Flames Fan Community

Go Back   Calgarypuck Forums - The Unofficial Calgary Flames Fan Community > Main Forums > The Off Topic Forum
Register Forum Rules FAQ Community Calendar Today's Posts Search

Reply
 
Thread Tools Search this Thread
Old 09-19-2010, 03:20 PM   #1
Flames0910
First Line Centre
 
Join Date: Aug 2006
Location: Calgary
Exp:
Default So somebody from China logged into my gmail...

And spammed all my contacts.

I've changed my password...but it was already strong (alphanumeric, 8 characters) and there is no evidence of keyloggers or anything of the sort.

Some websites claim it's because of the Chinese/Google hacking incident months ago.


China (58.60.182.2) - 6:26 AM


And my gmail is set to alert on unusual activity, but DIDN'T. Apparently somebody accessing my account isn't unusual enough. I found out by receiving a tonne of email bouncebacks this morning.

I really wish there was an option to block out of country access.


aaand a funny comment on another board: "I eat chinese food all the time and this is how they repay me!?"
Flames0910 is offline   Reply With Quote
Old 09-19-2010, 03:26 PM   #2
sclitheroe
#1 Goaltender
 
Join Date: Sep 2005
Exp:
Default

This has gone on long before the Google hacking incident - there have been other posts about it on CP.

Hopefully you don’t use the same password everywhere..
__________________
-Scott
sclitheroe is offline   Reply With Quote
Old 09-19-2010, 04:25 PM   #3
Flames0910
First Line Centre
 
Join Date: Aug 2006
Location: Calgary
Exp:
Default

Quote:
Originally Posted by sclitheroe View Post
This has gone on long before the Google hacking incident - there have been other posts about it on CP.

Hopefully you don’t use the same password everywhere..
Yea I kinda thought that was weird.

What drives me crazy is I have no idea how they got in. Do you just guess a password and hope to get lucky?
Flames0910 is offline   Reply With Quote
Old 09-19-2010, 04:47 PM   #4
HotHotHeat
Franchise Player
 
HotHotHeat's Avatar
 
Join Date: Mar 2007
Location: Victoria, BC
Exp:
Default

It happened to me a few weeks ago. My password was changed and I had to go through the recovery exam. Hardest/most stressful test I've ever written in my life....Simply because I was guessing at all the answers. All my passwords are much more difficult now, although I'm not sure that matters to hackers.
HotHotHeat is offline   Reply With Quote
Old 09-19-2010, 09:41 PM   #5
DropIt
Franchise Player
 
DropIt's Avatar
 
Join Date: Sep 2009
Location: Red Deer, AB
Exp:
Default

Bwong
DropIt is offline   Reply With Quote
Old 09-19-2010, 10:05 PM   #6
cSpooge
Scoring Winger
 
cSpooge's Avatar
 
Join Date: Jan 2006
Exp:
Default

Quote:
Originally Posted by Flames0910 View Post
And spammed all my contacts.

I've changed my password...but it was already strong (alphanumeric, 8 characters) and there is no evidence of keyloggers or anything of the sort.

Some websites claim it's because of the Chinese/Google hacking incident months ago.


China (58.60.182.2) - 6:26 AM


And my gmail is set to alert on unusual activity, but DIDN'T. Apparently somebody accessing my account isn't unusual enough. I found out by receiving a tonne of email bouncebacks this morning.

I really wish there was an option to block out of country access.


aaand a funny comment on another board: "I eat chinese food all the time and this is how they repay me!?"

by no standards is an 8 character password strong.
cSpooge is offline   Reply With Quote
Old 09-19-2010, 10:15 PM   #7
Flames0910
First Line Centre
 
Join Date: Aug 2006
Location: Calgary
Exp:
Default

Quote:
Originally Posted by cSpooge View Post
by no standards is an 8 character password strong.
seriously?

z7tE2.ka

If we did a CP poll I would think that's better than average.
Flames0910 is offline   Reply With Quote
Old 09-19-2010, 10:21 PM   #8
Rathji
Franchise Player
 
Rathji's Avatar
 
Join Date: Nov 2006
Location: Supporting Urban Sprawl
Exp:
Default

Quote:
Originally Posted by cSpooge View Post
by no standards is an 8 character password strong.
I disagree. No one is breaking a 8 character alphanumeric password through brute force, as long as your password looks more like this &bS8a1>9Z, and less like bobby123. Especially if you have any sort of lockout in place for failed attempts.

In reality, what does adding the 9th, 10, or 15th character add? Nothing except an increased chance the user will re-use, write down, or otherwise compromise the security of the password, like making easier to socially reverse engineer it by using a common name, phrase etc.
__________________
"Wake up, Luigi! The only time plumbers sleep on the job is when we're working by the hour."
Rathji is offline   Reply With Quote
Old 09-19-2010, 10:22 PM   #9
cSpooge
Scoring Winger
 
cSpooge's Avatar
 
Join Date: Jan 2006
Exp:
Default

Quote:
Originally Posted by Flames0910 View Post
seriously?

z7tE2.ka

If we did a CP poll I would think that's better than average.
It is better than average that still doesn't make it any stronger than it actually is. 8 characters isn't long enough to be considered strong.
cSpooge is offline   Reply With Quote
Old 09-19-2010, 10:48 PM   #10
photon
The new goggles also do nothing.
 
photon's Avatar
 
Join Date: Oct 2001
Location: Calgary
Exp:
Default

http://www.passwordmeter.com/

http://howsecureismypassword.net/

Length is important, not in a dictionary attack but in a brute force attack every new letter would increase the attack time significantly.

Lol, the second site says it would take 71 sextillion years to crack my password storage file password (or one almost the same to it).

One thing you can do to increase the length of your passwords is know a number of shorter passwords and them combine them in different ways.

So while &bS8a1>9Z is quite secure it's impossible to remember, &b3sTp4sS!? (and this is the best password?! to remember) is much easier to remember and very secure.
__________________
Uncertainty is an uncomfortable position.
But certainty is an absurd one.
photon is offline   Reply With Quote
Old 09-19-2010, 10:52 PM   #11
Flames0910
First Line Centre
 
Join Date: Aug 2006
Location: Calgary
Exp:
Default

Apparently it would take around 252 days to crack the password I had.
Flames0910 is offline   Reply With Quote
Old 09-19-2010, 11:17 PM   #12
Ramsayfarian
Scoring Winger
 
Join Date: Jun 2010
Exp:
Default

Quote:
Originally Posted by Flames0910 View Post
Apparently it would take around 252 days to crack the password I had.
I hope you didn't use your real password.
Ramsayfarian is offline   Reply With Quote
Old 09-19-2010, 11:26 PM   #13
photon
The new goggles also do nothing.
 
photon's Avatar
 
Join Date: Oct 2001
Location: Calgary
Exp:
Default

If you use multiple computers would cut that down.. You would think that Google would have some kind of system to detect multiple login attempts and make it very difficult to brute force, but I can't find any info on any measures they take.

There are password dictionaries out there as well so if your password is still a common variation of common passwords (password1).

But all those accesses would show up in the access list, and if it'd only been accessed once, I'd be much more suspicious of a keylogger.
__________________
Uncertainty is an uncomfortable position.
But certainty is an absurd one.
photon is offline   Reply With Quote
Old 09-19-2010, 11:35 PM   #14
sclitheroe
#1 Goaltender
 
Join Date: Sep 2005
Exp:
Default

Quote:
Originally Posted by photon View Post
http://www.passwordmeter.com/

http://howsecureismypassword.net/

Length is important, not in a dictionary attack but in a brute force attack every new letter would increase the attack time significantly.

Lol, the second site says it would take 71 sextillion years to crack my password storage file password (or one almost the same to it).

One thing you can do to increase the length of your passwords is know a number of shorter passwords and them combine them in different ways.

So while &bS8a1>9Z is quite secure it's impossible to remember, &b3sTp4sS!? (and this is the best password?! to remember) is much easier to remember and very secure.
You guys are hilarious, if you are seriously testing the strength of your password at one of the above sites, from one of your own computers, from your place of work or residence.
__________________
-Scott
sclitheroe is offline   Reply With Quote
Old 09-19-2010, 11:40 PM   #15
sclitheroe
#1 Goaltender
 
Join Date: Sep 2005
Exp:
Default

Quote:
Originally Posted by photon View Post
But all those accesses would show up in the access list, and if it'd only been accessed once, I'd be much more suspicious of a keylogger.
More likely the person affected has used the same password on a website that doesn’t securely store passwords to user accounts/profiles, and they obtained the password from there.

Regardless....

Password length and strength is a bogus and completely misguided approach to security. You either know someone’s password, or you don’t. Any more than 3-5 attempts to log in in a 5 minute time span should result in immediate suspension of the account for a minimum of 1 hour, along with email notification to the account holder. In this way, no more than say 5 attempts can be made to brute force a password per hour.

The onus should be entirely on service providers to deliver this level of account protection, and anything less is irresponsible. It’s trivially easy to implement this level of protection on a web site or online service.
__________________
-Scott
sclitheroe is offline   Reply With Quote
Old 09-19-2010, 11:48 PM   #16
Flames0910
First Line Centre
 
Join Date: Aug 2006
Location: Calgary
Exp:
Default

Quote:
Originally Posted by Ramsayfarian View Post
I hope you didn't use your real password.
Why? It's already been compromised. I changed the password on the account
Flames0910 is offline   Reply With Quote
Old 09-19-2010, 11:52 PM   #17
photon
The new goggles also do nothing.
 
photon's Avatar
 
Join Date: Oct 2001
Location: Calgary
Exp:
Default

Quote:
Originally Posted by sclitheroe View Post
You guys are hilarious, if you are seriously testing the strength of your password at one of the above sites, from one of your own computers, from your place of work or residence.
Not my exact password no, but the javascript is easily viewable and a quick scan didn't show anything communicating back.


Quote:
Originally Posted by sclitheroe View Post
More likely the person affected has used the same password on a website that doesn’t securely store passwords to user accounts/profiles, and they obtained the password from there.
That's true, or keyloggers.. almost everyone I know that's had something compromised has been by keyloggers, and almost all of those have been WoW players

Quote:
Originally Posted by sclitheroe View Post
Regardless....

Password length and strength is a bogus and completely misguided approach to security. You either know someone’s password, or you don’t. Any more than 3-5 attempts to log in in a 5 minute time span should result in immediate suspension of the account for a minimum of 1 hour, along with email notification to the account holder. In this way, no more than say 5 attempts can be made to brute force a password per hour.

The onus should be entirely on service providers to deliver this level of account protection, and anything less is irresponsible. It’s trivially easy to implement this level of protection on a web site or online service.
I wouldn't go so far to say that password strength is totally bogus, I've guessed a number of passwords in the past.

But I totally agree from a service perspective a site should do exactly what you say, throttle the ability to do attacks to the point where it's useless. That's why I'm surprised I can't find any information on it. And I'm too scared to try on my own account lol.
__________________
Uncertainty is an uncomfortable position.
But certainty is an absurd one.
photon is offline   Reply With Quote
Old 09-19-2010, 11:57 PM   #18
Shazam
Franchise Player
 
Shazam's Avatar
 
Join Date: Aug 2005
Location: Memento Mori
Exp:
Default

Darn, 12345 isn't a good code for my luggage.
__________________
If you don't pass this sig to ten of your friends, you will become an Oilers fan.
Shazam is offline   Reply With Quote
The Following 2 Users Say Thank You to Shazam For This Useful Post:
Old 09-19-2010, 11:58 PM   #19
photon
The new goggles also do nothing.
 
photon's Avatar
 
Join Date: Oct 2001
Location: Calgary
Exp:
Default

I always pick 99999 because that's the last one they'll try.
__________________
Uncertainty is an uncomfortable position.
But certainty is an absurd one.
photon is offline   Reply With Quote
Old 09-20-2010, 12:06 AM   #20
sclitheroe
#1 Goaltender
 
Join Date: Sep 2005
Exp:
Default

Quote:
Originally Posted by photon View Post
Not my exact password no, but the javascript is easily viewable and a quick scan didn't show anything communicating back.
Heh, good for you! Unfortunately, most people wouldn’t be able to tell if the calculation on password strength was being performed client or server side.
__________________
-Scott
sclitheroe is offline   Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -6. The time now is 04:58 PM.

Calgary Flames
2024-25




Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright Calgarypuck 2021 | See Our Privacy Policy