![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#51 | |
Confirmed User
Industry Role:
Join Date: Nov 2004
Posts: 2,779
|
Quote:
but the issue is you (the webmaster) can't manually over-ride the strongbox block, and its very frustrating (and costly) when paying members can't get into the site because they've logged in/out too many times in a day |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#52 | |
Confirmed User
Industry Role:
Join Date: Nov 2004
Posts: 2,779
|
Quote:
maybe not a large program, but a VERY popular site with many thousands of members - i think i'm well qualified to speak on this ![]() putting a b/w limit on your users HELPS stop ripping, but if you have a pass being shared it also helps stop it if you have a password being used during the same time frame, from different locations, its OBVIOUS its being shared. a b/w limit isnt needed in that case - a password re-issue & even a temporary "block" is necessary at that time anyway, we're both agreeing to the same thing, that re-issuing passwords is good ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#53 | |
Confirmed User
Industry Role:
Join Date: Jul 2004
Location: Alberta
Posts: 1,864
|
Quote:
Maybe its just me, but RANDOM alphanumeric with special charactors is about as secure a password as you can create. Or are you just talking about that picture that members have to enter, the one that every member hates have to fill in to get into the site? Seems to me most of the big password sharing sites are forums, I dont know of many forums that alow php tags in posts. And even then I would be surprised if you got one user a week that would do this and require you to manually dissable his account. That seems a whole lot less work then having to deal with users every single day all the time. I have only heard of one person using strongbox with zips, and how they got it working is well interesting I guess you would call it. Everyone else says not to even try using strongbox for zips.
__________________
Coming Soon! |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#54 |
Confirmed User
Industry Role:
Join Date: Jul 2004
Location: Alberta
Posts: 1,864
|
"Avoid strongbox like the plague. If you get a big brute force attempt it will crash your server."
From a Server admin... "All I can say if is that if you use CCBILL and want to sell zip sets you cannot use Strongbox...... Thats why i switched." From serveral people. If this stuff isnt true you should make sure people know about it, because it seems people dont.
__________________
Coming Soon! |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#55 |
Confirmed User
Industry Role:
Join Date: Aug 2006
Posts: 1,199
|
Clarification about AMS
Just to add a little more clarification regarding the
sequence of events and operation of Frog's AMS for replacing blocked passes automatically and directly to valid members. When Frog detects password abuse the password is changed but NOT emailed. Only when the valid member returns (could be days or weeks) is the password emailed --- after the member validates himself. Both events trigger a notification to webmaster. If a webmaster sees to much activity, he can take the appropriate action. Usually a simple, polite email to the member--along with Frog's proof of abuse copy/pasted into the email--is sufficient to stop the behavior. The webmaster almost never has to take further action. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#56 | |
Confirmed User
Join Date: Oct 2002
Posts: 3,745
|
Quote:
of keeping them secure. Randomly generated passwords are worthless if they are posted everywhere. There are other important considerations to making sure that the bad guys don't get the passwords in the first place. To my knowledge, none of the other "password trading protection" like systems addresses that at all, except of course for brute force attacks. They just try to detect compromised passwords after the fact. If you've ever had your entire password list posted you know that while detecting it is good, preventing it in the first place would have been a whole lot better. jeffrey, you sure do spend a lot of time attacking Strongbox, mostly posting total BS that's not anything like the truth, which I guess means you've probably never even seen Strongbox. Do you work for proxypass or did one of us piss you off in a previous life?
__________________
For historical display only. This information is not current: support@bettercgi.com ICQ 7208627 Strongbox - The next generation in site security Throttlebox - The next generation in bandwidth control Clonebox - Backup and disaster recovery on steroids |
|
![]() |
![]() ![]() ![]() ![]() ![]() |