![]() |
What you see there is typical of any password dump/ forum
No point wasting your time trying to close it down they will have several mirrors and will be back up in no time. You will notice 99 percent of those logins are user defined ?simple to brute-force? And ?simple to decrypt? Crackers know that people in general are lazy and use the same passwords for every site they join. You cannot run a pay site that allows your customers to choose their own logins and not expect to have major password issues. If your billing company allows random passwords to be assigned to your customers, do it! And use a good length, I recommend 15 char. That will stop passwords from being brute-forced. Also by having a good length ?say 15 char? even if they exploit your server or a script to locate your password file they will be flat out trying to decrypt it. All that needs doing then is to install a script like password sentry and that will alert you to any password trading. |
Quote:
http://www.polishmyhelmet.com/members/ |
Those forms can be brute-forced as well.
There are some very skilled coders on the dark side Mr. Gator |
Quote:
|
None of ours there...
|
Quote:
|
Yes agreed it is a more secure option, however you?re still inconveniencing your customers by typing in the image content.
We use 15 char random logins, the members get used to it "most people are familiar with copy and paste" Anyway I?m out for the night Cheers |
Quote:
Anyway, I'm sure your system works well. I was just saying the form login page was simpler than having a user and pass like Ug834nfoGodkt5j/Risjt35Fks53GW. |
Quote:
And still there're many customers who don't use (or don't know how to use, huh?) copy-paste to insert the info to log-in window. |
Quote:
|
wow, that's a fucking huge list!!
|
I'm surprised they are not shut down yet.
|
All times are GMT -7. The time now is 12:34 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123