A data security firm has unveiled the ten most commonly used passwords on the web.
To reach the conclusion, Imperva analysed around 32 million passwords that had been exposed in a recent hack of the RockYou website.
Last year a hacker had breached the site’s company database, gaining access to the unencrypted usernames and passwords of all its 32 million users.
Now, after studying the breach the firm has come up with a list of the most commonly used passwords which website users should avoid, reports The Telegraph.
“Everyone needs to understand what the combination of poor passwords means in today’s world of automated cyber attacks: with only minimal effort, a hacker can gain access to one new account every second-or 1000 accounts every 17 minutes,” said Amichai Shulman, Imperva’s chief technical officer.
“Employees using the same passwords on Facebook that they use in the workplace bring the possibility of compromising enterprise systems with insecure passwords, especially if they are using easy to crack passwords like ‘123456’,” he added.
“The problem has changed very little over the past 20 years. It’s time for everyone to take password security seriously; it’s an important first step in data security,” he said.
The ten most commonly used passwords analysed in the study were:
1. 123456
2. 12345
3. 123456789
4. Password
5. iloveyou
6. princess
7. rockyou
8. 1234567
9. 12345678
10. abc123.
Search This Blog
Saturday, July 10, 2010
Saturday, July 03, 2010
Simple tips for better web password security
Simple tips for better web password security from Sophos Labs.
Labels:
password,
password security,
secure password,
security,
security tips
Tuesday, June 29, 2010
Clipboard Hack Problem Internet Explorer Security Tip
Clipboard Hack Problem - Shocking news about CTRL+C: View Demo
CTRL + C is the most useful action that we use everyday. But, I have found this to be very dangerous with internet explorer and netscape navigator. Because, your clipboard text (which you have copied by pressing CTRL+C on your system) can be easily retrieved by the websites, if they really wish to do so.
Imagine a scenario, when you tried to copy your account number or password or any other personal information on your system, it will be saved (or copied) into the clipboard (temperory buffer in your operating system). Then if you open the website (one who intentionally try to access your personal information, i.e. the hackers) knowingly or unknowingly. Thats is it, they are done with their work. You need not do anything on your own. Your information is copied and they can access the information from the clipboard and use it for illegal activities.
So be very careful my dear friends. This will work in internet explorer and netscape navigator only. This is not possible with google chrome,mozilla firefox or any other browser. Remeber, today the most used browser around the world is internet explorer. So just avoid these kind of attacks and be on safe side.
Follow the steps below to safeguard yourself from clipboard hack:
CTRL + C is the most useful action that we use everyday. But, I have found this to be very dangerous with internet explorer and netscape navigator. Because, your clipboard text (which you have copied by pressing CTRL+C on your system) can be easily retrieved by the websites, if they really wish to do so.
Imagine a scenario, when you tried to copy your account number or password or any other personal information on your system, it will be saved (or copied) into the clipboard (temperory buffer in your operating system). Then if you open the website (one who intentionally try to access your personal information, i.e. the hackers) knowingly or unknowingly. Thats is it, they are done with their work. You need not do anything on your own. Your information is copied and they can access the information from the clipboard and use it for illegal activities.
So be very careful my dear friends. This will work in internet explorer and netscape navigator only. This is not possible with google chrome,mozilla firefox or any other browser. Remeber, today the most used browser around the world is internet explorer. So just avoid these kind of attacks and be on safe side.
Follow the steps below to safeguard yourself from clipboard hack:
- GoTo internet option --> Security
- Press custom level
- Under allow paste operations via script, Select "Disable" radio button
Saturday, June 26, 2010
Orkut security tips: Secure your orkut account
Due to orkut's open nature, users can unwillingly infect their computers with viruses, spyware, adware, and other unwanted junk. This can result in strange behavior, such as sending unintended scraps to friends that may even infect more viruses. To help prevent this from happening, I recommend the following safe practices:
* Don't click on any link (e.g., free recharge coupon kind of) you suspect to be malicious, even if sent by someone you really trust.
* Never select the "remember me" option when you're using a public or shared computer.
* Scan your computer regularly for viruses, spyware and adware.
* Never run any script while logged into orkut, no matter what it claims to do. Usually you will be asked to copy and paste a code in your web browser, remember to never do so!
* Always check your browser's address bar to make sure you enter your sign-in information only on www.orkut.com and other Google properties.
* Change your password regularly and keep it secret.
Additionally, orkut or google will never send you spam emails asking you to download anything or to send them personal information, such as your password or bank account information. Orkut is a free service, and it will remain safe with your help.
Enjoy Social Networking :) :)
* Don't click on any link (e.g., free recharge coupon kind of) you suspect to be malicious, even if sent by someone you really trust.
* Never select the "remember me" option when you're using a public or shared computer.
* Scan your computer regularly for viruses, spyware and adware.
* Never run any script while logged into orkut, no matter what it claims to do. Usually you will be asked to copy and paste a code in your web browser, remember to never do so!
* Always check your browser's address bar to make sure you enter your sign-in information only on www.orkut.com and other Google properties.
* Change your password regularly and keep it secret.
Additionally, orkut or google will never send you spam emails asking you to download anything or to send them personal information, such as your password or bank account information. Orkut is a free service, and it will remain safe with your help.
Enjoy Social Networking :) :)
Thursday, May 06, 2010
ASP.NET SiteMap Example
Intro:
SiteMap in asp.net is very usefull if you want to give your users access to all the pages in your application. And sitemap is also usefull for the search engines to navigate your site easily. We are going to look at the asp.net sitenavigation control,treeview control,menu control and the web.sitemap file provided in asp.net
Demo:
Following is a sample demo on how to use a sitenavigation,menu and tree view controls and the web.sitemap file to display the whole site map of a website.
Download Demo
I will explain the demo in the next post.
Happy coding :)
SiteMap in asp.net is very usefull if you want to give your users access to all the pages in your application. And sitemap is also usefull for the search engines to navigate your site easily. We are going to look at the asp.net sitenavigation control,treeview control,menu control and the web.sitemap file provided in asp.net
Demo:
Following is a sample demo on how to use a sitenavigation,menu and tree view controls and the web.sitemap file to display the whole site map of a website.
Download Demo
I will explain the demo in the next post.
Happy coding :)
Labels:
asp.net,
menu,
site map,
site navigation,
sitemap,
sitenavigation,
tree view,
treeview
Sunday, April 04, 2010
Comparing Two Images in C#
Comparing Two Images in C#
I’ve recently been doing a bit of work generating images, I have also need to compare the images that I generate with an image that has already exists.
I found a number of web sites that suggested the following way of comparing two images, by cycling through each pixel in an image and returning false if there is a mismatch in the pixels.
I’ve recently been doing a bit of work generating images, I have also need to compare the images that I generate with an image that has already exists.
I found a number of web sites that suggested the following way of comparing two images, by cycling through each pixel in an image and returning false if there is a mismatch in the pixels.
Thursday, April 01, 2010
*A quick brain tickler**…*
*A quick brain tickler**…*
Please look at the math below:
They say only people with an IQ with 120 and over are able to figure this
out.
If:
2 + 3 = 10 = 2
7 + 2 = 63 = 7
6 + 5 = 66 = 6
8 + 4 = 96 = 8
Then:
ch
9 + 7 = ????
The number you find out is the password to open the attachment.
Sign your name, save it, and forward it, replacing the original
attachment with your saved updated attachment, to any more smart
people you know
For answer, get back after 24 hours
Please look at the math below:
They say only people with an IQ with 120 and over are able to figure this
out.
If:
2 + 3 = 10 = 2
7 + 2 = 63 = 7
6 + 5 = 66 = 6
8 + 4 = 96 = 8
Then:
ch
9 + 7 = ????
The number you find out is the password to open the attachment.
Sign your name, save it, and forward it, replacing the original
attachment with your saved updated attachment, to any more smart
people you know
For answer, get back after 24 hours
Download File here
Saturday, March 13, 2010
Working with Delegates in C#
Abstract In this article I'll discuss what delegates are with lucid code examples. Introduction | |
Delegates in C# are like functions pointers in C/C++. A multi cast delegate can refer to several methods. A delegate can be used to invoke a method, the call to which can only be resolved or determined at runtime. This article discusses what delegates are and how they can be used in C# with lucid code examples. |
Friday, March 12, 2010
Understanding Connection Pooling in .NET
Abstract
Connection Pooling can increase the database performance to a huge extent. This article discusses what Connection Pooling actually is, how it can boost the performance of database access and how we can create a Connection Pool in .NET and add and remove connections to it.
Connection Pooling can increase the database performance to a huge extent. This article discusses what Connection Pooling actually is, how it can boost the performance of database access and how we can create a Connection Pool in .NET and add and remove connections to it.
Introduction | |
Connecting to the database is resource intensive and a relatively slow operation in an application but the most crucial of them all. A Connection Pool is a container of open and reusable connections. A Connection Pool is released from the memory when the last connection to the database is closed. The basic advantage of using Connection Pooling is an improvement of performance and scalability while the main disadvantage is that one or more database connections, even if they are currently not being used, are kept open. The Data Providers in ADO.NET have Connection Pooling turned on by default; if you need to turn it off, specify Pooling = false in the connection string being used. Connection Pooling gives you an idle, open, reusable connection instead of opening a new one every time a connection request to the database is made. When the connection is closed or disposed, it is returned to the pool and remains idle until a request for a new connection comes in. If we use Connection Pooling efficiently, opening and closing of connections to the database becomes less resource expensive. This article discusses what Connection Pooling is all about and how Connection Pooling can be used efficiently to boost the performance and scalability of applications. |
Working with Images Using .NET
Abstract
In this code snippet I will examine how to work with images using Visual Studio .NET 2003 and SQL Server 2000 database.
Introduction
Some applications, be it desktop or web, require working with images. Aptly speaking, the good paradigm is banking applications. Withdrawal of an amount of money from a bank account requires signature verification of the account holder. Normally, specimen signatures of customers are archived as images in such applications.
In this code snippet I will examine how to work with images using Visual Studio .NET 2003 and SQL Server 2000 database.
Introduction
Some applications, be it desktop or web, require working with images. Aptly speaking, the good paradigm is banking applications. Withdrawal of an amount of money from a bank account requires signature verification of the account holder. Normally, specimen signatures of customers are archived as images in such applications.
Subscribe to:
Posts (Atom)