Posts

Showing posts from July, 2017

Spam: Fighting the Machine

Image
Spam is defined as "a canned meat product made mainly from ham." Hm. Did you come here to read about ham? Spam is also defined as  "irrelevant or inappropriate messages sent on the Internet to a large number of recipients."  That’s probably the definition we should discuss. While spam is usually delivered via the Internet, it can also be distributed via traditional phone systems and cellular networks in the form of texts and phone calls. Generally, spam refers to unsolicited: Email SMS messages (texts) Social media messages Phone calls How do “they” get to me? Several avenues are available for acquiring your contact information. You gave them the information directly. It is freely available on your social media profile. It was leaked in a breach. It was voluntarily shared by a 3rd party that you may or may not have authorized to sell/share your information. But who are "they"? Is it an individual person trol

Passwords - Complexity < Length

Image
I'm revisiting the topic of password security today because it's essential to understand why passwords exist and how having a weak password can bring a world of pain. Many services that you have signed up for have password complexity requirements. Something to the effect of: At least 8 characters 1 Uppercase 1 Lowercase 1 Numeric 1 Symbol Why the complexity? In short, the service is following a password "standard" by not allowing you to create an utterly useless password. However many services aren't doing very complex checks to see if your password is actually  secure. Guess what password meets the above requirements: "Password123!" While a computer can generate words very very  quickly (we're talking in the order of millions of words per second), a computer with no knowledge of the English language could theoretically take somewhere around 34 thousand years to crack that password. But wait a minute, theoretically  - is that