On Tue, Jan 08, 2019 at 02:29:47PM -0700, Grant Taylor via cctalk wrote:
On 01/08/2019 02:09 PM, allison via cctalk wrote:
Its actually funny. The password given is three
yahoo (groups) hacks
ago (about 10 years) but the email address used was a public one way
reflector (
arrl.net).
So you are (or were) a licensed ham. 73 to you. :-)
She's not the only one. ;)
The one thing that does bother me about these scams is they do work
despite our best efforts at informing people of the scam.
> Same claims of rude and crude caught off the camera save for the systems
> use never had one or are blocked/disconnected(laptops) and at best a
> stupid threat. I run linux on multiple flavors/platforms so typical M$
FreeBSD on all my platforms. Same. The usual hacks don't bother me.
I was tempted
to buy the smallest bitcoin possible maybe 0.1 cent (1
milliDollar) for laughs and send that as they deserve the very least
for a dumb hack.
I would avoid doing anything good to the miscreants.
ditto. Unless the cops are doing it to catch the .... {fill in swear word}
I'd stay well away.
consider
changing them periodically.
I thought there had been some research and reports, particularly from
NIST (?) about a year ago where /forced/ periodic password changes were
actually a bad thing.
Correct. What happens is people start rotating passwords 12345 23451 etc.
that sort of thing. Bad. But not so bad if you are actually careful
to use good passwords you never re-use. Certainly never re-use a password
for more than one purpose.
--
Grant. . . .
unix || die
73 Diane VA3DB
--
- db at
FreeBSD.org db at
db.net http://artemis.db.net/~db