On 01/08/2019 02:09 PM, allison via cctalk wrote:
Its actually funny. The password given is three yahoo
(groups) hacks
ago (about 10 years) but the email address used was a public one way
reflector (
arrl.net).
So you are (or were) a licensed ham. 73 to you. :-)
So all and all its a crude phishing attempt. I write
down old passwords
to keep from reuse and I use long mixed ones. So I know it was from
that and meaningless.
Hopefully you keep that list in a way that's not cleartext on your computer.
I too have lists of old passwords in my password vault.
The source is useless as the address is a bogus hack
as well.
I'm still curious. Mainly because I run my own mail server and wonder
if the messages would have been stopped by my filtering.
Same claims of rude and crude caught off the camera
save for the systems
use never had one or are blocked/disconnected(laptops) and at best a
stupid threat. I run linux on multiple flavors/platforms so typical M$
hacks don't fly either.
Scare tactics.
I was tempted to buy the smallest bitcoin possible
maybe 0.1 cent (1
milliDollar) for laughs and send that as they deserve the very least
for a dumb hack.
I would avoid doing anything good to the miscreants.
Ignore the phoolz and if the password matches current
change it.
Yep.
consider changing them periodically.
I thought there had been some research and reports, particularly from
NIST (?) about a year ago where /forced/ periodic password changes were
actually a bad thing.
--
Grant. . . .
unix || die