Rev Customer Databased Hacked?

Andre Garzia andre at andregarzia.com
Mon Jul 11 17:12:38 EDT 2011


On Mon, Jul 11, 2011 at 5:37 PM, Pierre Sahores <psahores at free.fr> wrote:

> I changed all mine, even if they went in theory full safe. It's realy best
> for all of us to verify that our passwords are at least trusted as 100% safe
> by the cPanel AJAX tester. Any mix of letters, numbers and itemdels are
> always more trusty than only letters + numbers ;-)
>
>
I used http://strongpasswordgenerator.com/ to generate mine... :-)



> Best, Pierre
>
> Début du message réexpédié :
>
> > The advice to change password was *not* because of any success by any
> hacker
> > at accessing your (our) password information.
> >
> > BUT because the hacker now has username and on-rev domain name, *if* you
> > have a weak password it would be wise to change it to one that may be
> harder
> > to try and attack by dictionary/brute force, should the hacker try in the
> > future to use the list of usernames to find a weak nut to crack.
>
> --
> Pierre Sahores
> mobile : (33) 6 03 95 77 70
>
> www.woooooooords.com
> www.sahores-conseil.com
>
>
>
>
>
> _______________________________________________
> use-livecode mailing list
> use-livecode at lists.runrev.com
> Please visit this url to subscribe, unsubscribe and manage your
> subscription preferences:
> http://lists.runrev.com/mailman/listinfo/use-livecode
>



-- 
http://www.andregarzia.com All We Do Is Code.



More information about the use-livecode mailing list