Something Random

ddrueding

Fixture
Joined
Feb 4, 2002
Messages
19,728
Location
Horsens, Denmark
It seems that I've had this position long enough that lots of sales peoples CRM databases must know that I am in charge of evaluating and purchasing IT stuff for my company. The receptionist is great at routing all these calls to my desk voicemail that I never answer (currently 98 new voicemails, cleared weekly by logging into the phone system server). One day someone else was working the front desk and forwarded a sales call directly to me. When I picked up the salesman on the other side was furious, stating that he'd been trying to get a hold of me for months and that I'd never responded to any of his calls or e-mails. I apologized profusely for the mistake, explaining that somehow the front desk had connected us, and I assured him it wouldn't happen again. Then I hung up.
 

LunarMist

I can't believe I'm a Fixture
Joined
Feb 1, 2003
Messages
17,497
Location
USA
It seems that I've had this position long enough that lots of sales peoples CRM databases must know that I am in charge of evaluating and purchasing IT stuff for my company. The receptionist is great at routing all these calls to my desk voicemail that I never answer (currently 98 new voicemails, cleared weekly by logging into the phone system server). One day someone else was working the front desk and forwarded a sales call directly to me. When I picked up the salesman on the other side was furious, stating that he'd been trying to get a hold of me for months and that I'd never responded to any of his calls or e-mails. I apologized profusely for the mistake, explaining that somehow the front desk had connected us, and I assured him it wouldn't happen again. Then I hung up.

VND=Vietnamese Dong?
 

LunarMist

I can't believe I'm a Fixture
Joined
Feb 1, 2003
Messages
17,497
Location
USA
Apparently the IRS is after me and criminal charges have been filed. At first I freaked out, but they are a scam. Then they called back and said the police were coming to arrest me. The bastards should all f'ing die from the most terrible disease. :cursin:
 

ddrueding

Fixture
Joined
Feb 4, 2002
Messages
19,728
Location
Horsens, Denmark
Apparently the IRS is after me and criminal charges have been filed. At first I freaked out, but they are a scam. Then they called back and said the police were coming to arrest me. The bastards should all f'ing die from the most terrible disease. :cursin:

Indeed. Those kinds of scams are awful. From personal experience, I can attest that the IRS first sends a letter to your employer to withhold your pay. This is how I first found out, anyway.
 

LunarMist

I can't believe I'm a Fixture
Joined
Feb 1, 2003
Messages
17,497
Location
USA
Indeed. Those kinds of scams are awful. From personal experience, I can attest that the IRS first sends a letter to your employer to withhold your pay. This is how I first found out, anyway.

One probably would not have received a refund for 2015 either.
 

jtr1962

Storage? I am Storage!
Joined
Jan 25, 2002
Messages
4,373
Location
Flushing, New York
Apparently the IRS is after me and criminal charges have been filed. At first I freaked out, but they are a scam. Then they called back and said the police were coming to arrest me. The bastards should all f'ing die from the most terrible disease. :cursin:
This is why I never answer numbers whch aren't familiar to me. I'll usually do a Google search right after they call, and if they're a known scammer I just block them so they can never bother me again. If they're calling from an area code where I don't know anyone, I just block the entire area code. :) Time Warner Cable now has Nomorobo as an option. They also have an option to block callers who spoof their caller ID. Combined with a app which lets me block numbers from my PC, only one or two junk calls per week actually ring through. I do the usual procedure for those. Look them up, and if it's a known scammer's number just block them.

We really need the equivalent of the spam blockers email providers use. If a telemarketer calls, you can add their number to the list. Your phone service provider automatically blocks all calls originating from the "junk caller" list. We need to put an end to this scourge once and for all. When these scammers can't get through to anyone, their "business" model will fall apart.
 

ddrueding

Fixture
Joined
Feb 4, 2002
Messages
19,728
Location
Horsens, Denmark
Once microtransaction systems become ubiquitous, there is a plausible solution to this and SPAM. No message or call is delivered without a small payment. The payment goes to the recipient. If you send and receive about the same number of messages and calls, you break even. If you try to contact millions without anyone wanting to talk to you, you go broke.
 

LunarMist

I can't believe I'm a Fixture
Joined
Feb 1, 2003
Messages
17,497
Location
USA

LunarMist

I can't believe I'm a Fixture
Joined
Feb 1, 2003
Messages
17,497
Location
USA
This is why I never answer numbers whch aren't familiar to me. I'll usually do a Google search right after they call, and if they're a known scammer I just block them so they can never bother me again. If they're calling from an area code where I don't know anyone, I just block the entire area code. :) Time Warner Cable now has Nomorobo as an option. They also have an option to block callers who spoof their caller ID. Combined with a app which lets me block numbers from my PC, only one or two junk calls per week actually ring through. I do the usual procedure for those. Look them up, and if it's a known scammer's number just block them.

We really need the equivalent of the spam blockers email providers use. If a telemarketer calls, you can add their number to the list. Your phone service provider automatically blocks all calls originating from the "junk caller" list. We need to put an end to this scourge once and for all. When these scammers can't get through to anyone, their "business" model will fall apart.

Wasn't there some standalone machine you were talking about a while ago? I cannot remember if you had one for a while.
 

snowhiker

Storage Freak Apprentice
Joined
Jul 5, 2007
Messages
1,668
Goofy website behavior.

http://www.bta-mall.com/

Anybody heard of this site or used it?

Their listed address and phone:
1-646-657-8981
58 E 14th St
New York, NY 10003
U.S.A

Anyways I go to hope their home page. Type "21024413" (a car part I'm looking for) in search box and get a result. The correct part. ACDelco GM OEM cruise control module. $47.96. I click on link to get product page. Sometime the price is $47.96 and in stock. Sometimes $409.71 and out of stock. If I'm on the page with the $47 price and I re-load page, the $409 page comes up. WTF.

All my other searches for this part are in the $200-450 price range. Don't care about my cruise control enough to pay $400 but $50 is a no brainer.

----->>>>> Anybody else notice this goofy behavior? Perhaps a weird noscript/adblock/ghostery/cookie interaction. Don't want to buy @ $50 and get charged $400.
 

LunarMist

I can't believe I'm a Fixture
Joined
Feb 1, 2003
Messages
17,497
Location
USA
http://www.bta-mall.com/

Anybody heard of this site or used it?

Their listed address and phone:
1-646-657-8981
58 E 14th St
New York, NY 10003
U.S.A

Anyways I go to hope their home page. Type "21024413" (a car part I'm looking for) in search box and get a result. The correct part. ACDelco GM OEM cruise control module. $47.96. I click on link to get product page. Sometime the price is $47.96 and in stock. Sometimes $409.71 and out of stock. If I'm on the page with the $47 price and I re-load page, the $409 page comes up. WTF.

All my other searches for this part are in the $200-450 price range. Don't care about my cruise control enough to pay $400 but $50 is a no brainer.

----->>>>> Anybody else notice this goofy behavior? Perhaps a weird noscript/adblock/ghostery/cookie interaction. Don't want to buy @ $50 and get charged $400.

Are you seriously expecting the price for a legitimate part to be so low compared to other sources unless it's pulled from junkyard?
 

LunarMist

I can't believe I'm a Fixture
Joined
Feb 1, 2003
Messages
17,497
Location
USA
The site will not allow me to place an order for that part, so either give them a call on Monday or look elsewhere.
Maybe it's a long shot, but is there a possibility the part was part of any recall?
 

snowhiker

Storage Freak Apprentice
Joined
Jul 5, 2007
Messages
1,668
Are you seriously expecting the price for a legitimate part to be so low compared to other sources unless it's pulled from junkyard?

I don't actually expect to get part below cost, just wondering why cost is 10x as much on one page vs another page.
 

LunarMist

I can't believe I'm a Fixture
Joined
Feb 1, 2003
Messages
17,497
Location
USA
I don't actually expect to get part below cost, just wondering why cost is 10x as much on one page vs another page.

I saw two different prices on different parts of the same page on Amazon last night, so stiff happens. It was fixed today though. I usually add to cart to see what the vendor will be charging.
 

LunarMist

I can't believe I'm a Fixture
Joined
Feb 1, 2003
Messages
17,497
Location
USA
Horrible email:

4 Signs You're About To DIE Of a Heart Attack [my name]

perpetually pigmaean rightsized rippiers
ripstops sultan sylvae tallyshops
tamaris tatty vandalise walkyries
washered accentuality actings amoks
antiman caeoma calumniatory cankeredness
cannabis dab dactyliology dandles
democrat factionalizing factive fadge
fairer faultfinder favisms gaffsails
gargoylism gelding genuflexions geothermal
hagiographists handkerchers hardihead haruspices
haul inhuman labours laigher

WTF???
 

mubs

Storage? I am Storage!
Joined
Nov 22, 2002
Messages
4,908
Location
Somewhere in time.
I got an email from soc@slcsecurity.com in my spam folder. That domain goes to an outfit called jigsawsecurityenterprise.com.

The body of the email said there had been a potential breach and my data was exposed. It correctly listed the main email account I use, and a password that I modify a bit for different web sites. It was a sales pitch for their security services.

I maintain all my passwords in Word files, and a check showed this is not a password currently in use; perhaps a decade or so ago. I use slightly modified passwords only for infrequently used, low-priority sites, with financial, banking, email etc. being truly random, maximum length, combination of upper and lower case alpha, special chars and numerics. So I'm not worried.

My Linked-in password was breached along with millions of others, but that was so long ago (2011 ?) and I changed my password immediately when notified by Linked-in.
 

mubs

Storage? I am Storage!
Joined
Nov 22, 2002
Messages
4,908
Location
Somewhere in time.
Didn't get you Howell. The passwords are stored in Word files. Since they're gobbledygook, I copy and paste them when logging in.
 

Newtun

Storage is nice, especially if it doesn't rotate
Joined
Nov 21, 2002
Messages
485
Location
Virginia
Didn't get you Howell. The passwords are stored in Word files. Since they're gobbledygook, I copy and paste them when logging in.
"Speaking" of passwords, does anyone here believe in Steve Gibson's theory that "padding" a base password with enough repetitive characters can make a very secure password?

Steve Gibson said:
. . . padding an easily memorized password with equally easy to remember (and enter) padding creates unbreakable passwords that are also easy to use.
 

Handruin

Administrator
Joined
Jan 13, 2002
Messages
13,925
Location
USA
Why not use keypad instead of word files?

Didn't get you Howell. The passwords are stored in Word files. Since they're gobbledygook, I copy and paste them when logging in.

I suspect this may have been an auto-correct error by Howell. He may have been referring to Keepass as a way of storing passwords. This is what I use to store mine and also to generate very long and complex passwords for various sites.
 

sedrosken

Florida Man
Joined
Nov 20, 2013
Messages
1,811
Location
Eglin AFB Area
Website
sedrosken.xyz
"Supported Operating Systems : Windows 98 / 98SE / ME / 2000 / XP / 2003 / Vista / 7 / 8 / 10, each 32-bit and 64-bit, Mono (Linux, Mac OS X, BSD, ...)."

That's a pretty wide range of support. I can understand still supporting XP and Server 2003, but why still support 98? That's been out of support for ten years! And if you're supporting 98, why not 95? This is just weird all around.

Anyway, thanks for the tip, using this from now on.
 

Howell

Storage? I am Storage!
Joined
Feb 24, 2003
Messages
4,740
Location
Chattanooga, TN
I suspect this may have been an auto-correct error by Howell. He may have been referring to Keepass as a way of storing passwords. This is what I use to store mine and also to generate very long and complex passwords for various sites.

Sigh, yes that's what I meant. I even typed it in directly instead of swyping. Thanks.
 

ddrueding

Fixture
Joined
Feb 4, 2002
Messages
19,728
Location
Horsens, Denmark
Some kind of password management system should be considered required at this point if you have things of value accessible over the internet. Keepass is one, I use LastPass. Any of the recent hacks highlight four attributes that passwords need:

Unique - You should never use the same password on more than one thing. This contains a breach to the site that was hacked (or you were phished into revealing).
Frequently changed - The older a hacked password database is, the more widely circulated it becomes. The longer it has been since you changed a password, the more people potentially know it.
Not accessible on your computer without knowing another password - If your computer gets 0wned, you don't want everything to be compromised. Disable the "saved passwords" feature of your web browsers, don't have a text file on your desktop called "passwords".
Not accessible only from your computer - HDD failure, anyone?

Doing these purely in your head may be possible for some; I would be very impressed.

If you don't need to get to things on the go, this could be as simple as a printed list of sites, their random-string-ish passwords, and the date that password was set. Otherwise sign up for one of the services or do something tricky with password-protected files on redundant thumb-drives or something.
 

Chewy509

Wotty wot wot.
Joined
Nov 8, 2006
Messages
3,357
Location
Gold Coast Hinterland, Australia
Or use a function as the password generator:
Code:
$ echo passphrase@slashdot.org | sha256sum | base64 -w 0

MjAzZGM4MDZmNTIyN2I4YTQ5YjYxZjQxMDBiZWJiYWVlOGE0ZDZmYTAyZGYxMmM3ZGY4YTgzMzE2NjA2MmM2OCAgLQo=
That way you just need to remember the passphrase (which can be stored in plain) for each site... Simply create a new passphrase every few months, reset your login password, and you should be good for a while...

These days, it's not about complexity, but simply length...

One of my favourites to illustrate: https://xkcd.com/936/

PS. The above code assumes *nix like environment.
 

Howell

Storage? I am Storage!
Joined
Feb 24, 2003
Messages
4,740
Location
Chattanooga, TN
But it is also about complexity. Especially as more databases are compromised. Unfortunately, these days websites are inconsistent about how many characters and of what kind they will allow. One seen one that allowed 30 but many are 20 and 12. So your passphrase better have an embedded indicator of how much of the hash to use. I use a Windows cli hashing function for legal files if anyone wants it.
 

mubs

Storage? I am Storage!
Joined
Nov 22, 2002
Messages
4,908
Location
Somewhere in time.
I suspect this may have been an auto-correct error by Howell. He may have been referring to Keepass as a way of storing passwords. This is what I use to store mine and also to generate very long and complex passwords for various sites.
I guess you're right. Wasn't a major vulnerability discovered in one of the major password keeping programs (Lastpass ?) recently? I tried one of these for a while and found it irritating, and went back to my old method that I've been using for around 15 years. My method is proprietary (heh heh), stored with innocuous names (not "password") and stored in a folder several levels deep and the whole partition is TrueCrypted.
 

time

Storage? I am Storage!
Joined
Jan 18, 2002
Messages
4,932
Location
Brisbane, Oz
"Speaking" of passwords, does anyone here believe in Steve Gibson's theory that "padding" a base password with enough repetitive characters can make a very secure password?

Sure. If it's not in a 'dictionary' - i.e. Google can't find it - then the only cracking method is brute force. By definition, that can't tell for example if you just repeated the same character 10 times. In fact, you can take any dictionary word and just add some padding to make it a reasonable length and therefore an unbreakable password.

Realistically, any password of at least 8 characters is unbreakable with current brute force methods. One with 12 characters is unbreakable for the foreseeable future. Someone guessing or stealing your password is a much more credible threat.
 

ddrueding

Fixture
Joined
Feb 4, 2002
Messages
19,728
Location
Horsens, Denmark
I guess you're right. Wasn't a major vulnerability discovered in one of the major password keeping programs (Lastpass ?) recently? I tried one of these for a while and found it irritating, and went back to my old method that I've been using for around 15 years. My method is proprietary (heh heh), stored with innocuous names (not "password") and stored in a folder several levels deep and the whole partition is TrueCrypted.

No vulnerability has ever been found. Someone did get to the parts of the database that need to remain open, that is it. And it was a year ago.

We want to notify our community that on Friday, our team discovered and blocked suspicious activity on our network. In our investigation, we have found no evidence that encrypted user vault data was taken, nor that LastPass user accounts were accessed. The investigation has shown, however, that LastPass account email addresses, password reminders, server per user salts, and authentication hashes were compromised.
We are confident that our encryption measures are sufficient to protect the vast majority of users. LastPass strengthens the authentication hash with a random salt and 100,000 rounds of server-side PBKDF2-SHA256, in addition to the rounds performed client-side. This additional strengthening makes it difficult to attack the stolen hashes with any significant speed.
 

Handruin

Administrator
Joined
Jan 13, 2002
Messages
13,925
Location
USA
I guess you're right. Wasn't a major vulnerability discovered in one of the major password keeping programs (Lastpass ?) recently? I tried one of these for a while and found it irritating, and went back to my old method that I've been using for around 15 years. My method is proprietary (heh heh), stored with innocuous names (not "password") and stored in a folder several levels deep and the whole partition is TrueCrypted.

I consider Keepass and LastPass as completely different utilities for managing passwords. I keep my Keepass database only on my local workstation and not synch between systems or available ion a cloud system. Doing it this way is less convenient but I still feel better about it in this form than in a proprietary format. Rolling your own security is a tricky and slippery slope.
 
Top