Beefy Boxes and Bandwidth Generously Provided by pair Networks
Your skill will accomplish
what the force of many cannot
 
PerlMonks  

Re: Status of Recent User Information Leak

by Anonymous Monk
on Aug 05, 2009 at 20:35 UTC ( #786219=note: print w/ replies, xml ) Need Help??


in reply to Status of Recent User Information Leak

It's seems that everyone is bragging about plaintext passwords, at the same time forgetting about compromised root account on the server involved. Also, about 90% of the posters are happy to declare perlmonks maintainers as stupid and careless because of that. So, I have one question: give me one good logical reason to have encrypted passwords on the user login machine I and not you have the root access for.


Comment on Re: Status of Recent User Information Leak
Re^2: Status of Recent User Information Leak
by Anonymous Monk on Aug 06, 2009 at 04:28 UTC
    1) Sh*t happens.
Re^2: Status of Recent User Information Leak
by Argel (Prior) on Aug 06, 2009 at 21:50 UTC
    On a technical level everything you say is correct. However, you have overlooked the "temptation" factor -- the hackers specifically stated that they "couldn't resist so many clear text passwords" (paraphrased).

    Elda Taluta; Sarks Sark; Ark Arks

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://786219]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others having an uproarious good time at the Monastery: (16)
As of 2014-07-23 20:18 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    My favorite superfluous repetitious redundant duplicative phrase is:









    Results (152 votes), past polls