We need to strip government of unneeded power and put ourselves back into proper Constitutional governance. The problem is, progressives need the power of the Police State to enforce their progressive policies. But they are the first ones that complain about the police state.
He has some understanding, someone was stealing power from the school. He doesn't need to know how much.
Imagine if everytime you went to the store, you took a nickel out of the till. Now imagine everyone doing the same thing. No one person is "stealing that much" but in aggregate, they are stealing the store into bankruptcy.
In short, STEALING is a crime, because it wrong, no matter how little you "steal".
So, you're okay with SPAM because the stealing of services is inconsequential?
The problem isn't the one guy, it is the one guy, times a factor of a couple thousand others, each getting their own free $.05 charge. Pretty soon you're talking thousands of dollars. Stealing is wrong, because it takes from others that which is neither earned or deserved. The amount doesn't matter on one case, but when you excuse the one case, and it becomes common, then you have to "pass a law" to stop it further.
It is much easier to stop it now, before it becomes a legal nightmare.
And why are we praising someone who is being a cheap asshat, simply because it is $.05 worth? Next time, they should simply cut his power cord (unplug it first), and tell him to stop stealing.
For long runs, in parallel, which are common in some places, you use Shielded Cat6 (or better) cabling.
You can have the power and data in the same "conduit" if you get twin raceway.
All of which is a very long-winded way of saying passwords of 8 characters or less (roughly 48 bits) are screwed if the attacker has $1000 and gets a copy of your hash for offline cracking.
Per password. Given a database of thousands of passwords, properly salted and hashed, which do you think he'll attack? And you'll have to assume that attacker doesn't know the value of anything beforehand, but only can make educated guesses. If you're doing brute force, you do the simplest brute force to crack as many passwords as you can. If you're targeting a single individual, there are better easier ways of getting passwords (Spear Phishing) that cannot be hacked quickly via dictionary / easy brute force. The fact that in your example, you already have an offline password file, I'll assume it is a high value web / commercial target that you've already breached. Which in that case, using MY advice (unique password per system), using sufficiently long password (21 Chars min), you're looking at least a week using your example of $1000 equipment or approximately $20 per password crack, minimum investment to crack the password, with no guarantee of return.
Using PURE math to solve real world examples doesn't really fit. If you're concerned about Password security, and safety of your account, you'll change your password periodically so that in case of database of passwords being hacked, you'll have your password changed before they can crack the password in the database using your $1000 rig. In short, a hacker will have to make a significant series of
1) Long passwords are better. Three sufficiently long words, or five or more shorter words, to establish a password of 21 or more characters for BASIC web sites is probably sufficient. Making them unique for each site is recommended.
2) Use a product like LastPass or a private key vault to store your passwords you use often.
3) Do not save passwords ANYWHERE but your secure vaults, change your master password regularly using three or four significantly obscure words of seven letters or more.
4) If you are a direct target of hackers(they're after you specifically), hire better security and don't take advice from some dude like me on Slashdot. Otherwise you're probably safe using my suggestions.
You cannot "panic" a market that is experiencing huge fluctuations in prices already. There is no panic here, as most people already expect huge fluctuations. I'm sure there will be many bubble n burst cycles in the BitCoin market. This is not a market for the timid.
So, in short a 5% drop is NOTHING to people in BitCoin Market, and when the price recovers. The real problem is the larger Bubble that is occurring at the moment, at some point, people buying at $2000 will find the coins back down at $250 when someone liquidates 50 million to fund their new yacht.
The average American high-school graduate knows approximately 45,000 words (1) nearly ten times the number you cited.
And, as I have stated elsewhere (above) the point of a long password is to get past dictionary attacks, and onto brute force. And right now, password length is a deciding factor to even attempt dictionary attack.
$ # 1 # $ Padding example (slashdot filters ugghh)
To be honest, even the password "D0g" is sufficient, if you add enough "Pseudo Random" padding values.
Has 67 bits of entropy, without even really trying. Adding in additional padding adds entropy without really changing the password. adding in a Padding pattern that is easy to remember (>) makes it easier to use simple passwords. The complexity doesn't matter once you get the algorithm to stop dictionary attack and move to brute force. The goal is to get beyond the dictionary attack, because most people will simply stop searching after that. And it might be as simple as password length.
You don't want your password to be the low hanging fruit.
English is a very big dictionary. AND I didn't say to use three nouns, but rather three words, I just happened to use nouns for this example. It could have been Mongoose Tokyo Nicolette.
For my original example, it shows it has 110 bits of entropy using only 26 set (non-capitalized) and 134 bits using three Capital Letters. My suggestion is that you go back and look at what entropy means regarding password strength. Granted, if you could guess three random words and run brute force against that password hash, it doesn't seem likely that you'd catch the password in any meaningful length of time. Then again, password hacking MY personal password would be much easier with the Hammer Technique http://xkcd.com/538/
Ultimately, no password is secure if you can't remember it without writing it down. And re-using the same password for all the systems you access is the worst possible choice one can make. The question then becomes, how important is the information being secured by passwords? Do you want to secure your pet's health records with 156 bit entropy random/pseudo random passwords, or will 1234abcd work just fine?
So, how many 100 bit entropy passwords can you remember without resorting to something like LastPass or writing them down?
The worst blown transmission repairs are significantly different too. When a 8 year old Manual transmission goes, you can have it repaired for less than the value of the car, on a Automatic, you're getting real close to "its not worth fixing it" price point. I tend to drive older cars that and I always have a nice car, that when the time comes, goes to the junk yard rather than get repaired. The money saved by not having the newest bestest car means I can replace my car two or three times during the time of a new car loan (60-72 months) while spending less over all.
That being said, the last brand new car I bought, I drove 20 years into the graveyard. 20 years is a long time to drive a car. And now, six years seems like a long time. I love driving a different car every couple years.
Different map, same results. Seattle to Miami is about the same distance as London(UK) to Jerusalem (Israel). I love it when people compare small European/Scandinavian Country with the US, it really shows ignorance.
It is actually higher density along the coasts. Middle America is pretty sparse population. Comparing Finland to the US is mostly irrelevant nonsense. For giggles, you should overlay a map of Europe over the US, like this
Most Europeans have no clue how big the US actually is. Actually, most Americans don't either. And Canada is even bigger than the US, so make your comparisons with them, mkay?
I'll pay your way to North Korea. Seems legit way to support your false equivalences.