When you use one of the fake ID and passwords to try to log in. That will set off an alarm in the system that someone has stolen the database. Think about it - it's really quite clever.
Sure you can go around Windows' back and directly change the password hash, but the data is still effectively encrypted with the old password, so yeah, it's gone.
On Windows, Chrome protects its password database with Windows' Data Protection API. The DPAPI has several layers, but at the end its security rests entirely on the Windows account password. So
Maybe they shouldn't have named it first? I bet it's harder to vaporize a rock after it like has an identity and stuff.
And I hate them both! I have tried to make use of the CVS pharmacy automated refill system
You should try the SVN or HG systems instead.
I find that 90% of the writing (with pen/pencil) I do is putting things on the grocery list on the fridge. Once grocery lists are made obsolete by internet-connected fridges automatically ordering food online, I'll never put pen to paper again.
Wait guys. Someone named "Samantha" just made an awesome SQL + Nethack joke and no one here has proposed to her yet. What the hell is Slashdot coming to?
Samantha Wright, will you marry me?
Why are we even signing things anymore, when a digital signature would be a lot more secure and convenient?
Reality check: Could your mom digitally sign something today? Didn't think so.
And why not? Because digital signatures are in reality neither secure nor convenient. They require a fully functioning PKI, which is hardly convenient. Seriously, has anyone ever actually created a functioning PKI that is actually secure and/or used in the real world? The closest thing would be the SSL infrastructure and the recent CA compromises show how secure that is.
I know of what I speak: I used to work for an actual licensed CA.
Oh. My. God.
If you do not know the difference between a hash algorithm and a cipher algorithm, then STEP AWAY FROM THE SECURITY!
DIY crypto is a good idea like DIY brain surgery is.
Rolling your own crypto system is like rolling your own mercenary army. It feels really awesome and at first it's all running around in the woods with your camo and guns and FUCK YEAH WE RULE. But then you meet reality and it's all OMFG WE GOT PWNED. and ALSO WE'RE DEAD
PSN up, up again, then down, down. Then Left, right, left, right, B, A, start.
I'm not saying the research is worthless, but their techniques are easily defeated.
It would be simple to write a program that would iteratively "fuzz" your message with typos, lowercase/uppercase toggling, etc. and check the result against their algorithm until the message could no longer be tied to you.
I'm sure someone could do it in 10 lines of Perl, or less.
The machine was rather difficult to operate. For years radios had been operated by means of pressing buttons and turning dials; then as the technology became more sophisticated the controls were made touch-sensitive--you merely had to brush the panels with your fingers; now all you had to do was wave your hand in the general direction of the components and hope. It saved a lot of muscular expenditure, of course, but meant that you had to sit infuriatingly still if you wanted to keep listening to the same program.
Spoken like a true computer scientist: One more layer of indirection will solve everything.
What happens when an attacker has both factors in a two-factor situation is that security is breached.
Fuck everything, we're going to 5 factor security.