Loading...
  OR  Zero-K Name:    Password:   

Post edit history

Password change?

To display differences between versions, select one or more edits in the list using checkboxes and click "diff selected"
Post edit history
Date Editor Before After
12/14/2012 3:25:47 AMGBrankKyubey before revert after revert
Before After
1 the fact is if "evil people" have acsess to your computer, they can install a key logger, and then just let you type in your pasword in for them. 1 the fact is if "evil people" have acsess to your computer, they can install a key logger, and then just let you type in your pasword in for them.
2 \n 2 \n
3 or take 5-10 minutes to hack your "strong" password composed of 8-10 values using brute force :D 3 or take 5-10 minutes to hack your "strong" password composed of 8-10 values using brute force :D
4 \n 4 \n
5 :P people use "s@12tAp" as a pasword, an computer can hack that easily 5 :P people use "s@12tAp" as a pasword, an computer can hack that easily
6 poeple that use "purple apple cerries" as a pasword are unhackable through brute force... 6 poeple that use "purple apple cerries" as a pasword are unhackable through brute force...
7 \n 7 \n
8 i hate to say it, but "internet security" is an obsurdity because the internet isnt secure, and any determined person can hack your conection through 1009 diffrent ways 8 i hate to say it, but "internet security" is an obsurdity because the internet isnt secure, and any determined person can hack your conection through 1009 diffrent ways
9 \n
10 ok rant over TLDR: there is no such thing as secure intenet