Jump to content

Recommended Posts

Posted

ummm for my =F|A= account....37 years...for my xfire it says instantly. Guess i should stop usind password as my password.. lol

Posted

it's alright speedy, I changed yours to "prettyinpinkspeedo1998" that should take a while for them to crack

Posted (edited)

ohh the pink speedo jokes never get old...course not....

 

@ GI, so youre the reason i cant log into xfire :cry meanie (should also get on xfire you nub!)

Edited by speedfact
Posted

They got some very funny numbers when you start using sentences lol.

 

Anyways, 48 qunitilion years @ 4 billion calculations a second :D

post-710-0-78114100-1356086733_thumb.png

Posted (edited)

Aren't you guys breaking the first rule of security and giving your passwords to a third party?

 

 

:)

 

but they don't know which account its for ;)

 

Visual Reminder so you'll never forget. ;D

 

tumblr_m7b48l7AFF1rvugaio1_1280.jpg

 

which one is speedy?

Edited by ajnl
  • Administrators
Posted

We would like to thank all of you that have submitted your banking passwords. Little Nigerians will have a merry Christmas after all.

nigerian_scam.png

  • Like 7
Posted

Aren't you guys breaking the first rule of security and giving your passwords to a third party?

 

 

:)

 

I never used my exact password lol I used something with the same number of lower/upper case/numbers/symbols to get an idea of my password security. No way I'd ever give out my real password lol

Posted

106 trillion years for i have shitty ass, in finnish :) this is just silly thing proves nothing about ur password security

Posted

The fastest time I reverse engineered a ET GUID is 6 minutes which is abit slow due to algorithm used, the longest one was 11 days using that same algo if I remember it correctly. Anyway, I then put a test password openpassword* on the provided link and that site says 7 thousand years. Must be a joke.

  • 1 month later...
Posted

The best whay is :

Advanced Crypto Protection

 

This is the concluding article in Symantec’s multi-part series covering specific and interesting aspects of W32.Downadup.

 

ef_downcrypto1.jpg

 

 

 

ef_downcrypto2_sml.jpg

 

Looking at the code snippet above, we can say that “package” downloaded by Downadup will have a general header with a size of 12 bytes, followed by multiple instances of encrypted and digitally signed payloads. Each of these payloads will have its own header (20 bytes) and will contain an appended blob of data at the end (512 bytes), which is the unique digital signature of the payload. The following diagram shows the structure of the whole package and that of a single payload.

 

 

So good luck all :)

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.