Index | Recent Threads | Unanswered Threads | Who's Active | Guidelines | Search |
![]() |
World Community Grid Forums
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
No member browsing this thread |
Thread Status: Active Total posts in this thread: 14598
|
![]() |
Author |
|
jonnieb-uk
Ace Cruncher England Joined: Nov 30, 2011 Post Count: 6105 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
jhindo Mar 13, 2014 8:26:08 PM
----------------------------------------We have found that a few of our members have unexpectedly had their team choice changed to the "Ripple Labs" team. After investigating this, we can confirm that there was no break-in to World Community Grid and users' devices were in no way compromised. We have identified a computer that was trying combinations of user names and common passwords against our website in an attempt to find combinations that worked. This activity began on March 11, 2014 and successfully guessed the passwords of a few of our volunteers. It appears that users whose passwords were guessed had their account's team choice changed to the "Ripple Labs" team but were otherwise left unmodified. Within 36 hours of the attack, this computer was blocked. We have been monitoring our systems closely for similar attempts. We will notify all members who joined the Ripple Lab team since this began and ask them to confirm their intention to be on that team. We take security very seriously and follow industry best practices to best protect our users. We will continue to use best practices to block such password-guessing attempts. We will also conduct a complete review of other aspects of account and password management and determine what, if any, additional changes should be made there. We are sorry to see that this happened to a few of our members. To avoid this kind of problem in the future, we strongly advise all users to adopt the best practice of selecting passwords that are not trivial or common. Avoid using short passwords and those containing simple words, obvious number, letter or keyboard sequences. You can see examples of weak passwords that should be avoided here: http://boingboing.net/2013/12/07/worst-passwords.html. We also advise that you avoid using the same password across multiple sites. Great that it's been sorted by the tech team. Plaudits all round ![]() ![]() ![]() ![]() ![]() ![]() So it's been resolved. Nothing sophisticated just old fashioned password cracking. Nothing new to be learnt by those involved in the attempt. But at the moment informing the members (other than those few members directly affected) consists of a post in the middle of a forum thread. No special announcement, no News item etc. So much for WCG's vaunted new Communications policy. ![]() It seems to me that since this happened to [just] a few of our members the policy is we won't tell anyone else and it will all be forgotten. Maybe I'm wrong in which case I'll retract the post. Time will tell. ---------------------------------------- [Edit 1 times, last edit by jonnieb-uk at Mar 13, 2014 10:28:09 PM] |
||
|
genhos
Veteran Cruncher UK Joined: Apr 26, 2009 Post Count: 1103 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Welcome back TMC.
----------------------------------------On the face of it, Joe87, that mobo looks pretty good to me but I'm no expert. My dad's computer is a 6core AMD running at around 3.2ghz and crunches through nicely, think it's a FX6300 (rings a bell in me ol' brain cell) Black Edition but not sure. |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Sounds ok - if nothing else, put your password in brackets, maybe put an exclamation mark at the front, an underscore at the end, replace 'a' with '@', 'i' with '1' etc, or use a multitude of random password generators to create a 32 character random string and store it in a multitude of password lockers so you don't have to remember it.
Excellent work by the admins byw, as always. More importantly though, welcome back tmc - great to have you back. |
||
|
Thargor
Veteran Cruncher UK Joined: Feb 3, 2012 Post Count: 1291 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Sounds ok - if nothing else, put your password in brackets, maybe put an exclamation mark at the front, an underscore at the end, replace 'a' with '@', 'i' with '1' etc, or use a multitude of random password generators to create a 32 character random string and store it in a multitude of password lockers so you don't have to remember it. Except WCG only supports alphanumeric-only passwords up to 15 characters long! ![]() ![]() |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
I guess that explains why we're all getting hacked.
So, use a 15 character random string without brackets, '@'s, '!'s etc. I stand by my tmc comment though ๐. |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Mornin..................
![]() |
||
|
Former Member
Cruncher Joined: May 22, 2018 Post Count: 0 Status: Offline |
Windows Updates are in the wild.........................!
![]() |
||
|
Barnsley_Tatts
Senior Cruncher Joined: Nov 3, 2005 Post Count: 283 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
jhindo Mar 13, 2014 8:26:08 PM We have found that a few of our members have unexpectedly had their team choice changed to the "Ripple Labs" team. After investigating this, we can confirm that there was no break-in to World Community Grid and users' devices were in no way compromised. We have identified a computer that was trying combinations of user names and common passwords against our website in an attempt to find combinations that worked. This activity began on March 11, 2014 and successfully guessed the passwords of a few of our volunteers. It appears that users whose passwords were guessed had their account's team choice changed to the "Ripple Labs" team but were otherwise left unmodified. Within 36 hours of the attack, this computer was blocked. We have been monitoring our systems closely for similar attempts. We will notify all members who joined the Ripple Lab team since this began and ask them to confirm their intention to be on that team. We take security very seriously and follow industry best practices to best protect our users. We will continue to use best practices to block such password-guessing attempts. We will also conduct a complete review of other aspects of account and password management and determine what, if any, additional changes should be made there. We are sorry to see that this happened to a few of our members. To avoid this kind of problem in the future, we strongly advise all users to adopt the best practice of selecting passwords that are not trivial or common. Avoid using short passwords and those containing simple words, obvious number, letter or keyboard sequences. You can see examples of weak passwords that should be avoided here: http://boingboing.net/2013/12/07/worst-passwords.html. We also advise that you avoid using the same password across multiple sites. Great that it's been sorted by the tech team. Plaudits all round ![]() ![]() ![]() ![]() ![]() ![]() So it's been resolved. Nothing sophisticated just old fashioned password cracking. Nothing new to be learnt by those involved in the attempt. But at the moment informing the members (other than those few members directly affected) consists of a post in the middle of a forum thread. No special announcement, no News item etc. So much for WCG's vaunted new Communications policy. ![]() It seems to me that since this happened to [just] a few of our members the policy is we won't tell anyone else and it will all be forgotten. Maybe I'm wrong in which case I'll retract the post. Time will tell. So.... It's my own fault really for having a weak password? I used the same pw when I first signed up to Seti back in 1999, then the same one when I signed up to United Devices in 2003. Never had a problem for 15 years until Ripple came along. Hmmm...... ![]() |
||
|
jonnieb-uk
Ace Cruncher England Joined: Nov 30, 2011 Post Count: 6105 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Congratulations to the following UK team members on achieving a Personal Milestone in yesterday's crunching:
----------------------------------------![]() ![]() Steven Langston 12 years RunTime Joe87 moves into the UK top 400 RunTime Rankings at #398 mike@oberon 13,000,000 Points barrie.trevena moves into the UK top 250 Results Rankings at #250 Congratulations also to the following UK team members on setting new PBs ![]() ![]() Steven Langston Runtime 12:17:08:50 Points Results UK team - Individual Ranking Movements
UK team Comparison of Daily RunTime, Points, Results Hours Points Results Average Daily Crunching Comparison RunTime Points Results Milestone Targets for the UK team Target Current To Do 7day Avg. Estimate No. Of Members Active Yesterday Day out of Tot. |
||
|
jonnieb-uk
Ace Cruncher England Joined: Nov 30, 2011 Post Count: 6105 Status: Offline Project Badges: ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Daily Global5000
----------------------------------------RT(days) # Points # Results # The Daily Global5000 accounted for 78.1% of yesterdays RunTime of 797.5 years |
||
|
|
![]() |