It looks like you're new here. If you want to get involved, click one of these buttons!
Your password must meet the following requirements:
* must contain at least one lowercase letter
* must contain at least one uppercase letter
* must contain at least one mid-case letter
* must contain at least two uppercase letters and two lowercase letters
* must contain at least one number
* must contain at least one special character
* must contain at least two special characters
* may not contain spaces
* may not any special characters
* must be between 6 and 20 characters long
* may be up to 9 characters long
* must be 8 to 12 characters long
* must be at least 12 characters long
* may not be your e-mail address
* may not be your frequent flyer number
* may not be your account number
* may not be your driver's license number
* may not be your password
* may not contain common strings such as "password", "1234", or "asdf"
* may not contain the name of this website
* may not contain strings like "account", "official", etc.
* may not contain strings like "correct", "horse", "battery", "staple", etc.
* must contain the entire scientific name of a recently discovered dinosaur
* must have a hexadecimal sum equal to 12B when converted to UTF-8 unicode and summed
* may not contain the DNA sequence of your first-born child
* must include source code from at least two different empirical models of the price of light sweet crude, each written in a different programming language
* must contain at least one Chinese character, at least one Japanese Katakana character, and at least one Cyrillic letter
* must contain the soul of at least one starving orphan under the age of 5
* must contain garlic and holy water
* may not contain leavening
* may not contain ultramafic intrusions
* may not contain high fructose corn syrup
* may not contain asbestos, mercury, or lead
* must include at least one polyunsaturated hydrocarbon containing a chain of 6 to 20 carbons
* may not contain any ribonucleases
* may not contain tritones
* must include at least one chromatic third modulation
* must include at least one instance of a Laplace transform
* may not contain factorials
* must be continuous and differentiable over its entire length
Comments
You motherfucker.
^ That has a special character though
Also, fifty kitty whiskers to whomever can explain that joke, yo.
And 180 days later, it happens again.
Yeah, my password for school stuff has to be changed once every slightly-less-than-half-a-year.
Any site that puts a cap on password limits, particularly under 20 characters, will make me flip a shit.
Any site that EMAILS MY PASSWORD TO ME is a sign the site is not storing passwords in a secure manner (protip: email isn't secure unless you take extra steps), and as such should not be trusted, at least with a password you use anywhere else.
Then again, using the same password on any two services is bad practice, especially if one of those services is your online banking, email, or something else particularly important.
Y'know how some sites have password strength meters? I like to mess with them a little by trying different combinations of letters.
And inevitably, they disappoint me because I can figure out that all they're counting is the number of different types of characters.
Seriously, though, tell me: would you more readily guess this password:
P@$$w0rd
or this password:
iiiiniiiiniiiiniiiin
Alternatively, which one would be easier to attack?
those are both terrible passwords
I think I am going to call "p@$$w0rd" (or the associated "P@$$w0rd" for ones that require capital letters) the "password strength indicator strength indicator".
I recall seeing an actually decent password strength meter somewhere, but I forget where now.
Nope. Too many characters.
I tried my password strength indicator strength indicator on it.
> enter p@$$w0rd
> Very weak - Please enter a stronger password.
Okay, I am satisfied.
Also it seems to check whether your password is a chain of dictionary-lookupable words.
At least 1 lowercase letter
At least 1 uppercase letter
At least 1 number
"FuckYou2" works
Let's just mock the questions this time:
Question 1 (out of 10): A strong password protects your computer. It is a complex set of characters that makes it difficult for someone to steal or guess. Which one of the following is
a strong passworda password you can't freaking remember for the life of you:* Administrator
* One234
* My Account
* $jelF2bb
* My dog's name
Question 2 (out of 10): TRUE or FALSE: The University’s Responsible Use of Computing policy (#1301) addresses the action of trying to
use someone else's accountpretend to be a competent POTUS while named Donald J. Trump.True
False
Question 3 (out of 10): A security risk is software that appears to perform desirable functions, but in fact, steals information or harms your computer. If you have priviledges, where you can load programs on your computer, you have to be extra cautious. It is important to know the source of a program before you install it because:
* It has to be made in the last
yearepoch.* It has to come from
a friendly countryRussia, with love.* It has to come from
a source you know about, rather than from a strange or unknown siteyour good ol' friend Vladimir Putin.* It has to have pictures of your ex-wife.
Question 4 (out of 10): Phishing is a way of acquiring your sensitive information electronically by trying to look like it is from a trusted source or well known company. Which of these is an example of phishing?
* A "no action required" communication from a reliable source.
* An e-mail or pop-up from
"Your IT Help Desk Office""Definitely Not Satan" asking forpersonal account informationfirst-born child's soul.* A reminder to complete your time sheet.
* A web site for a seafood restaurant.
Question 5 (out of 10): A phishing scam will employ deceptive means to obtain your sensitive information. If you respond to a phishing attack, you could be opening the door to:
*
Viruses (like malware) that will infect my computerAsbetos and mercury*
Substantial financial lossPink elephants*
Credit damageThat one guy who lives next door and won't ever shut up about his pet political issue* All of the above
Question 6 (out of 10): Of the following choices, which indicates when it is safe to open a file attached to an e-mail?
* When I know the sender, the attachment is expected, and it is not unusual in any way except for the fact that a bouquet of flowers has materialized on your desk upon reading the e-mail.
* When the strange e-mail
is only sent to me (and not a group)encourages you to have a live chat with a paramilitary recruiter somewhere in the deserts of Syria or Iraq.* When the attachment
is not an .exe or .comlooks like a gerrymandered congressional district.* When the sender is
a friend of a friend, but not someone I know personallySteve Bannon.Question 7 (out of 10): Hackers are constantly using malicious computer viruses and worms to search for unprotected computers to infect or compromise. Hackers can gain access to uprotected computers quickly. On average, how long does it take for an unprotected networked computer to be compromised once it is connected to the internet?
* 1
monthmealtime* Almost immediately
* 10
hoursparsecs* 7 business days
Question 8 (out of 10): Which of the following is true regarding mobile devices such as smartphones? (Choose two)
* Mobile devices are not susceptible to
viruses or other malwarethe force of gravity.* Mobile devices may contain
sensitive informationants.* The small size of mobile devices makes them a good target for
theftsnipers practicing headshots.* It is not necessary to
apply patches to the operating system of mobile devicesinb4 Central Avenue.Question 9 (out of 10): Information technology security means protecting information and computers from unauthorized access, use, disclosure, disruption, or modification. TRUE or FALSE: Information technology security is primarily a technology issue and has nothing to do with my behavior, it is entirely the fault of Sean Spicer.
* True.
* False. IT Security is
everyone'smonkey business.Question 10 (out of 10): When connecting your computer to Mason's wireless network you should: (Choose 2)
* Feel secure enough to send sensitive and confidential data, such as my social security number, credit card information, or password(s)
with out any otherwhile not wearing protection.* Lose sleep wondering whether using wireless access will allow strangers to
login to my computer and the data stored on my hard drivedownload all my country's nuclear secrets.* Enjoy the freedom of connecting to the Internet without hassling with
cablescarrier pigeons and/orconcern that Mason will be billing my account for this special servicesmoke signals.* Use encryption technology when transmitting to protect my data from being exposed to Russian hackers.
i wonder if the desktop version looks fine now
okay
previously
This quote.
It had div and/div tags surrounding the second and third lines (in addition to br), and I think a div tag opening the fourth line; I don't remember whether the last one was closed.
I removed the div tags. That was all I did. I'm amazed that that pea bugged this forum princess.
@Anonus, did you change something else?