Results 1 to 10 of 106

Hybrid View

  1. #1
    Player
    Sylve's Avatar
    Join Date
    Aug 2013
    Posts
    1,679
    Character
    Lyote Sharaia
    World
    Hyperion
    Main Class
    Sage Lv 90
    Quote Originally Posted by Animation View Post
    I was typing out a reply about how people get hacked but I'm not going to bother. I'm currently lodestoning people with normal names and if there account seems somewhat decent then I'll unblacklist it.
    Getting hacked is pretty pathetic in this time and age, I mean security on stuff is so high the only thing I can think of is a) Virus from downloading bots or buying gold or b) Very, very weak password.

    It's nice to see you apologizing though, I do wish you'll take more precaution in the future.
    To be fair, 'hacking' these days is done via bots that run every combination of letters and numbers currently usable by computers, doesn't matter how 'strong' your password is, its only a matter of time before a bot comes up with the right string to let it in.
    (0)

  2. #2
    Player
    Sovereign's Avatar
    Join Date
    Mar 2011
    Location
    Ul'dah
    Posts
    155
    Character
    Ico Sovereign
    World
    Hyperion
    Main Class
    Black Mage Lv 70
    Quote Originally Posted by Sylve View Post
    To be fair, 'hacking' these days is done via bots that run every combination of letters and numbers currently usable by computers, doesn't matter how 'strong' your password is, its only a matter of time before a bot comes up with the right string to let it in.
    Which is why security tokens and account lockouts (say after 5 wrong guesses) are a good idea.
    (0)
    Ico Dailemont @ Hyperion (formerly Durandal (formerly Rabanastre))

  3. #3
    Player
    Sylve's Avatar
    Join Date
    Aug 2013
    Posts
    1,679
    Character
    Lyote Sharaia
    World
    Hyperion
    Main Class
    Sage Lv 90
    Quote Originally Posted by Sovereign View Post
    Which is why security tokens and account lockouts (say after 5 wrong guesses) are a good idea.
    But they're not perfect. Which is all I'm saying. You can be the safest guy in the world with strong AV, tokens and stupid long passwords changed daily, but you'll still get done in by a determined hacker. Just a matter of time.
    I still think using Email addresses for Usernames was a bad bad idea. Usernames or logins were literally an extra password a potential hackbot needed to get right.
    @Rydin,
    No, maybe they're not brute forcing *all* the accounts, but i would wager many accounts are lost to it.
    (0)

  4. #4
    Player
    moody's Avatar
    Join Date
    Aug 2013
    Posts
    28
    Character
    Singing Vein
    World
    Balmung
    Main Class
    Arcanist Lv 46
    Quote Originally Posted by Spoolx View Post
    Lots of us were banned for RMT spam because our accounts were hacked, eventually we will be back online. My request is that you frequently clear your blacklist, especially if the name is a normal name and not just a jumble of characters.
    There is no point keeping these names on your blacklist because they all get banned quick so you shouldn't see that name ever spam again.

    The problem is that the name generator also generates realistic names. While I feel sorry for you that your account was compromised, I'm more than willing to take the chance that I've blacklisted 6 real players if it blocks 30+ gil sellers.

    Quote Originally Posted by Pandemonium View Post
    You (and many others) seem to forget phishing and how rife that is.

    You can't blame people for being gullible and falling for a phishing scam, then following the dodgy links and entering crucial information. These people are clearly legit players, if a little on the dim witted side - they don't all deserve to be written off as "RMT/Botting scum - you deserve my /blist!"
    Yes, I can blame them. It's easy. [x] didn't bother looking at links before entering information no company should need to ask for. That would be their fault. I'm totally blaming them.



    Quote Originally Posted by Sylve View Post
    But they're not perfect. Which is all I'm saying. You can be the safest guy in the world with strong AV, tokens and stupid long passwords changed daily, but you'll still get done in by a determined hacker. Just a matter of time.
    I still think using Email addresses for Usernames was a bad bad idea. Usernames or logins were literally an extra password a potential hackbot needed to get right.
    @Rydin,
    No, maybe they're not brute forcing *all* the accounts, but i would wager many accounts are lost to it.

    The reason brute force attacks are not reliably effective is that you can put a time sensitive authentication code on the account. If you're performing a brute force attack against an account with an even reasonably secure non-dictionary password the authenticator code should change before a Brute Force can reasonably work out that combination.
    (0)

  5. #5
    Player
    Rydin's Avatar
    Join Date
    Mar 2011
    Location
    Gridania
    Posts
    2,821
    Character
    Nyris Reach
    World
    Jenova
    Main Class
    Lancer Lv 50
    Quote Originally Posted by Sylve View Post
    To be fair, 'hacking' these days is done via bots that run every combination of letters and numbers currently usable by computers, doesn't matter how 'strong' your password is, its only a matter of time before a bot comes up with the right string to let it in.
    I don't think they're brute force hacking peoples accounts... thats so inefficient...
    (0)