As well as changing your password, which I think should be done as a
matter of course, I would suggest also changing your onrev contact email
if you can. Ideally it should be a new one only used as contact email
for that account and maybe redirected to a real mailbox.
This is because there is
Le 12 juil. 2011 à 11:05, Martin Baxter a écrit :
The weakest link is in-between the chair and the keyboard and,
unfortunately, cannot easily be upgraded or patched. ;-)
No, but, (un)fortunately it is initialized from time to time... ;-) or :-(
Bon souvenir de Paris
René
Ik ben helemaal gerustgesteld. Fijne vakantie. Arie
Verstuurd vanaf mijn iPad
Op 12 jul. 2011 om 17:19 heeft Peter Brigham MD pmb...@gmail.com het volgende
geschreven:
On Jul 11, 2011, at 5:12 PM, Andre Garzia wrote:
On Mon, Jul 11, 2011 at 5:37 PM, Pierre Sahores psaho...@free.fr wrote:
I did too, but I got the message. Thankfully, all the info I have there is in
an SQL database with bogus information. The best counter intel is bad. :-)
Bob
On Jul 11, 2011, at 8:03 AM, Michael Kann wrote:
Mike,
You make a good point. I bought the lifetime membership so perhaps my info is
For the record, I have a password philosophy that has served me well. I have
one set of credentials I use for local logons, like computer accounts and file
servers. I have a second set for anything that accesses the internet, but does
not contain information that can hurt me. I have a third set
I tried to upgrade me once. I crashed. Had to flash the bios to the original
firmware. It hurt.
Bob
On Jul 12, 2011, at 2:05 AM, Martin Baxter wrote:
The weakest link is in-between the chair and the keyboard and,
unfortunately, cannot easily be upgraded or patched. ;-)
Martin Baxter
Le 12 juil. 2011 à 19:58, Bob Sneidar a écrit :
For the record, I have a password philosophy that has served me well. I have
one set of credentials I use for local logons, like computer accounts and
file servers. I have a second set for anything that accesses the internet,
but does not
Whilst we're sharing tips, I've been using 1Password from http://agilebits.com/
across my Macs and iPhone devices for a few years, recently adding their PC
version for my Parallels virtual PCs (no Linux, except web servers).
All my passwords are unique - I use 1Password's inbuilt generator and
On 12/07/2011 18:58, Bob Sneidar wrote:
For the record, I have a password philosophy that has served me well. I have
one set of credentials I use for local logons, like computer accounts and file
servers. I have a second set for anything that accesses the internet, but does
not contain
Hello everyone,
Have any of you received this message from Heather? Implications?
Gregory
Dear Gregory Lypny,
I need to inform you that over the weekend we experienced an attack on our
customer database. Although we caught this very quickly I regret that some
information may have been
I did too...
Le 11 juil. 2011 à 15:34, Gregory Lypny a écrit :
Hello everyone,
Have any of you received this message from Heather? Implications?
Gregory
Dear Gregory Lypny,
___
use-livecode mailing list
use-livecode@lists.runrev.com
Yes, I changed my password... in case...
Le 11 juil. 2011 à 15:34, Gregory Lypny a écrit :
Hello everyone,
Have any of you received this message from Heather? Implications?
Gregory
Dear Gregory Lypny,
I need to inform you that over the weekend we experienced an attack on our
Not yet I haven't, which is curious to me.
--
On the first day, God created the heavens and the Earth
On the second day, God created the oceans.
On the third day, God put the animals on hold for a few hours,
and did a little diving.
And God said, This is good.
Mike,
Not everyone's data got hacked.
Mike
--- On Mon, 7/11/11, Mike Kerner mikeker...@roadrunner.com wrote:
From: Mike Kerner mikeker...@roadrunner.com
Subject: Re: Rev Customer Databased Hacked?
To: How to use LiveCode use-livecode@lists.runrev.com
Date: Monday, July 11, 2011, 9:08 AM
Not yet
So that doesn't strike you as curious, Mike? Think about it. It doesn't
make you wonder what the structure is if some customers have their records
compromised but others do not?
--
On the first day, God created the heavens and the Earth
On the second day, God created the oceans.
On the third
...@roadrunner.com
Subject: Re: Rev Customer Databased Hacked?
To: How to use LiveCode use-livecode@lists.runrev.com
Date: Monday, July 11, 2011, 9:44 AM
So that doesn't strike you as curious, Mike? Think about it. It doesn't
make you wonder what the structure is if some customers have their records
On 07/11/2011 05:44 PM, Mike Kerner wrote:
So that doesn't strike you as curious, Mike? Think about it. It doesn't
make you wonder what the structure is if some customers have their records
compromised but others do not?
I wonder if RunRev don't have 2 databases (say, an older one with
I think it's more likely that someone found a way to query user information
from the database, and started doing so, probably with some automation. The
culprit was noticed by the unusual activity before they hit on every record
in the DB.
It's highly unlikely that someone managed to just download
On Mon, Jul 11, 2011 at 10:44 AM, Mike Kerner mikeker...@roadrunner.comwrote:
So that doesn't strike you as curious, Mike? Think about it. It doesn't
make you wonder what the structure is if some customers have their records
compromised but others do not?
The original poster did not
I would just like to say that I haven't been an On-Rev customer for over a
year now, and I want to thank the Rev team for still including me in this
email (so, yes, I got one, too).
Jeff M.
___
use-livecode mailing list
use-livecode@lists.runrev.com
and now my password is 127.5 characters long...
OK, I am not that paranoid, but I did make a change for On-Rev
(and the On-Rev forums just in case, even though it is a separate
entity. No need to have spam hit that server require the moderators
to do extra work.)
Jim Ault
Las Vegas
On Jul
Michael Kann wrote:
I was more concerned that any data was obtainable from the outside
at all.
A concern, but not a surprise, given the range of software components
that comprise modern web apps. I think it speaks well of the RunRev
that passwords weren't compromised.
Oddly enough I was
On 7/11/11 9:44 AM, Mike Kerner wrote:
So that doesn't strike you as curious, Mike? Think about it. It doesn't
make you wonder what the structure is if some customers have their records
compromised but others do not?
It may be significant that not all accounts are on the same server.
--
I am an On-Rev lifetime subscriber but don't recall getting this message. So
it must be something else, I guess.
On Jul 11, 2011, at 11:25 AM, Bob Sneidar wrote:
I have received it. It's probably legit. I don't see any links to a site to
authenticate, so what would anyone gain by telling
I feel deprived, unloved and generally rejected because I didn't receive
the Hacked e-mail.
Har, har, har.
Bl**dy glad I didn't get it; but reading this thread it does have a
feling of
bruised egos who weere not included.
Now I remember a lecture on that psychological phemenon at Durham
Folks,
I am speculating here but if the attacker just go some of the accounts then
it is possible that the attacker hacked into some of the on-rev servers but
not all of them, then, just the users on those machines were compromissed. I
did not change my password, I am still deciding if I will do
Not bruised egos, Richmond--at least not in my case. Simply concern about
whether I was one of the intended recipients of the email but did not receive
it for sometime. I would rather NOT change my password but will if I have to.
On Jul 11, 2011, at 11:50 AM, Richmond Mathewson wrote:
I
On 07/11/2011 08:13 PM, Marian Petrides wrote:
Not bruised egos, Richmond--at least not in my case. Simply concern about
whether I was one of the intended recipients of the email but did not receive
it for sometime. I would rather NOT change my password but will if I have to.
I wonder what
On 7/11/11 12:13 PM, Marian Petrides wrote:
Not bruised egos, Richmond--at least not in my case. Simply concern
about whether I was one of the intended recipients of the email but
did not receive it for sometime. I would rather NOT change my
password but will if I have to.
The info was sent
On Jul 11, 2011, at 10:31 AM, J. Landman Gay wrote:
The info was sent out about 11 AM UK time. I think if you haven't received it
by now, you were not affected. Passwords were not obtained, so if the
affected people are using good passwords, I don't see any reason to change
them. I'm not
An useful link to check our n-tier stuffs against those 25 rules ! Thanks
Richard.
Pierre
Le 11 juil. 2011 à 17:48, Richard Gaskin a écrit :
Michael Kann wrote:
I was more concerned that any data was obtainable from the outside
at all.
A concern, but not a surprise, given the range
by dictionary/brute force, should the hacker try in the
future to use the list of usernames to find a weak nut to crack.
--
View this message in context:
http://runtime-revolution.278305.n4.nabble.com/Rev-Customer-Databased-Hacked-tp3659552p3660677.html
Sent from the Revolution - User mailing list
haven't thought about brute force attacks
--
View this message in context:
http://runtime-revolution.278305.n4.nabble.com/Rev-Customer-Databased-Hacked-tp3659552p3660677.html
Sent from the Revolution - User mailing list archive at Nabble.com
I changed all mine, even if they went in theory full safe. It's realy best for
all of us to verify that our passwords are at least trusted as 100% safe by the
cPanel AJAX tester. Any mix of letters, numbers and itemdels are always more
trusty than only letters + numbers ;-)
Best, Pierre
Début
On Mon, Jul 11, 2011 at 5:37 PM, Pierre Sahores psaho...@free.fr wrote:
I changed all mine, even if they went in theory full safe. It's realy best
for all of us to verify that our passwords are at least trusted as 100% safe
by the cPanel AJAX tester. Any mix of letters, numbers and itemdels
Same here.
Terry...
On 12/07/2011, at 1:44 AM, Jeff Massung mass...@gmail.com wrote:
I would just like to say that I haven't been an On-Rev customer for over a
year now, and I want to thank the Rev team for still including me in this
email (so, yes, I got one, too).
Jeff M.
36 matches
Mail list logo