On 01/08/2019 02:09 PM, allison via cctalk wrote:
Its actually funny. The password given is three yahoo (groups) hacks ago (about 10 years) but the email address used was a public one way reflector (arrl.net).
So you are (or were) a licensed ham. 73 to you. :-)
So all and all its a crude phishing attempt. I write down old passwords to keep from reuse and I use long mixed ones. So I know it was from that and meaningless.
Hopefully you keep that list in a way that's not cleartext on your computer. I too have lists of old passwords in my password vault.
The source is useless as the address is a bogus hack as well.
I'm still curious. Mainly because I run my own mail server and wonder if the messages would have been stopped by my filtering.
Same claims of rude and crude caught off the camera save for the systems use never had one or are blocked/disconnected(laptops) and at best a stupid threat. I run linux on multiple flavors/platforms so typical M$ hacks don't fly either.
Scare tactics.
I was tempted to buy the smallest bitcoin possible maybe 0.1 cent (1 milliDollar) for laughs and send that as they deserve the very least for a dumb hack.
I would avoid doing anything good to the miscreants.
Ignore the phoolz and if the password matches current change it.
Yep.
consider changing them periodically.
I thought there had been some research and reports, particularly from NIST (?) about a year ago where /forced/ periodic password changes were actually a bad thing.
-- Grant. . . . unix || die
