Received: from nobody by stodi.digitalkingdom.org with local (Exim 4.92) (envelope-from ) id 1kIa4d-0005S7-6M for lojban-newreal@lojban.org; Wed, 16 Sep 2020 09:14:23 -0700 Received: from crayon.drlarrygolf.com ([64.31.24.60]:51381) by stodi.digitalkingdom.org with esmtp (Exim 4.92) (envelope-from ) id 1kIa4b-0005QZ-1u for lojban@lojban.org; Wed, 16 Sep 2020 09:14:22 -0700 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=g6seey; d=drlarrygolf.com; h=To:Subject:Reply-To:MIME-Version:From:Message-ID:Content-Type:Date; i=kn95@drlarrygolf.com; bh=nGQIiQKPPY2T+NpYFWN5NO+Nfx0=; b=G/Q4jxaQbpN9O59GVGi6DiuvtZh+ZJJT7gzOxjBomC0jbsG4M+fpyXGk3MaicIQIf6PHWym0MSwW xffT1pgV8/CEYmy5pt778Kw3uO+5WbIiDvSmvHhuxMtJXAw9jetjjWyUWQufMj7/K9Ivd7AvT95Z W4lPsJZacZ1AmUs3KpY= To: lojban@lojban.org Subject: =?UTF-8?B?TmVlZCBhIG1hc2s/IEtOOTUgZmlsdGVyIG1hc2tzIGF2YWlsYWJsZSBub3c=?= Reply-To: kn95@drlarrygolf.com MIME-Version: 1.0 From: KN95 Message-ID: <0482423469.eUeV6vTRF53OQwxZysSSeISxp.216783994874870787402784011.Vji3VfONJw5vuXph7u5E0Znq.ujJgZzSy9GLI9uxkecym@crayon.drlarrygolf.com> Content-Type: multipart/alternative; boundary="00027487899702369406=qIuY7Fk=?" Date: Wed, 16 Sep 2020 12:14:22 -0400 X-Spam-Score: 3.5 (+++) X-Spam_score: 3.5 X-Spam_score_int: 35 X-Spam_bar: +++ X-Spam-Report: Spam detection software, running on the system "stodi.digitalkingdom.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Lojban I can bring these over tomorrow, how does that sound? selection, it?s managing people like istant, managing player egos, making sure there is continuous development throughout the organization [...] Content analysis details: (3.5 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60% [score: 0.5000] 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: drlarrygolf.com] -0.0 SPF_PASS SPF: sender matches SPF record -0.0 SPF_HELO_PASS SPF: HELO matches SPF record 0.0 HTML_FONT_LOW_CONTRAST BODY: HTML font color similar or identical to background 0.0 HTML_MESSAGE BODY: HTML included in message -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 2.9 HTML_TAG_BALANCE_CENTER Malformatted HTML 0.0 T_REMOTE_IMAGE Message contains an external image --00027487899702369406=qIuY7Fk=? Content-type: text/plain; charset="UTF-8" Content-transfer-encoding: 8bit Lojban I can bring these over tomorrow, how does that sound? selection, it?s managing people like istant, managing player egos, making sure there is continuous development throughout the organization for the future when players leave, it?s rallying a fan base and chatting with the media, etc etc there?s more than just drawing up plays ok http://www.drlarrygolf.com/police-academy/movies pword is no more secure than an all lowercase letter one. in fact, it?s less secure as the last two digits are already quickly umed. just slap an authenticator on everything. problem solved. while having a complex pword is always good to have, there are still some things people should know. - brute force attacks are not the only vulnerability for pwords. there are other ways hackers can gain pwords. one of the standard methods of hacking is a dictionary attack. dictionary attacks use words from the dictionary to try and guess pwords. dictionary attacks limit guesses to a reasonable number to be processed, so try not to use words in your pwords. - pwords usually get out by a data leak (a breach in security for a website/company). the most famous data breach was when yahoo had 3 billion accounts leaked back in 2013. hackers can use the combinations of pwords and usernames gained from the breaches for other websites, so never use the same pwords. - websites with captchas and multiple pword attempt protection slow down hackers but are not fully protecting you. there are ways to get around these systems, and it?s effortless if you know what you are doing. -brute forcing will continue to evolve and become way faster than before. the processing speed of brute-forcing pwords is going to grow over time as technology evolves. don?t think that you are safe because ?according to this chart, it will take 715 billion years to crack my pword? - in the future; this may be a few seconds now do it again with 2 factor auth my original work pword was a pword i use only for things i most definitely wouldn't want hacked. contains no dictionary words, viewed it would appear to be nothing more than http://home.drlarrygolf.com/award-winning/films composition bolero rylynn - andy mckee sunrise - coldplay 1979 by the smashing pumpkins y'all might laugh. but dead serious, concerning hobbits by howard shore makes me feel everything hallelujah - love the buckley version but the jai jagdeesh version is amazing lost stars - --00027487899702369406=qIuY7Fk=? Content-Type: text/html; charset="UTF-8" Content-transfer-encoding: 8bit Todays News
Lojban I can bring these over tomorrow, how does that sound? selection, it?s managing people like istant, managing player egos, making sure there is continuous development throughout the organization for the future when players leave, it?s rallying a fan base and chatting with the media, etc etc there?s more than just drawing up plays ok
pword is no more secure than an all lowercase letter one. in fact, it?s less secure as the last two digits are already quickly umed. just slap an authenticator on everything. problem solved. while having a complex pword is always good to have, there are still some things people should know. - brute force attacks are not the only vulnerability for pwords. there are other ways hackers can gain pwords. one of the standard methods of hacking is a dictionary attack. dictionary attacks use words from the dictionary to try and guess pwords. dictionary attacks limit guesses to a reasonable number to be processed, so try not to use words in your pwords. - pwords usually get out by a data leak (a breach in security for a website/company). the most famous data breach was when yahoo had 3 billion accounts leaked back in 2013. hackers can use the combinations of pwords and usernames gained from the breaches for other websites, so never use the same pwords. - websites with captchas and multiple pword attempt protection slow down hackers but are not fully protecting you. there are ways to get around these systems, and it?s effortless if you know what you are doing. -brute forcing will continue to evolve and become way faster than before. the processing speed of brute-forcing pwords is going to grow over time as technology evolves. don?t think that you are safe because ?according to this chart, it will take 715 billion years to crack my pword? - in the future; this may be a few seconds now do it again with 2 factor auth my original work pword was a pword i use only for things i most definitely wouldn't want hacked. contains no dictionary words, viewed it would appear to be nothing more than
















composition bolero rylynn - andy mckee sunrise - coldplay 1979 by the smashing pumpkins y'all might laugh. but dead serious, concerning hobbits by howard shore makes me feel everything hallelujah - love the buckley version but the jai jagdeesh version is amazing lost stars -
--00027487899702369406=qIuY7Fk=?--