On Mon, 2024-01-22 at 15:50 -0700, Joe Zeff wrote:
> Well, I am a BOFH, you know. Letting him find out the hard way was the
> easiest way to get rid of the git, especially when you consider that the
> tech he connects to when he calls back to clean up his mess won't be
> anywhere near as experi
On 01/22/2024 01:47 PM, Tim via users wrote:
I remember trying that out on Win98SE, just within a LAN. Gawd, it was
a pain. And I'm sure it was full of buffer overflows, like all
Microsoft products.
Well, I am a BOFH, you know. Letting him find out the hard way was the
easiest way to get ri
On Mon, 2024-01-22 at 09:57 -0700, Joe Zeff wrote:
> Back around the turn of the Millenium, I had a caller who wanted to know
> if he could use MS Home Web Server (I think it was) to set up a
> website. (If you have to ask, you probably shouldn't be doing it.) I
> tried to explain the risks, b
On Mon, 2024-01-22 at 09:49 -0700, Joe Zeff wrote:
>
> On 1/22/24 00:30, Tim via users wrote:
> > Then, when it went haywire one day I had to tell telephone support
> > the
> > password to sort things out. Embarrassing, and quite satisfying at
> > the
> > same time.
>
> When I was doing tech sup
On 1/22/24 04:49, Tim via users wrote:
I'm sure it would have been cheaper to have designed their security
better, in the first place. They probably spend more on their
advertising budget than IT, so it's not like they can't afford it.
Back around the turn of the Millenium, I had a caller wh
On 1/22/24 00:30, Tim via users wrote:
Then, when it went haywire one day I had to tell telephone support the
password to sort things out. Embarrassing, and quite satisfying at the
same time.
When I was doing tech support, the ID10Ts in IT decided to make our
passwords expire after 60 days o
On Mon, 2024-01-22 at 00:02 -0800, ToddAndMargo via users wrote:
> Add to injury, if they get hacked and they pencil
> whipped, they become responsible for all costs
> involved. Telling them that their grandchildren
> will need lawyers does not phase them.
You would think that "you hate your legal
On 1/21/24 23:30, Tim via users wrote:
On Sun, 2024-01-21 at 16:39 -0800, ToddAndMargo via users wrote:
I needed a password eight characters long
I picked "Snow White and the Seven Dwarfs".
Okay, that was a "Dad Joke" but it probably is a really
strong password and easy to remember. I recommen
On Sun, 2024-01-21 at 16:39 -0800, ToddAndMargo via users wrote:
> I needed a password eight characters long
> I picked "Snow White and the Seven Dwarfs".
>
> Okay, that was a "Dad Joke" but it probably is a really
> strong password and easy to remember. I recommend run on
> phrases to my custome
On 1/21/24 17:39, ToddAndMargo via users wrote:
Okay, that was a "Dad Joke" but it probably is a really
strong password and easy to remember. I recommend run on
phrases to my customers. When I make them up for them,
I often use a phrase that flatters their business.
Those they never forget.
On 1/21/24 06:22, Jeffrey Walton wrote:
On Sun, Jan 21, 2024 at 6:31 AM Tim via users
wrote:
On Sun, 2024-01-21 at 02:56 -0800, ToddAndMargo via users wrote:
This all goes back to using easy passwords. And the
same passwords on different sites:
https://www.nist.gov/itl/smallbusinesscyber/gu
On Sun, Jan 21, 2024 at 6:31 AM Tim via users
wrote:
>
> On Sun, 2024-01-21 at 02:56 -0800, ToddAndMargo via users wrote:
> > This all goes back to using easy passwords. And the
> > same passwords on different sites:
> >
> > https://www.nist.gov/itl/smallbusinesscyber/guidance-topic/multi-factor-
ToddAndMargo via users wrote:
>> Multi-Factor Authentication is a technique to try to get around
>> the users response to the obnoxious nature of passwords.
>> Whether or not it improves things or just manages to
>> further annoy the poop out of the users is up for debate.
& this:
> Certain people
On Sun, 2024-01-21 at 02:56 -0800, ToddAndMargo via users wrote:
> This all goes back to using easy passwords. And the
> same passwords on different sites:
>
> https://www.nist.gov/itl/smallbusinesscyber/guidance-topic/multi-factor-authentication
>
> "In fact, databases of known breached a
On 1/21/24 02:56, ToddAndMargo via users wrote:
Multi-Factor Authentication is a technique to try to get around
the users response to the obnoxious nature of passwords.
Whether or not it improves things or just manages to
further annoy the poop out of the users is up for debate.
Certain people
On 1/20/24 22:52, Tim via users wrote:
On Sat, 2024-01-20 at 17:54 -0800, ToddAndMargo via users wrote:
c) Something you are, such as a biometric. This method
involves verification of characteristics inherent to the
individual, such as via retina scans, iris scans, fingerprint
scans, finger vein
On Sat, 2024-01-20 at 17:54 -0800, ToddAndMargo via users wrote:
> c) Something you are, such as a biometric. This method
> involves verification of characteristics inherent to the
> individual, such as via retina scans, iris scans, fingerprint
> scans, finger vein scans, facial recognition, voice
On Sat, 2024-01-20 at 22:08 +0100, Walter H. via users wrote:
> not really, because, the knowledge of user and password is somewhere else;
There are a lot of people who'll have an unsecured phone, because it's
a pain to them.
> so neither the person who stole your phone (the 2FA device) nor you a
On 1/20/24 13:08, Walter H. via users wrote:
On 20.01.2024 20:39, Tim via users wrote:
On Sat, 2024-01-20 at 20:00 +0100, Walter H. via users wrote:
buy an iPhone ...
exact this what you want is the other way of it sense;
2FA = 2 Factor Authentication
example you login on a site, there you h
On 20.01.2024 20:52, Chris Adams wrote:
Once upon a time, Tim said:
That's one of my gripes about two-factor authentication - it
(typically) uses your phone. Steal someone's phone, and it's
everything they need to pretend to be you.
That's going to be true of any second-factor device. In the
On 20.01.2024 20:39, Tim via users wrote:
On Sat, 2024-01-20 at 20:00 +0100, Walter H. via users wrote:
buy an iPhone ...
exact this what you want is the other way of it sense;
2FA = 2 Factor Authentication
example you login on a site, there you have the knowledge of
user and password
and t
Once upon a time, Tim said:
> That's one of my gripes about two-factor authentication - it
> (typically) uses your phone. Steal someone's phone, and it's
> everything they need to pretend to be you.
That's going to be true of any second-factor device. In theory, MFA is
"something you know plus
On Sat, 2024-01-20 at 20:00 +0100, Walter H. via users wrote:
> buy an iPhone ...
>
> exact this what you want is the other way of it sense;
>
> 2FA = 2 Factor Authentication
>
> example you login on a site, there you have the knowledge of
>
> user and password
>
> and then the 2nd factor, whi
On 17.01.2024 01:54, ToddAndMargo via users wrote:
On 1/16/24 15:44, Samuel Sieb wrote:
On 1/16/24 15:42, Samuel Sieb wrote:
On 1/16/24 14:58, ToddAndMargo via users wrote:
On 1/16/24 14:29, Barry wrote:
On 16 Jan 2024, at 20:43, ToddAndMargo via users
wrote:
"keysmith" looks like it is
I got a bit funny with sed
$ zbarimg /home/temp/Screenshot_2024-01-04_16-08-43.png | sed -e
's/.*?secret=//' -e 's/&.*//'
--
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fe
On 1/16/24 23:38, Samuel Sieb wrote:
On 1/16/24 23:06, ToddAndMargo via users wrote:
On 1/16/24 22:48, Samuel Sieb wrote:
On 1/16/24 21:38, ToddAndMargo via users wrote:
On 1/16/24 20:36, Samuel Sieb wrote:
I gave you detailed instructions on this in an earlier email.
But you only need to do
On 1/16/24 23:38, Samuel Sieb wrote:
On 1/16/24 23:06, ToddAndMargo via users wrote:
On 1/16/24 22:48, Samuel Sieb wrote:
On 1/16/24 21:38, ToddAndMargo via users wrote:
On 1/16/24 20:36, Samuel Sieb wrote:
I gave you detailed instructions on this in an earlier email.
But you only need to do
On 1/16/24 23:06, ToddAndMargo via users wrote:
On 1/16/24 22:48, Samuel Sieb wrote:
On 1/16/24 21:38, ToddAndMargo via users wrote:
On 1/16/24 20:36, Samuel Sieb wrote:
I gave you detailed instructions on this in an earlier email.
But you only need to do this once. Once it's setup, you don't
On 1/16/24 22:48, Samuel Sieb wrote:
On 1/16/24 21:38, ToddAndMargo via users wrote:
On 1/16/24 20:36, Samuel Sieb wrote:
I gave you detailed instructions on this in an earlier email.
But you only need to do this once. Once it's setup, you don't use the
QR code again. The program will keep gi
On 1/16/24 21:38, ToddAndMargo via users wrote:
On 1/16/24 20:36, Samuel Sieb wrote:
I gave you detailed instructions on this in an earlier email.
But you only need to do this once. Once it's setup, you don't use the
QR code again. The program will keep giving you those codes when you
need th
On 1/16/24 20:36, Samuel Sieb wrote:
On 1/16/24 16:54, ToddAndMargo via users wrote:
On 1/16/24 15:44, Samuel Sieb wrote:
On 1/16/24 15:42, Samuel Sieb wrote:
On 1/16/24 14:58, ToddAndMargo via users wrote:
On 1/16/24 14:29, Barry wrote:
On 16 Jan 2024, at 20:43, ToddAndMargo via users
w
On 1/16/24 20:36, ToddAndMargo via users wrote:
Found this:
ykocli is a front-end command line utility (actually, a bash script)
that places ykman obtained TOTP tokens into the CopyQ clipboard.
That is a program for working with the Yubikey hardware tokens.
--
_
On 1/16/24 01:18, ToddAndMargo via users wrote:
Hi All,
Fedora 39
I do not have a stinkin' smart phone.
I scanned a QR code to drive and read it with zbarimg.
(it is a security code so I doctored the result up a lot).
zbarimg Screenshot_2024-01-04_16-08-43.png
QR-Code:otpauth://abcd/efgh:123
On 1/16/24 16:54, ToddAndMargo via users wrote:
On 1/16/24 15:44, Samuel Sieb wrote:
On 1/16/24 15:42, Samuel Sieb wrote:
On 1/16/24 14:58, ToddAndMargo via users wrote:
On 1/16/24 14:29, Barry wrote:
On 16 Jan 2024, at 20:43, ToddAndMargo via users
wrote:
"keysmith" looks like it is "c
On 1/16/24 01:18, ToddAndMargo via users wrote:
Hi All,
Fedora 39
I do not have a stinkin' smart phone.
I scanned a QR code to drive and read it with zbarimg.
(it is a security code so I doctored the result up a lot).
zbarimg Screenshot_2024-01-04_16-08-43.png
QR-Code:otpauth://abcd/efgh:123
On 1/16/24 17:55, Todd Zullinger wrote:
ToddAndMargo via users wrote:
On 1/16/24 15:44, Samuel Sieb wrote:
On 1/16/24 15:42, Samuel Sieb wrote:
You are misunderstanding how this works. That QR code contains a
secret value that lets the OTP application generate the 6 digit
codes as needed. Th
ToddAndMargo via users wrote:
> On 1/16/24 15:44, Samuel Sieb wrote:
>> On 1/16/24 15:42, Samuel Sieb wrote:
>>> You are misunderstanding how this works. That QR code contains a
>>> secret value that lets the OTP application generate the 6 digit
>>> codes as needed. There is no actual code in the
On 1/16/24 15:44, Samuel Sieb wrote:
On 1/16/24 15:42, Samuel Sieb wrote:
On 1/16/24 14:58, ToddAndMargo via users wrote:
On 1/16/24 14:29, Barry wrote:
On 16 Jan 2024, at 20:43, ToddAndMargo via users
wrote:
"keysmith" looks like it is "creating" the things, not
reading them. Am I miss
On 1/16/24 15:42, Samuel Sieb wrote:
On 1/16/24 14:58, ToddAndMargo via users wrote:
On 1/16/24 14:29, Barry wrote:
On 16 Jan 2024, at 20:43, ToddAndMargo via users
wrote:
"keysmith" looks like it is "creating" the things, not
reading them. Am I missing something?
You mean creating the
On 1/16/24 14:58, ToddAndMargo via users wrote:
On 1/16/24 14:29, Barry wrote:
On 16 Jan 2024, at 20:43, ToddAndMargo via users
wrote:
"keysmith" looks like it is "creating" the things, not
reading them. Am I missing something?
You mean creating the 6 digit codes? Isn’t that the point?
On 1/16/24 14:29, Barry wrote:
On 16 Jan 2024, at 20:43, ToddAndMargo via users
wrote:
"keysmith" looks like it is "creating" the things, not
reading them. Am I missing something?
You mean creating the 6 digit codes? Isn’t that the point?
Barry
The opposite!
I want to decode the Rosh
> On 16 Jan 2024, at 20:43, ToddAndMargo via users
> wrote:
>
> "keysmith" looks like it is "creating" the things, not
> reading them. Am I missing something?
You mean creating the 6 digit codes? Isn’t that the point?
Barry
--
___
users mailing l
On 1/16/24 01:46, Samuel Sieb wrote:
On 1/16/24 01:18, ToddAndMargo via users wrote:
Fedora 39
I do not have a stinkin' smart phone.
I scanned a QR code to drive and read it with zbarimg.
(it is a security code so I doctored the result up a lot).
zbarimg Screenshot_2024-01-04_16-08-43.png
QR
> On 16 Jan 2024, at 10:00, Tim via users wrote:
>
> There is a structure to QR codes.
It is just error corrected encoded text.
But to be useful you needs the text to be recognisable.
Hence the use of URLs that you see the app offer.
Barry
--
___
us
On Tue, 2024-01-16 at 01:18 -0800, ToddAndMargo via users wrote:
> Fedora 39
>
> I do not have a stinkin' smart phone.
Me neither, I keep mine nice and clean. My friend has one that feels
like it's been slid along a public toilet floor.
Pet hate, some service that asks people to scan a QR code
On Tue, Jan 16, 2024 at 4:46 AM Samuel Sieb wrote:
>
> On 1/16/24 01:18, ToddAndMargo via users wrote:
> > Fedora 39
> >
> > I do not have a stinkin' smart phone.
> >
> > I scanned a QR code to drive and read it with zbarimg.
> > (it is a security code so I doctored the result up a lot).
> >
> > z
On 1/16/24 10:18, ToddAndMargo via users wrote:
Hi All,
Fedora 39
I do not have a stinkin' smart phone.
I scanned a QR code to drive and read it with zbarimg.
(it is a security code so I doctored the result up a lot).
zbarimg Screenshot_2024-01-04_16-08-43.png
QR-Code:otpauth://abcd/efgh:123
On Tue, Jan 16, 2024 at 4:19 AM ToddAndMargo via users
wrote:
>
> Hi All,
>
> Fedora 39
>
> I do not have a stinkin' smart phone.
>
> I scanned a QR code to drive and read it with zbarimg.
> (it is a security code so I doctored the result up a lot).
>
> zbarimg Screenshot_2024-01-04_16-08-43.png
>
On 1/16/24 01:18, ToddAndMargo via users wrote:
Fedora 39
I do not have a stinkin' smart phone.
I scanned a QR code to drive and read it with zbarimg.
(it is a security code so I doctored the result up a lot).
zbarimg Screenshot_2024-01-04_16-08-43.png
QR-Code:otpauth://abcd/efgh:123445566?se
49 matches
Mail list logo