RE: WiFi + web based Login + Sniffer + Security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



At 00:32 10/13/2003, you wrote:
AFAIK / can tell, I can see the username from ethereal capture, but as I
mentioned, the password is hashed or something.

All your questions about this particular username/password combo are related to Yahoo!. How it's hashed, when, etc. are all things dictated by how Yahoo! wrote their web pages. Not being a user of their service, I cannot comment. POP user/pass data should go by in the clear, for example.


So.. basically, the login name will be visible, and the password will be
hashed. How easy would it be to decode the hash? What sort of algo does it
use to hash it? What stipulates whether it uses MD5/blowfish etc..etc..
(frankly I have no idea, just throwing out some algo I know/heard about)

All Yahoo!-specific questions in this case.


SSH tunnel is okay for implementation for my home, but for a public
eg:T-Mobile hotspot, how would one go about it? Don't check pop mail there??

In any case where I'm not at my own computer, I check mail using webmail over SSL, typically Squirrelmail which is my favorite. That way I know my data goes over the Internet strongly encrypted.


>>Thanks for trimming; much easier this time to write back and much easier
to

Actually, I thought that cutting and pasting whatever I was replying to was
adequate. So.. I guess it's not.. :)

Basically it is... I don't mean to make things sound like there is One Right Way to do things. In effect, a Linux saying: TIMTOWTDI means to remember that "There Is More Than One Way To Do It" usually.


If you keep text from earlier messages that helps provide context, that's OK. If you delete unnecessary text from earlier messages, that's great. You are sort of expected not to leave four or five list signatures lying around the bottom of your message. It's all basically about common sense and making your messages easier to read (which means more people will read them and you will have more of a chance that someone will answer them). It is also about courtesy to others since many people still pay for traffic and many connect on dial-up. This means that every extra line you leave in costs someone money, and costs everyone time. Wasting everyone's time and money is not a nice thing to do, which is why you see people who repost an entire digest getting flamed hard.

Don't worry too much about it... there are no hard-and-fast rules (although I think "short, sweet, and to the point" comes close to being a rule, IMHO).


-- Rodolfo J. Paiz rpaiz@xxxxxxxxxxxxxx


-- Shrike-list mailing list Shrike-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/shrike-list

[Index of Archives]     [Fedora Users]     [Centos Users]     [Kernel Development]     [Red Hat Install]     [Red Hat Watch]     [Red Hat Development]     [Red Hat Phoebe Beta]     [Yosemite Forum]     [Fedora Discussion]     [Gimp]     [Stuff]     [Yosemite News]

  Powered by Linux