All posts by admin

Pirate-bay, re-opening

For those who don't know The Pirate Bay, let's make a quick history. "The Pirate Bay" is a set of computer servers that allow peer-to-peer file exchange, that is, from one personal computer to another, wherever these two terminals are located in the world, and as long as they have access to the internet.

This is one of many sites that allow file sharing under the Bit Torrent protocol. But if it's so special, it's because it's the biggest, generating at its highest over 1 million connections a day.

What is the Bit Torrent?

Bit Torrent, invented in 2001 and first released in 2002, operates according to the following model: the division of files to download into different sectors, thus allowing each downloader to have something to exchange in return, on the same source file.

The story of Pirate Bay

The Pirate Bay was invented in 2003, in Sweden, and quickly became a key player in web downloading. Better still, with the Swedish constitution prohibiting any direct link between the government and the judicial institution, it took pressure from the powerful Motion Picture Association of the United States to force, under penalty of sanctions against Sweden, the police to enter the premises and seize the servers of The Pirate Bay, on 31 May 2006.

Because, of course, downloading non-rights-free files poses problems for the culture industry. The latter calculating there an impressive shortfall on films, music and other shows thus exchanged.

Pirate Bay survives despite everything

But despite the police raid, the server returned to duty two days later in the Netherlands. In the end, the servers returned to Sweden and The Pirate Bay was able to continue to operate. In fact, if there is no allow for the site to continue its activity, there is nothing in the law to prohibit it either.

Over the years, various states have targeted the site. In Sweden and Italy in particular. But in the face of ineffective laws, the cultural industry directly sought to sabotage Pirate Bay's trackers. The Swedish company has therefore sued, for this package, some of the biggest names in cultural production in the world, such as Paramount, EMI or Sony.

In the end, the four co-founders and managers of the site will be sentenced in 2009 to one year in prison and 2.7 million in damages, to be paid to the cultural industrialists. But the site will always continue to run, and its leaders reveal insolvent. More convictions will follow, but, year after year, and despite attacks from all sides, the site will continue to operate… Until December 9.

The police raided the premises again and seized the servers. The site is offline.


While Peter Sunde announces the likely end of the site, we see a countdown on the site. On February 1, the site officially reopened. However, it no longer stores files for a long time, and redirects queries to other Torrent links.

Now access an unlimited number of passwords:
href" >Download Password

Are we nearing the end of the password?

Microsoft is trying to stop passwords but this is not going to happen too soon. Since 2012, a reflection has been undertaken around the search for new ways of security that could replace the password. FIDO certification has been put in place to enhance the new systems proposed by the major players in new technologies, based on innovations that will make it possible to further secure customer accounts.


An alliance for optimal security

In order to qualify for FIDO certification, it is imperative to present a new manual including data security. Completely protective of hacking, this formula must be of a high technological level to deter cyber criminals.

Several ways have just appeared, making the password appear as belonging to the past because it is far too vulnerable. It is to be expected that new ways of operating its Internet operations and the use of its email accounts will soon be in the works.

Among those who have already obtained this certification, big names like Google and Samsung are among those who have already validated their proposals. At present, eighteen companies have managed to promote next-generation security mechanisms for their products and services.

Among them, Microsoft has been able to develop new solutions as well as PayPal, Mastercard or Bank of America. It is indeed important to think of new ways to put in place a high level of protection for all online transactions that are made by the millions every day.


The Apple model for a new type of security

Apple is not yet part of the group of those who have obtained FIDO certification. If it sounds odd for a company of this reputation, it is in fact a maneuver to impose the solution it has managed to develop. Accustomed to launching the best innovations, Apple wants its exclusive system to become the only benchmark for the future.

Given the importance of this change in the way new technologies are used, there is going to be a huge market in the field. Being able to sell its security model to all companies in the future would indeed be a master's operation that Apple would absolutely like to win.

While the password is still used today, the majority of large companies are already ready to move to a completely new world with a completely secure relationship when using each of its multimedia devices. It is certain that the password has shown its limits since hacking has continued to grow and lead to the hacking of many vital data.

FIDO certification seems to be in line with the future in the field since each proposal has been tested and approved due to its resistance to external attacks. Only Apple's method remains mysterious today even if it is seems to represent an interesting opportunity for the future with the introduction of quality protection.

Another recommended topic: What will be tomorrow's passwords?

Illustration source: Flickr.

Now access an unlimited number of passwords:
Download Password

Should the password indicator be trusted?

When registering on a site, the ability to verify the reliability of your password with an indicator is considered a way to be sure to take the necessary measures for its security. However, a Canadian study by Concordia University shows that the reliability of these measurement tools can be questioned. It will therefore be preferable to use other measures to find the best security code for each online account.

An indicator based on different criteria

The results of the study show that the most used sites do not show the same security rate for the same password (depending on the password policy). While some may appear insufficient, it is very satisfying for others. This problem can be confusing by making the user believe that their choice protects them when they are simply considered to be performing well against the criteria set up by each site. While some have good knowledge in the field, others are limited to basic settings, which explains such a large difference between them.

While some access code management methods apply the necessary precautions by indicating when the choice is too simple, that it contains whole words in the dictionary, so it is easily hackable, others are limited to offering an alphanumeric combination. For a user, it will be very difficult to know what the real potential of their way of entering a personal account is. This disparity will even lead some users to underestimate the problem and indicate a combination that is far too simple and puts them at risk.

End of color rankings?

This study showed that offering a degree of reliability using red, yellow and green did not really help the user. If red makes it clear that you have to think another way, the other two colors can be misinterpreted. A user may think that yellow is enough to ensure its safety or trust a green without knowing its true reliability.

The results were communicated to the various sites that did not meet the criteria in the field and many were surprised. Even if changes or deletions have been made, there is no guarantee that the new means put in place in this framework to participate in data protection are more effective than those that have been tested.

The Internet user faces his own responsibility

The conclusion of this Canadian study is particularly interesting because it refers to the fact that it is not possible to trust only a computer program set up to test its password. A forward reflection must be undertaken in order to propose the best possible combination according to its own confidence scale. When entering, the password should not only be a happy or easy-to-memorize set, but should act as a real shield.

Even if new features or advice are provided to combat hacking, it is always important to keep in mind that the methods of web pirates are evolving at the same time as protection techniques. If they appear to be inviolable at first, there is no guarantee that they will remain inviolable in the long term. Changing combinations often can be a way to guard against this type of risk because it will be much more difficult to access that user's content. Repeated attempts will be less likely to succeed.

Illustration source: Flickr.

Now access an unlimited number of passwords:
Download Password

Why not use the same password everywhere?

Use the same identifiers on all the sites you visit, why not? After all, it's simpler, recorded once and for all, and you don't waste time. except that…

The main risk

Let's imagine for a moment that a hacker discovers, for X reasons, a password from one of the sites we frequent. The first thing it will do is try it on all sites, including merchant sites.

It's even simpler. The passwords we enter are stored on servers. Not to mention hackers who manage to crack these servers, a simple manager of a single site, unscrupulous, will then have virtually access to all the services we frequent.

And yet, he has no hacking skills…

The secret in multiplicity

To minimize the risks, it is therefore necessary to multiply the passwords. The whole thing then remains to remember.

At this level, everyone has their own method, the followers of the work on memory will not notice them anywhere, others will write them on a sheet, well hidden in the home, others will still store them on a file itself protected by a password. So in the end, this one password is to remember.

Problems with piracy

The biggest risk is to think that there is nothing to steal from our PC, or that it cannot happen to us.
An Ebay account, PayPal, or even Facebook, once hacked, can cause big problems. It's equivalent to identity theft on the internet. And the consequences can sometimes be paid for for a long time.

We stayed on the blue card code model, which is used everywhere, for all services, in the same way. But encryption methods have no common measure when it comes to financial and banking institutions. When we enter our password, no electronic chip comes to protect us.

So, to avoid being hacked, it's better to multiply the passwords. The ideal is a different password per site requiring authentication. This seems to some to go against the comfort of use. But it is precisely to maintain this long-term comfort that it is important to be creative in authentication.

Because once the password is hacked, the loss of comfort in the use of internet services is huge. And then, an effort to memorize, it exercises the brain, the only part of the body that wears out only by inactivity.

Now access an unlimited number of passwords:
Download Password

The 5 most common passwords and why not use them?

If access to different services on the Internet is governed by the registration of a password, noted by the user, it is because these services contain private or even intimate data. The ideal is to be able to invent, and retain, a different password for each service. And, moreover, it should be renewed quite often.

The most common passwords

Outside, far from all this, internet service users almost always use the same password for all the services on which it goes. And worse, they are all too often childishly simple. As proof, the five most used passwords in the world are also the easiest to find. It makes sense, one might say, a complicated password is also complicated to remember. But from there use to use passwords like:

  • 123456
  • Password
  • 12345678
  • Qwerty
  • abc123

And yet, it is these five passwords that are the most used on the world web. How do we know? Thanks to the pirates. It was by looking at files stolen by hackers, and containing tens of millions of passwords, that this conclusion could be made.

Don't skimp on safety

The question is: how can you imagine that the security of your online bank account is provided by "123456"? When we know that in most cases, the identifier is also the email address, it becomes very simple to hack files, both individuals and companies.

To secure your password, three rules;

  1. Avoid simple words or letters and numbers that follow each other on the keyboard;
  2. Playing with the case. That is to say mix capital letters and lower case, integrate bookmarks (dash, letter with accent…)
  3. A different password per service and as long as to do, changing from time to time.

Passwords to adopt

In order to more easily retain a password that would include tiny and capital numbers, bookmarks and letters, the best solution is to make a short sentence such as "MonChiena-5-year-olds" or "Monvéloà4roues" or "LePèrenoeldu93". While these passwords are easy to remember, they remain among the most difficult to crack.

Hackers will therefore go towards more simplicity and drop these accounts too complicated to penetrate.

Now access an unlimited number of passwords:
Download Password