| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 55604 | 2005-03-15 02:06:00 | Internet banking password question. | Brian B (6530) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 334122 | 2005-03-15 08:40:00 | so why not do the phone thing for EVERY trans it's easy enuf......and of course there is only one problem there but the banks wont see it as a problem.....who pays for the texts ?..........the CUSTOMER of course......lolOne other flawed assumption with the txt-password, is that the person doing internet banking is in good cellphone coverage. I use internet banking on the road. In some of the places internet access is available, cellphone coverage ISN'T :( |
personthingy (1670) | ||
| 334123 | 2005-03-15 09:18:00 | Your still going ? Lmao. I think i have already answered anything worth commenting on, You think my suggestion is absolute bollucks,Nice, Thats great,And i am truly happy for you. Obviously regular servicing of computers is a bad idea. ROFLMFAO. Laughing does not help people who have security concerns. You say you are miles ahead of me but have you considered you may be going in the wrong direction. Here is a site where everyone can get some idea how secure their computer is. Give it a run and see how it stacks up with the Mac results. ? productid=symhome&langid=au_nz&venid=sym" target="_blank">security.symantec.com My Results: 421 Stealth TCP Wrappers Trojan ? 513 Stealth Grlogin 514 Stealth RPC Backdoor ? * 1049 Stealth /sbin/initd ? 1095 Stealth Remote Administration Tool - RAT ? * 1097 Stealth Remote Administration Tool - RAT 1098 Stealth Remote Administration Tool - RAT ? * 1099 Stealth Remote Administration Tool - RAT ? * 1338 Stealth Millenium Worm ? 1524 Stealth Trinoo * 5010 Stealth Solo ? * 5025 Stealth WM Remote KeyLogger ? * 5550 Stealth Xtcp ? * 5760 Stealth Portmap Remote Root Linux Exploit ? * 6723 Stealth MStream ? * 6667 Stealth Trinity ? * 7000 Stealth Exploit Translation Server ? * 7983 Stealth MStream * 12331 Stealth NetBus ? * 12345 Stealth cron, crontab, NetBus 12346 Stealth NetBus ? * 12754 Stealth MStream ? * 15104 Stealth MStream ? * 27665 Stealth Trinoo ? * 31337 Stealth Sockdmini, cron, crontab ? 33270 Stealth Bind shell backdoor, Trinity ICMP Ping Stealth Ping. Ping is a network troubleshooting utility. It asks your computer to acknowledge its existence. If your computer responds positively to a ping, hackers are more likely to target your computer. 21 Stealth FTP (File Transfer Protocol). FTP is used to transfer files between your computer and other computers. Port 21 should be open only if you're running an FTP server. ? * 80 Stealth HTTP (Hypertext Transfer Protocol). HTTP is used to transfer Web pages over the Internet. Port 80 should be open only if you're running a Web server. ? * 407 Stealth Timbuktu. Timbuktu is remote control software. If port 407 is open, hackers could remotely take control of your computer. ? 497 Stealth Retrospect backup. Retrospect backs up files over TCP/IP networks. When port 497 is open, Internet users could remotely download files from your computer. ? * 548 Stealth Appl Stealthe File Sharing. Apple File Sharing allows Macintosh computers to share files with other Macintosh computers over the network. This port should never be open except on local networks. If this port is left open, hackers could easily gain access to your files. ? * 1417 Stealth Timbuktu Service 1 (Control). Timbuktu is remote control software, and port 1417 is used for a Timbuktu Service called Control. If port 1417 is open, hackers could remotely take control of your computer. 1418 Stealth Timbuktu Service 2 (Observe). Timbuktu is remote control software. Port 1418 is used for a Timbuktu Service called Observe. If port 1418 is open, hackers could remotely take control of your computer. ? * 3031 Stealth Program Linking. Program Linking allows Macintosh applications to communicate over the network. This port should never be open except on local networks. If this port is left open, others could run applications on your computer. 5003 Stealth FileMaker Pro. FileMaker Pro is a very popular cross-platform database application. This port should only remain open if you are running a FileMaker Pro database. ? ? * ? * |
Safari (3993) | ||
| 334124 | 2005-03-15 09:23:00 | I wonder if we should have a poll to see how many groans your posts in this thread has brought forth? | Metla (12) | ||
| 334125 | 2005-03-15 09:40:00 | Randomise the position of the letters and the position of the keyboard with every login. Then no matter what spy-ware you have, it would be extremely difficult to accurately deduce passwords and whatnot. |
vinref (6194) | ||
| 334126 | 2005-03-15 09:53:00 | Safari and Metla ... Guys, can we please not turn this thread into a "my OS is better than yours" thread? How about we leave it alone now - thanks |
Jen (38) | ||
| 334127 | 2005-03-15 10:07:00 | well Safari, when i said i was miles ahead, I was refering to the logical conclusion of my comments, as in 100 percent garentee would require a format, Little did I know at the time you would leap beyond mere logic and start ranting about formatting before every banking session. If you took it as a slur on your technical ability, then well, whatever, I have no idea of your skill level,and am as interested in it about as much as your hair colour. As for your security site scan, It won't run under Firefox with my settings,and im most certainly not going to lower them or fire up IE, I would be interested to know if anyone can run it under Firefox, Its a poor joke if it only runs under IE. Or Safari browser as i presume you run. |
Metla (12) | ||
| 334128 | 2005-03-15 10:15:00 | Give it up already people. Attaching your ego to your comments/expertise/knowledge/OS is sooooo uncool. |
vinref (6194) | ||
| 334129 | 2005-03-15 10:16:00 | Then you obviously misread. | Metla (12) | ||
| 334130 | 2005-03-15 10:28:00 | I see what you mean about Firefox, same with Mozilla it won't run on mine either. Safari work OK and IE Wonder if Opera works. |
Safari (3993) | ||
| 334131 | 2005-03-15 10:33:00 | If I wanted to get someones password, I would have a keylogger last on my list of things to try. First when they click send or OK to send off that information the easiest way would be to catch that, it wouldent matter how the password was entered, pasted, typed backwards, you would just catch the password field. |
Rob99 (151) | ||
| 1 2 3 4 5 6 | |||||