Anytime there is a massive password breach there is a subsequent analysis of the password quality; if you’re curious about the composition of nearly half a million Yahoo! users, come on in and rubberneck the break down.
Courtesy of Anders Nilsson, the analysis yielded all sorts of little gems. The most popular password was 123456, the most popular baseword was password, and his break down of the days, months, and years incorporated into passwords shows that May is the most popular month, it’s a tie between several weekdays, and January is the most popular month. Ever tack a year onto your password to spice it up? If you’re a Yahoo! user there’s a pretty good chance it’s 2008.
Hit up the link below to check out the full analysis. If you realize your passwords could use a little updating, check out our guide to recovering from a security breach and best password practices to get your passwords in order.
Statistics of 450,000 Leaked Yahoo Accounts [via Boing Boing]
Earlier this year we shared an Iron Man prop build made from Dollar Store parts. The same Dollar Store tinker is at it again, this time building a Terminator endoskull.
One of the defining features of Linux and other UNIX-like operating systems is that “everything is a file.” This is an oversimplification, but understanding what it means will help you understand how Linux works.
Ubuntu’s Update Manager keeps your packages at the latest version, but occasionally a new package version may not work properly. You can downgrade an installed package and lock it at a specific version to prevent it from being updated.
Think you know the answer? Click through to see if you're right!
Our first edition of WIG for July is filled with news link goodness covering topics such as why Microsoft killed the Start Button in Windows 8, how to outsmart websites trying to get you to pay top dollar, OS X Mountain Lion will check daily for security updates, and more.
Linux logs a large amount of events to the disk, where they’re mostly stored in the /var/log directory in plain text. Most log entries go through the system logging daemon, syslogd, and are written to the system log.
This past month we covered topics such as why you only have to wipe a disk once to erase it, what RSS is and how you can benefit from using it, how websites are tracking you online, and more. Join us as we look back at the best articles for June.
Think you know the answer? Click through to see if you're right!
Have you thought about expanding your knowledge by taking some courses? There are several colleges and other sites that offer free online courses, certificate programs, some degree programs, and education resources for teachers and professors.
The starships shown in our favorite sci-fi serials come in all shapes and sizes, serve different purposes, and make us yearn to have one to call our own. Travel among the stars on your desktop with the second in our series of Starships Wallpaper collections.