
More lenient towards input errors than smartphone security.
You arrogant PC.
I got connected to the fax!
Works like this have sloppy password cracking and are full of holes, right?
The teachers using this system are not very skilled with computers.
It is probably a series of numbers.
Even in modern times, it’s quite common to be breached by brute force attacks.
Considering the era, isn’t it quite a reasonable expression?
It’s amazing how teachers can use PCs properly…
It looks a little interesting.
It’s normal since it’s just a dictionary attack.
If nothing matches in between, I’ll just move on to the next candidate.
The night shift uncle must be really scary…
Maybe it’s stuck to the area around the PC with sticky notes.
Our company has finally implemented palm recognition.
There is an emergency password stuck on a sticky note for when it is not recognized by the manager’s PC…
Last year, we considered adding facial recognition to the electronic medical record certification method for public hospitals.
In the end, considering emergencies, I feel anxious if it doesn’t open with a pass.
I was told that there are also outside doctors who casually come to perform examinations or surgeries…
Well, the fact that someone has physically intruded to the point where they can see the post-it notes is already quite bad…
I like it when my partner, who has a delinquent vibe, listens to me properly while drinking coffee and waiting.
Clack clack clack… Checkmate!
Compared to hacking depictions like that, it’s far more realistic.
I mean, in this era, this is probably the closest to a right approach.
It’s impressive because it doesn’t feel like something that could be done with a super hacking software I programmed…
It’s quite common for the side being hacked to be vulnerable, especially in this day and age, so I think it’s a reasonable depiction.
When you look at security books, it turns out that it’s more about human error and poor operations than zero-day security holes.
It’s common for the system side to make unreasonable demands of the operational side, leading to sloppy operations that can’t withstand actual use.
It took a considerable amount of time for the idea that you shouldn’t use names or birthdays in passwords to become widespread, didn’t it?
5963!!
In a world where we have to create many passwords, it seems like there are still many people who reuse their names and birthdays.
If you think about the ideal, regular password changes are effective.
Realistically, if humans did that, it would just result in the reuse of specific words, so it was decided to stop.
Because humans are careless, security becomes careless as well.
What I’m doing now hasn’t really changed much.
Even with a high level of security, it will collapse if an idiot falls for phishing.
The defending side must reinforce the entire wall.
The attacking side only needs one hole, just like in a siege.
It’s not going well, is it?
I’ve heard stories about hackers disguised as cleaners stealing office information from investment-related companies in the U.S., and it’s impressive how effective physical rummaging can be.
It’s the era of using Telegram after all…
Even if machines advance, humans don’t change.
Creating a longer password is far safer than regularly changing your password…
The process has been the same since ancient times, only the tools used have changed.
Humans are not built to manage a lot of passwords…
No matter how advanced the system becomes
It’s impossible to prevent humans from being silly.
Writing on sticky notes tends to be looked down upon, but
If it gets to that point, the worst case is that my computer will be taken away.
Considering the possibility of being hacked over the internet, it’s better to create a complex password and write it down on paper for added security.
It’s better to store paper in drawers or something.
There was an introduction to a method of creating a password that is hard to guess by taking a suitable 4-digit number, raising it to the power of n, selecting 4 digits from it according to certain rules, and repeating the process of raising to the power of n.
It’s good to create it, but when it comes to management… it became a problem.
There was also something called FAX hacking.
Hacknet is a fun game, so I recommend it.
It’s a proper depiction of hacking rather than a weird sci-fi.
In the past, there weren’t any access restrictions, right?
Rather than just randomly messing around
It feels like I’m doing an extremely realistic hack.
In other words, what is being done as hacking has not changed even in modern times.
It’s just unauthorized access and trying passwords through brute force.
Are you automating this trial?
It’s a difference of just getting a list from somewhere, right?
In reality, hacking like that with such a noisy keyboard is unlikely to happen as it does in fiction.
There are probably many parts that rely on tools, and it raises the question of what exactly you need to input into the terminal so much…
There’s no way I would use a password like this (Password popularity ranking for 2024, number 1: 123456789).
The era of PC98 and 88?
The teachers who can use the soft pass are amazing.
Isn’t this depiction of hacking incredibly solid?
It’s quite common for passwords to be weak even today… They should be receiving proper security training… I wonder why they don’t follow the rules?
It was a time when postal workers, not really understanding much, would buy computers for around 500,000 yen, so it was probably quite popular.
I think it’s quite amazing that we can use PCs and the internet in this era.
Somehow… it seems like they’re doing some serious hacking…
They say the pass is loose, but it’s better that it’s a symbol that requires the Shift key.
In other words, they guessed the name correctly right off the bat, and it’s using Hepburn romanization, which is just convenient for the story.
If security is tightened too much to the point where no one can use it, that is an extreme case of losing sight of the original purpose, so it’s not just about wanting to make things easier.
In the Spider-Man Miles animated movie, I saw that he got caught breaking in, so I thought it would be fine to steal the entire server… and that’s how it became.
HIROSHI YAMAKAWA