Timeline for How can I protect my internet-connected devices from discovery by Shodan?
Current License: CC BY-SA 3.0
7 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Mar 17, 2017 at 13:14 | history | edited | Community Bot |
replaced http://security.stackexchange.com/ with https://security.stackexchange.com/
|
|
| S Apr 9, 2013 at 22:20 | history | suggested | dfarrell07 | CC BY-SA 3.0 |
Improved link formatting
|
| Apr 9, 2013 at 22:19 | review | Suggested edits | |||
| S Apr 9, 2013 at 22:20 | |||||
| Apr 9, 2013 at 21:21 | comment | added | Thomas Pornin | "abcdefghij" is worth 50 or 0 or anything else, depending on the context. Entropy is a property of the way you generate passwords, not of the password itself. | |
| Apr 9, 2013 at 21:14 | history | edited | Johnny | CC BY-SA 3.0 |
Updated to address commenter's concerns with "only" 48 bits of entropy
|
| Apr 9, 2013 at 20:38 | comment | added | Scott Pack | 48 bits of password entropy isn't all that much. After all, "abcdefghij" is worth ~50. | |
| Apr 9, 2013 at 19:39 | history | answered | Johnny | CC BY-SA 3.0 |