KANGABYTES
Anti-Hacker Jobs

Plans with Fakewords

    Document Introduction

    This Series & Dataroom - Anti-Hack Jobs

    This document belongs to the dataroom of, Anti-Hack Jobs, of which in turn, belongs to Australian based KangaBytes as the owner and author of all content within this document.

    The Anti-Hack Jobs advisory, is to advise in respect to, how best to protect the data of your customers, from hacking events.

    The use of these tips, requires a license. Please visit the online dataroom at www.kangabytes.tips/pass.html for this information.

    This Document - Plans with Fakewords

    This document focuses on, strategies around Fakewords. These are settings that are associated with the password field, when a fakeword is entered as a password, the person gaining access at that time, will be subject to a trap being sprung, such as, being presented with fake account information.

    When you have respective account holders to set their own fakewords, that sets up a somewhat dynmanic system, of which can not be predicted by any hacker.

    Passwords &/vs Fakewords

    How they are same/similar

    How they are greatly different

    BLOCKPASSES - How it Works

    Opening summary

    A BlockPass is a trap, meant to catch a hacker, and, to instantly put on a block on their IP Address, to prevent that hacker from doing any further hacking of that account and/or server.

    By having the True-Holder set up their own small list of BlockPasses, sets up a dynamic system, of where, any word, can in fact be a BlockPass.

    BlockPasses - The Customer/User

    NOTE: This MUST not be a doable function, during the application stage of any new customer/member.

    The True-Holder

    BlockPasses - Wordings and Meanings

    Meaning of BlockedList

    Means, the list of IP addresses, of which are subject to a block.

    Any of the IP addresses of which are in a BlockedList should have their access blocked.

    BlockPasses - Alturnate Options & Ways

    You can choose, as to the maximum quantity of BlockPasses, of which your customer may use. Remember, the more BlockPass words there are, means the strike rate is that much more than, the chances of guessing the correct password.

    BlockPasses - What you need
    BlockPasses - Handy Tips

    Try and ensure you have a quantity of BlockPasses, to match the quantiy of, one of your password systems. Such as, five BlockPasses, to match the quantity of five, for your QuinCycle system. To mitigate database leaks.

    BlockPasses - The Hacker

    The Hacker

      How this feature functions with the Hacker,
    1. The hacker types in the guessed password into the password field at the log in page, as they do as part of any hacking event.
    2. The hacker then activates send/login.
    3. The server then checks the entered password, against the list of BlockPasses for that user.
    4. Should the server find that entered password is in fact a BlockPass for that user, then, the server puts a block on that IP address, however, the account is NOT subject to a block.

    The type of hacker that gets blocked here is, the type of whom just randomly selects a combination of characters, or, randomly selects words, starting off with dumb passwords like Pass, GetMeIn and so on.

    BlockPasses - Some Risks of Note

    Please Note: This list of risks may NOT be complete. You are advised by us, to seek your own, independent advice in respect to this.

    Use another IP address

    Many hackers will have access to a list of IP addresses. They will hit your website, that many times, until they run out of available IP addresses.

    Dynamic IP addresses

    One of the cheap and nastys of the internet is, how dynamic that, IP addresses are. The majority of IP addresses will change each week or so.

    There is a very real chance that, a blocked IP address will change to a connection of a True-Holder, and as a result, will block a True-Holder from your system.

    You must set a time limit, for how long each IP address is blocked for, and reset/clear the block on each respective IP address, once every so often. We can not specify an ideal time limit for you to have.

    Demand will be high

    This system may slow down the authentication process, as, the authenticator will need to search through a rather long list of IP addresses.

    Furthermore; the demand on server memory will be large, especially where your website gets quite a lot of BlockPass hits.

    FAKESIDE - How it Works

    The aim is, for the True Holder of an account, to set a list of their own FakeSide Fakewords, with the aim of, should any hacker try and attempt access with any of those Fakesides, that hacker will then be sent fake data. The Hacker thinks, they have a success, only to waste their time with what is, pointless data.

    FakeSide - Marketing & Pitching

    Destroys their business model

    Out of all of my tips, this must be the best one of all. With the objective of, to remove every bit of value from, the stolen data, as taken in, any hacking event.

    With all that financial worth now being gone, will thereafter, remove all reason for why, much of the hacking events happen in the first place.

    Short term, minor pain. Long term, major gain.

    FakeSide - Wordings and Meanings

    Meaning of FakeSide Data & Fake Account Information.

    This is, the data and information of which is sent out, when an account gets accessed with a FakeSide password.

    This is, fake data, of which is meant to look like real information, and is aimed at tricking the viewer in thinking that, this data is in fact, true data.

    FakeSide Data can be, any type of information, of which is about, of, or in association to/with, a real person.

    Meaning of True Data

    Means the authentic data or information that is, about the true account holder.

    FakeSide - The Customer/User

    How they set this up

    When they log in

    The True-Holder simply, avoids the use of, any of these FakeSide words during a log in event.

    FakeSide - Accessibility

    New customer note

    Your customer should not ever, be required to set any of these FakeSide passwords, during their application stage.

    Rather, your new customer should be encouraged to go into the FakeSide area of their account later on.

    FakeSide - Alturnate Options & Ways

    NOTE:I do strongly suggest that, you have a default set of fake data, for new accounts, and, to then let your customers the right to edit that information to whatever they wish.

    FakeSide - What you need

    The website

    FakeSide - The Hacker

    The Hacker

    FakeSide - Some Risks of Note

    Please Note: This list of risks may NOT be complete. You are advised by us, to seek your own, independent advice in respect to this.

    Phishing Checks

    One sure way for a hacker to check if the information is real or not, is, to conduct a type of phishing event, of which can include cold calling people.

    People need to be alerted to this risk, and, to be prepared for it. DO NOT TRUST anybody they do not know, on the telephone.

    Avoid showing both datas

    Never, show both true data, and fake data, at the same time in any account. This includes, where the two types, are across separate pages of the same account.