This document belongs to the dataroom of, Anti-Hack Jobs
, of which in turn, belongs to Australian based KangaBytes
as the owner and author of all content within this document.
The Anti-Hack Jobs
advisory, is to advise in respect to, how best to protect the data of your customers, from hacking events.
The use of these tips, requires a license. Please visit the online dataroom at www.kangabytes.tips/pass.html for this information.
This document focuses on, strategies around Fakewords
. These are settings that are associated with the password field, when a fakeword
is entered as a password, the person gaining access at that time,
will be subject to a trap being sprung, such as, being presented with fake account information.
fakewordcan work in either of these ways,
When you have respective account holders to set their own fakewords
, that sets up a somewhat dynmanic system, of which can not be predicted by any hacker.
Fakewordshave these distinctions;
True-Holdernever needs to remember what their
fakewords are each time they log in, they just need to remember what their passwords are.
A BlockPass
is a trap, meant to catch a hacker, and, to instantly put on a block on their IP Address, to prevent that hacker from doing any further hacking of that account and/or server.
By having the True-Holder
set up their own small list of BlockPass
es, sets up a dynamic system, of where, any word, can in fact be a BlockPass
.
BlockPassse better than
three strikes and your out;
True Holder.
BlockPass, and not after three strikes of getting the wrong password. This results in a much quicker reaction to a hacking attempt.
NOTE: This MUST not be a doable function, during the application stage of any new customer/member.
BlockPasses, in respective input fields.
BlockPasses, MUST be a totally different page, to that of, the passwords. This is to help avoid confusion held by the
True Holder.
BlockPasswords during their own log in.
BlockedList
Means, the list of IP addresses, of which are subject to a block.
Any of the IP addresses of which are in a BlockedList
should have their access blocked.
You can choose, as to the maximum quantity of BlockPass
es, of which your customer may use.
Remember, the more BlockPass
words there are, means the strike rate is that much more than, the chances of guessing the correct password.
Mono Passwordsystem of which we currently use.
BlockPassword(s).
Blocked list, then, authentication is stopped, and access is blocked.
BlockPasses, to find out, if any one of them, is in fact a
BlockPassas set by this
True Holder.
BlockedList.
BlockPasssystem, is part of the
Fakewordgroup, this
BlockPasssearch and test, needs to be, towards the end of the Authenticator script, and past where all of the
Passwordtype systems are located.
BlockPasssettings
BlockPass, of which you permit your customer to have, add one column like a {TINYTEXT} to hold the respective
BlockPasses for that customer.
Try and ensure you have a quantity of BlockPass
es, to match the quantiy of, one of your password systems.
Such as, five BlockPasses
, to match the quantity of five, for your QuinCycle
system. To mitigate database leaks.
QuinCyclesystem, another table holds your
BlockPassfakewords, and a third table, is a trip table, also containing
BlockPassfakewords.
BlockPassfakewords table, the hacker is twice as likely to get fakewords.
BlockPasses for that user.
BlockPassfor that user, then, the server puts a block on that IP address, however, the account is NOT subject to a block.
The type of hacker that gets blocked here is, the type of whom just randomly selects a combination of characters, or, randomly selects words, starting off with dumb passwords like Pass, GetMeIn and so on.
Please Note: This list of risks may NOT be complete. You are advised by us, to seek your own, independent advice in respect to this.
Many hackers will have access to a list of IP addresses. They will hit your website, that many times, until they run out of available IP addresses.
One of the cheap and nastys of the internet is, how dynamic that, IP addresses are. The majority of IP addresses will change each week or so.
There is a very real chance that, a blocked IP address will change to a connection of a True-Holder
, and as a result, will block a True-Holder
from your system.
You must set a time limit, for how long each IP address is blocked for, and reset/clear the block on each respective IP address, once every so often. We can not specify an ideal time limit for you to have.
This system may slow down the authentication process, as, the authenticator will need to search through a rather long list of IP addresses.
Furthermore; the demand on server memory will be large, especially where your website gets quite a lot of BlockPass
hits.
The aim is, for the True Holder
of an account, to set a list of their own FakeSide
Fakewords
,
with the aim of, should any hacker try and attempt access with any of those
Fakesides
, that hacker will then be sent fake data. The Hacker thinks, they have a success, only to waste their time with what is, pointless data.
Out of all of my tips, this must be the best one of all. With the objective of, to remove every bit of value from, the stolen data, as taken in, any hacking event.
With all that financial worth now being gone, will thereafter, remove all reason for why, much of the hacking events happen in the first place.
Short term, minor pain. Long term, major gain.
FakeSide Data&
Fake Account Information.
This is, the data and information of which is sent out, when an account gets accessed with a FakeSide
password.
This is, fake data, of which is meant to look like real information, and is aimed at tricking the viewer in thinking that, this data is in fact, true data.
FakeSide Data
can be, any type of information, of which is about, of, or in association to/with, a real person.
True Data
Means the authentic data or information that is, about the true account holder.
FakeSidepasswords
FakeSidepasswords
The True-Holder
simply, avoids the use of, any of these FakeSide
words during a log in event.
Your customer should not ever, be required to set any of these FakeSide
passwords, during their application stage.
Rather, your new customer should be encouraged to go into the FakeSide
area of their account later on.
NOTE:I do strongly suggest that, you have a default set of fake data, for new accounts, and, to then let your customers the right to edit that information to whatever they wish.
FakeSidewords they have.
FakeSidein each.
Mono Passwordsystem of which we currently use.
fakewords.
FakeSides for that account.
FakeSidebe detected, then, the Authenticator will direct the access-seeker into a fake account.
FakeSides
FakeSideyou permit your customers to have.
FakeSide
Fakeword.
Please Note: This list of risks may NOT be complete. You are advised by us, to seek your own, independent advice in respect to this.
One sure way for a hacker to check if the information is real or not, is, to conduct a type of phishing event, of which can include cold calling people.
People need to be alerted to this risk, and, to be prepared for it. DO NOT TRUST anybody they do not know, on the telephone.
Never, show both true data, and fake data, at the same time in any account. This includes, where the two types, are across separate pages of the same account.