Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Hacked Syrian Officials Used '12345' As Email Password

samzenpus posted more than 2 years ago | from the I've-got-the-same-combination-on-my-luggage dept.

Government 231

Nominei writes "The Israeli newspaper Haaretz reports that the Syrian President, aides and staffers had their email hacked by Anonymous, who leaked hundreds of emails online. Reportedly, many of the accounts used the password '12345' (which their IT department probably warned them to change when the accounts got set up, of course)."

cancel ×

231 comments

Sorry! There are no comments related to the filter you selected.

That's amazing (5, Funny)

Anamelech (821849) | more than 2 years ago | (#38991583)

I've got the same combination on my luggage!

Re:That's amazing (-1)

Anonymous Coward | more than 2 years ago | (#38991597)

what an amazing coincidence!

Re:That's amazing (4, Funny)

LoverOfJoy (820058) | more than 2 years ago | (#38991611)

It wouldn't surprise me if another anonymous hacker beat them to it and changed their addresses to 12345 for the lulz.

Re:That's amazing (0, Troll)

Cryacin (657549) | more than 2 years ago | (#38991719)

Sadly it was probably the only sequence of characters that those neanderthals could remember. The sooner that they are removed from power, the better.

Re:That's amazing (4, Insightful)

Frosty Piss (770223) | more than 2 years ago | (#38991907)

Why do you insult neanderthals?

Re:That's amazing (-1, Offtopic)

cheapminisitedesign (2571243) | more than 2 years ago | (#38992385)

i'm really new here, but i would like receive more info to my email, because the topic looks interested tome, altough i didn" really undestand about it, but i will learn if one of these website's member would like to help me cheap minisite graphic design template [minisitesbee.com]

Re:That's amazing (-1)

Anonymous Coward | more than 2 years ago | (#38992409)

Actually, most of us were thinking we'd come over to your house and beat you to death.

Mine is 54321 (1)

Taco Cowboy (5327) | more than 2 years ago | (#38991615)

No zero, sorry

Re:That's amazing (5, Insightful)

Vintowin (1476905) | more than 2 years ago | (#38991649)

I've got the same combination on my luggage!

Came for this, leaving satisfied!! This thread will go to plaid soon.

Re:That's amazing (1)

printinginchina (2571153) | more than 2 years ago | (#38991783)

i think it's not save

Re:That's amazing (-1)

Anonymous Coward | more than 2 years ago | (#38991817)

I aint got SHIT

Re:That's amazing (-1)

MobileTatsu-NJG (946591) | more than 2 years ago | (#38991861)

Came for this, leaving satisfied!! This thread will go to plaid soon.

That feeling is irreversible, just like my raincoat.

Syrians? (1, Funny)

spidercoz (947220) | more than 2 years ago | (#38992007)

Oh shit. There goes the planet.

Re:That's amazing (1)

Jason Levine (196982) | more than 2 years ago | (#38992067)

How soon?

http://www.youtube.com/watch?v=VeZ9HhHU86o

Re:That's amazing (5, Funny)

cashman73 (855518) | more than 2 years ago | (#38991659)

I wonder if their President is surrounded by assholes, too?

Re:That's amazing (0, Insightful)

Anonymous Coward | more than 2 years ago | (#38991975)

In this case, the President is an asshole, too.

Re:That's amazing (4, Funny)

Anonymous Coward | more than 2 years ago | (#38992059)

In this case, the President is an asshole, too.

Well, yes. If you draw a Venn diagram of assholes and presidents, I am fairly certain that the latter is wholly contained within the former.

Re:That's amazing (0)

kimvette (919543) | more than 2 years ago | (#38991755)

Oh, the one time I wish slashdot had a facebook-style "Like" button!!!!

Re:That's amazing (-1)

Anonymous Coward | more than 2 years ago | (#38991763)

I am Templeton Beckmarsh (aka Flampton Hoppings) and I approve of this comment.

Re:That's amazing (0)

Anonymous Coward | more than 2 years ago | (#38992133)

Ok I'll bite. What's the joke here?

Re:That's amazing (1)

slasho81 (455509) | more than 2 years ago | (#38992401)

Oblig. link [youtube.com]

Re:That's amazing (1, Funny)

basecastula (2556196) | more than 2 years ago | (#38992687)

Told my friend this story in mcdonalds. He said his dad had the same combo on his briefcase of contraband.

Re:That's amazing (1)

Anonymous Coward | more than 2 years ago | (#38992723)

It's pretty sad when the first comment is just a rehash of a joke already made in the summary.

Posted by samzenpus on Thursday February 09, @10:25PM

from the I've-got-the-same-combination-on-my-luggage dept.

12345 (0, Redundant)

Anonymous Coward | more than 2 years ago | (#38991593)

1, 2, 3, 4, 5? That's amazing! I've got the same combination on my luggage!

Re:12345 (4, Insightful)

flyingsquid (813711) | more than 2 years ago | (#38991799)

If a bunch of kids could hack into Syran government email by typing "12345", you'd imagine that at least one of the big cyberwarfare or intelligence units out there- the U.S., Israel, or China- would have thought of the same trick and has already been monitoring their communications for a while. At least you'd hope so. I'd hate to think that right now there are of a couple of NSA agents looking at each other and saying, "12345... hey, why didn't we think of that?"

Re:12345 (5, Funny)

ceoyoyo (59147) | more than 2 years ago | (#38992009)

Or a couple of NSA agents looking at each other and saying "shit, I've got to go change my password."

Re:12345 (5, Insightful)

Culture20 (968837) | more than 2 years ago | (#38992177)

Or a couple of NSA agents looking at each other and saying "shit, now we can't read their email"

Re:12345 (1)

Gumbercules!! (1158841) | more than 2 years ago | (#38992417)

Man I wish I hadn't already frivolously burnt the mod points I had earlier today. That one made me laugh out loud.

Re:12345 (3, Insightful)

retech (1228598) | more than 2 years ago | (#38992087)

Perhaps they did. Do you seriously think that: 1. they'd let /. know and that B. they'd tell Syria when they have a free pass?

Re:12345 (4, Informative)

rahvin112 (446269) | more than 2 years ago | (#38992731)

Governments will go to extreme lengths to avoid revealing when they have access to information that the "enemy" thinks is secure. The allies went to very extreme measures to avoid tipping the Germans off that they had access to all the communications that went out on the Enigma machine. This included letting their own troops be ambushed and killed and massive use of resources and manpower to cover up when they did use the information, such as flying a hundred aerial survey missions to cover up knowing the travel path of a sea convoy.

Re:12345 (1)

MightyMartian (840721) | more than 2 years ago | (#38992413)

The thing about, say, the CIA or Mosad, they would hack, but not reveal they had and just keep reading the emails as they came in.

Only 12345? (5, Funny)

froggymana (1896008) | more than 2 years ago | (#38991635)

I thought that everyone knew to use at least 123456 as their password. After all that increases its security by an order of magnitude!

Re:Only 12345? (1, Redundant)

iggymanz (596061) | more than 2 years ago | (#38992269)

oh no, eight is the minimum recommended length. 12345678 is the shortest secure password you should be using. or qwertyui. wait, please don't use that second one, it's my paypal password

IT did warn them (5, Funny)

Anonymous Coward | more than 2 years ago | (#38991645)

then the IT guy got taken into the alley and shot in the head for his impudence.

Re:IT did warn them (5, Funny)

HSonger (2467902) | more than 2 years ago | (#38991761)

The IT group probably forgot to install the Unicode language pack on their machines so the only Arabic they could put in were numerals.

Re:IT did warn them (5, Funny)

mjwx (966435) | more than 2 years ago | (#38992033)

The IT guy was then shot again, for his incompetence.

Re:IT did warn them (3, Insightful)

sycodon (149926) | more than 2 years ago | (#38992111)

Should be scored as +1, in all likelihood, true.

Re:IT did warn them (3, Interesting)

MightyMartian (840721) | more than 2 years ago | (#38992423)

I don't know if Assad's quite that malevolent. I sure wouldn't have wanted to have been Uday Hussein's IT manager, that's for sure.

Incredibly stupid (2)

brickmack (2537604) | more than 2 years ago | (#38991647)

Seriously? People that use such easy to guess (and therefore pointless) shouldn't even have access to anything that needs protection...

Re:Incredibly stupid (4, Funny)

ceoyoyo (59147) | more than 2 years ago | (#38992043)

Well, it was their own e-mail....

Speaking of which, people who don't put objects in their sentences shouldn't even have written them. ;)

Agree (1)

Roger W Moore (538166) | more than 2 years ago | (#38992169)

I agree and since the people they are supposed to be governing clearly need protection....

Re:Incredibly stupid (2)

MyHair (589485) | more than 2 years ago | (#38992383)

Seriously? People that use such easy to guess (and therefore pointless) shouldn't even have access to anything that needs protection...

Pfffft. You ever worked for a Director/VP or higher? Try telling them how to set their passwords. I've seen "boss", "super" and other motivational-poster-worthy simple words. And they want everything to auto-login. One of the last major worm outbreaks I encountered originated in the senior executive offices.

Okay, that was a few years ago. Maybe that company has learned a few things since then.

I've got the same combination on my luggage! (0)

RPGillespie (2478442) | more than 2 years ago | (#38991657)

That's amazing!

You know... (4, Insightful)

koan (80826) | more than 2 years ago | (#38991667)

Every time I go to pastebin.com and look at the hacked sites the passwords are always weak, extremely weak, virtually no one uses strong passwords.

Re:You know... (5, Insightful)

arth1 (260657) | more than 2 years ago | (#38991771)

Every time I go to pastebin.com and look at the hacked sites the passwords are always weak, extremely weak

No surprise there.

, virtually no one uses strong passwords.

Non sequitur. The published passwords are weak because that's the passwords that were easily cracked. Those who have strong passwords are underrepresented on the lists precisely because they have stronger passwords so they weren't brute-forced easily.

IT departments and well-meaning distro packagers have to take some of the blame too. I can't choose a password like Zph9vZZZ3tPseX4 because it has Z repeated 3 times, and contains a word found in a dictionary?
Fuck that then, I'll go with abcd1234 instead. Oh, and I have to change it every four weeks? Next time it will be 1234abcd, then abcd12345 and 12345abcd - catch my drift?

Re:You know... (4, Insightful)

Dwonis (52652) | more than 2 years ago | (#38991851)

Every time I go to pastebin.com and look at the hacked sites the passwords are always weak, extremely weak

No surprise there.

, virtually no one uses strong passwords.

Non sequitur. The published passwords are weak because that's the passwords that were easily cracked. Those who have strong passwords are underrepresented on the lists precisely because they have stronger passwords so they weren't brute-forced easily.

Sure, but every now and then, some *site* uses a poor hash, which allows people like me to do research on password strength and frequency. These results don't exhibit the selection bias you're talking about, because they're a full dump of passwords on the site. This [dlitz.net] is just for one specific site, but I found that 36% of all passwords were easily discoverable using a rainbow table, 33% of passwords weren't unique, and 1 in 72 users had the password "super123" for some reason.

I actually had a list of email addresses and their corresponding passwords for the site. I wouldn't be surprised if a lot of these passwords could also be used to get access to their corresponding GMail/Yahoo/Hotmail accounts (but I didn't test it out, because I enjoy not being in jail).

Re:You know... (0)

Anonymous Coward | more than 2 years ago | (#38991897)

yep never use the same user name or password for different sites, at the minimum.

Re:You know... (4, Interesting)

LordLucless (582312) | more than 2 years ago | (#38991923)

yep never use the same user name or password for different sites you care about, at the minimum.

FTFY. I mean, really, nobody has the mental capacity to remember a unique, strong password for every titchy site they have an account on.

Me, I have a strong, unique password for the handful of things that deserve it (My workstation, email, banking, facebook) and then a common password that I use among all the other sites, that I really don't care about being compromised.

Re:You know... (1)

am 2k (217885) | more than 2 years ago | (#38992141)

I mean, really, nobody has the mental capacity to remember a unique, strong password for every titchy site they have an account on.

Yes, I'm using a password manager for the rest (1password). It can also generate super-secure randomly generated passwords.

Re:You know... (1)

admiralranga (2007120) | more than 2 years ago | (#38992145)

Saw this on a site a while ago. You first chose a base password, then to generate a unique password for every site the base password was hashed with the site name. Hence you got a suitably complex password for every site but without having to remember them all.

Re:You know... (0)

Anonymous Coward | more than 2 years ago | (#38991937)

Adding super123 to my dictionary.

Re:You know... (4, Interesting)

arth1 (260657) | more than 2 years ago | (#38992027)

Sure, but every now and then, some *site* uses a poor hash, which allows people like me to do research on password strength and frequency. These results don't exhibit the selection bias you're talking about, because they're a full dump of passwords on the site. This is just for one specific site, but I found that 36% of all passwords were easily discoverable using a rainbow table, 33% of passwords weren't unique, and 1 in 72 users had the password "super123" for some reason.

The link you provide supports that this is selection bias - he cracked 26025 out of 93688 passwords, and then made the brilliant deduction that boils down to "of those passwords that I easily cracked, most were found to be easily cracked". No shit, Sherlock.

Sure, that 36% of passwords are easily cracked is bad in itself, but that's another thing entirely. It can't be used as statistics to extrapolate anything using the word "most". It only applies to that subset of weak password.

I also have to arrest you for " I found that 36% of all passwords were easily discoverable using a rainbow table". This is incorrect. 100% of all passwords are easily discoverable using a rainbow table. 36% may be easily discoverable using a partial rainbow table, which is not the same thing.

Re:You know... (1)

ceoyoyo (59147) | more than 2 years ago | (#38992055)

So what you're saying is that MOST passwords were pretty decent (not discoverable using a rainbow table) then? That's a little different from the OP's assertion that "virtually no one uses strong passwords."

Re:You know... (1)

mark-t (151149) | more than 2 years ago | (#38992403)

Where routine password changes are strictly enforced, the system would notice that there were too many characters similar between your old and newly chosen password and would not allow it.

Re:You know... (2)

Arancaytar (966377) | more than 2 years ago | (#38991951)

I think you mean: Virtually no one who uses strong passwords ends up with their password posted on pastebin.com for you to see. :P

Re:You know... (0)

Anonymous Coward | more than 2 years ago | (#38992467)

i use easy to guess passwords all the time... for random sites that I will use once or sites where it matters 0 if I get "hacked". AKA forums.

many of these easy passwords are almost certainly situations like mine.

What does it mean? (0)

SluttyButt (264722) | more than 2 years ago | (#38991671)

There are more important things to think about than this irritant.

I don't understand. (-1)

Anonymous Coward | more than 2 years ago | (#38991675)

This isn't a good password? :(

passwd -e (1)

Anamelech (821849) | more than 2 years ago | (#38991681)

Really, Why weren't these accounts configured to expire on the first login, like most default passwords? If they were, why didn't they have some sort of policy in place in the system to stop people from using incrementing/decrementing numbers?

Re:passwd -e (0)

kenh (9056) | more than 2 years ago | (#38991813)

Really - maybe 'el presidente' is a dolt, msybe their IT guys are dolts, and maybe, just maybe, they didn't even really think about it.

I suspect they chose trivial passwords when the default auto-expired on first login...

Re:passwd -e (2, Insightful)

Anonymous Coward | more than 2 years ago | (#38991879)

Really, Why weren't these accounts configured to expire on the first login, like most default passwords?

They are not configured to expire on the first login because most users never truly log in - they tend to access the services through point-and-drool applications that have no facilities for changing the password.
And even when they do log in, it's likely with dumbed down Windows terminal progs which for unfathomable reasons close the window immediately on disconnect, so the user won't have a chance to read why he was logged out and what to do about it.

So some admins take the easy way out and don't expire the passwords, while others spend time hand-holding the users individually, and yet others pre-generate strongish passwords for the users, but have to communicate them through untrusted media.

For what it's worth, I provided a web based password change service for our technical users so they could change their passwords even if they never logged in to the servers. Within a year, and several reminders later, one out of over 300 users had used it.

tl;dr: You're seldom allowed to break the users' kneecaps when they fail to follow instructions.

Re:passwd -e (0)

Anonymous Coward | more than 2 years ago | (#38991945)

Where was this at?

FUD, unless... (1)

Anonymous Coward | more than 2 years ago | (#38991711)

...Anonymous posted this themselves.

Israelis use FUD frequently--no anti-semitism here. Anonymous is THE perfect scapegoat for false-flags, and (observation here) after this point, is poking a sleeping beast that has an anti-semetic bent already.

Lemme go check the *chan(s)....

Brace yourserlves... (-1, Redundant)

abednegoyulo (1797602) | more than 2 years ago | (#38991741)

the "I've got the same combination on my luggage!" posts are coming....

Re:Brace yourserlves... (1)

corychristison (951993) | more than 2 years ago | (#38991811)

I count three prior to your post.

You either need to type faster or reload the page before deciding to comment.

Palin Popcorn Password (4, Insightful)

kenh (9056) | more than 2 years ago | (#38991785)

Is this really 'hacking' when you guess the password?

Reminds me of the script-kiddie who 'hacked' into Sarah Palin's email account once he successfully guessed her password was 'popcorn'...

Wonder how he's doing in prison?

Re:Palin Popcorn Password (1)

betterunixthanunix (980855) | more than 2 years ago | (#38991835)

Is this really 'hacking' when you guess the password?

It is hacking if you manually enter a URL, so yes, guessing a password is hacking too. Basically, if people are not creative enough to think of how their security system might be defeated, then anyone who defeats it is a hacker (and deserves a jail sentence).

Re:Palin Popcorn Password (4, Informative)

Dwedit (232252) | more than 2 years ago | (#38991933)

That never happened.

Someone guessed Sarah Palin's security questions (such as "Where did you first meet your spouse" with the answer of her high school in Alaska), and got into the account. Then the password was changed to popcorn.

Re:Palin Popcorn Password (1)

lister king of smeg (2481612) | more than 2 years ago | (#38992123)

iirc he got away with minimal punishment because he had that dad was a senetor

Re:Palin Popcorn Password (1)

artor3 (1344997) | more than 2 years ago | (#38992683)

No, he served nearly a year in prison. It was that punk kid who falsified evidence to shut down ACORN and who tried to wiretap a senator's office who got off with minimal punishment.

Re:Palin Popcorn Password (1, Informative)

rahvin112 (446269) | more than 2 years ago | (#38992749)

Not minimal, none. He got like 80 hours of community service. No fine and no jail time. The guy should be in jail for fraud and slander/libel at a minimum and for trying to tap a member of congresses phone he should be in jail for espionage. Anyone that thinks that jackass is a hero needs their head examined.

Worst... Dictator.... Ever! (1)

GiganticLyingMouth (1691940) | more than 2 years ago | (#38991787)

Jesus, as if killing your own people isn't bad enough, you also use one of the worst passwords of all time for (multiple) government passwords. Maybe he wasn't so far off in his Barbara Walters interview; "No government in the world kills its people, unless it’s led by a crazy person” - Assad

Re:Worst... Dictator.... Ever! (2)

Archangel Michael (180766) | more than 2 years ago | (#38992311)

To be fair, the current Administration (NDAA) agrees with ASSad, just as long as you label them "terrorist" first ;)

Is it even hacking anymore? (1)

corychristison (951993) | more than 2 years ago | (#38991789)

When people use such stupid passwords, is it really even considered hacking anymore?

Conversely, does calling this hacking diminish the skills of those who actually know their security inside and out?

Re:Is it even hacking anymore? (1)

betterunixthanunix (980855) | more than 2 years ago | (#38991847)

Here is the mainstream definition of hacking:

If nobody thought of a way that a security system could be defeated, then anyone who defeats that system is a hacker and has engaged in hacking.

While we're "warning" users... (0)

Anonymous Coward | more than 2 years ago | (#38991823)

which their IT department probably warned them to change when the accounts got set up, of course

Somebody should have warned IT to have a stronger password policy in place to begin with. 12345, really?? It's fun to bag on users for using something stupid like that, but IT is responsible for the integrity of the system, and allowing passwords like that is nothing less than complete incompetence on their part.

Arabic? (0)

Anonymous Coward | more than 2 years ago | (#38991829)

Guessing blind, they probably used numbers for those passwords because the official language is Arabic and a sequence of Roman characters would be hard to memorize.

Stuff that matters? (0)

Anonymous Coward | more than 2 years ago | (#38991863)

Reportedly, many of the accounts used the password '12345'

Who gives a flying fuck? There are stupid people everywhere.

Now I'll have to change my dadblasted passwords! (2)

edibobb (113989) | more than 2 years ago | (#38991901)

The Syrians stole my password for everything! Now I'll have to come up with a new one.

Spaceballs (-1, Redundant)

lanner (107308) | more than 2 years ago | (#38991911)

Really. I'm the first person to post this?

This is commonly known as the "spaceballs password"

I used to work with a CISSP who would regularly staff passwords over the phone and give "123pass" and use the spaceballs password. Ever since then, I've not had a lot of respect for the CISSP. The guy was an idiot.

Re:Spaceballs (0)

Anonymous Coward | more than 2 years ago | (#38992255)

Really. I'm the first person to post this?

You mean besides the first post 45 minutes before your post? No.

Assads email wasn't hacked (4, Informative)

highwaytohell (621667) | more than 2 years ago | (#38991925)

It was just the dept staff. Looked like it was hacked through the webmail portal of mopa.gov.sy. The only thing of note was the exchange re the Barbara Walters visit. The Ministry of Presidential Affairs is basically his marketing department. Whilst one would hope they busted into this despots email, the truth is they did no such thing.

BAD PASSWORD: it is too simplistic/systematic (3, Funny)

hcs_$reboot (1536101) | more than 2 years ago | (#38991981)

No, 12345 is actually a very complex password for Bashar al-Assad.

Leet Hackers (1)

jjp9999 (2180664) | more than 2 years ago | (#38991993)

I'm curious to know how many hacker just go around typing 12345 and 1qaz into every account out there just to see what they can get.

And here is the pastebin of the dump. (1)

highwaytohell (621667) | more than 2 years ago | (#38992039)

Just in case no one bothered to go find it. http://pastebin.com/uaYDfCz0 [pastebin.com]

Don't shoot the messenger (1)

Beeftopia (1846720) | more than 2 years ago | (#38992063)

... when he comes up from the IT department and tells you that your password is weak and you need to change it. However, in Assad's Syria, user change* you!

* And by "change" I mean "shoot."

The headline gave me a headache (1)

rebelwarlock (1319465) | more than 2 years ago | (#38992199)

I had thoroughly convinced myself that the days of people using passwords this stupid was behind us, left to rot in the dark ages of the internet. $faithInHumanity--

IT is to blame (4, Interesting)

asifyoucare (302582) | more than 2 years ago | (#38992227)

The summary attempts to exonerate IT, suggesting that they asked the users to change their simple passwords. They should have known that many users would not change their password, so assigning simple passwords is a security stuff-up by IT. They can't just ask users to do something and then wash their hands of it.

Re:IT is to blame (1)

Anonymous Coward | more than 2 years ago | (#38992449)

I find users change their passwords when I give them difficult passwords :).

shabablaba (0)

Anonymous Coward | more than 2 years ago | (#38992275)

Allah will protect my account. Oh wait...

Old rumour regarding US nuke launch codes... (1)

Tastecicles (1153671) | more than 2 years ago | (#38992289)

...apparently the launch keys for each and every silo-based ICBM were/are all "0000000000" (ten zeroes). Scary.

Re:Old rumour regarding US nuke launch codes... (1)

Johann Lau (1040920) | more than 2 years ago | (#38992425)

Okay, now that the hardest part is solved - where to punch them in?

Re:Old rumour regarding US nuke launch codes... (1)

Tastecicles (1153671) | more than 2 years ago | (#38992657)

I doubt they'd be connected via public WAN... or could the US Government possibly be that stupid??

At least it wasn't a common password (1)

scourfish (573542) | more than 2 years ago | (#38992373)

As we all know, the most commonly used passwords are: love, sex, secret, and... god.

Apparently nobody bothered to read the IT guy's meticulously prepared memo.

Re:At least it wasn't a common password (0)

Anonymous Coward | more than 2 years ago | (#38992491)

Ah so then I guess even using this technique
http://xkcd.com/936/
secret_love_sex_god probably still isn't the most secure password...

Would YOU tell him he must change his password? (1)

Flavius Iulianus (1093015) | more than 2 years ago | (#38992377)

Dudes, He's a DICTATOR. If he doesn't want to change his password, what do you think will happen if you tell him "Mr. Assad, you can't log on until you change your password." a) He says "Oh, yes, thank you for helping me to remember how to protect the information of the Syria Arab Republic. You're a hero of the Republic. Here's your million dollars." b) He says "Screw you, who's the President here, you or me?" And then you find yourself as a street cleaner in Homs wearing safety orange.

Re:Would YOU tell him he must change his password? (1)

Osgeld (1900440) | more than 2 years ago | (#38992511)

more likely C) shot in the head for questioning his judgement

Advice-ignoring narcissists (0)

Anonymous Coward | more than 2 years ago | (#38992735)

This sort of thing is what makes dictators fall (until they die first). They all really are extreme narcissists who don't tolerate dissent at all, therefore ignore good advice, and eventually destroy themselves by their own mistakes. (Unfortunately for the rest of us, this usually does not happen until their country is destroyed as well).

Hacker walk of shame (4, Funny)

Anonymous Coward | more than 2 years ago | (#38992379)

As the hacker saw much to his horror that the Syrian President's e-mail password was indeed 12345 he tried to break the connection but it was too late. Word had spread and all knew that his most important hack was one that a five year old could have bested. A week later the hacker was found with a gun in his mouth and the numbers "12345" scrawled across his walls. His last e-mail was a simple "Who uses 12345 as a password!" Other hackers said that it was a tragedy that he would be remembered for one lame hack. Word came later that day that the Syrian President had beefed up security by using his son's name as his current password. Hackers world wide turned away in disgust and refused to stoop to hacking some one that lacked even basic internet skills.

Some turned their attention to hacking President Obama's e-mail until it was found he used the password "Romneysucksballs". No hacker would dignify such a password with a hack. Later that day it was revealed that Bill Gates used "stevejobsisaweiner" as his password but most knew this was the case since the late 90s.

Load More Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>