Home Artists Posts Import Register

Downloads

Content

Watch the video version 

On this episode of The Extreme Life of Matt Hardy, Matt and Jon discuss the legacy of Matt's childhood wrestling hero, "Macho Man" Randy Savage! Find out how Savage influenced Matt to step in a ring, plus, hear Matt's thoughts on the new AEW Collision show!

Subscribe to AFS on YouTube and be sure to hit the notifications button.

Gear up with the latest AFS merch with tees, hats, bags and more at AdFreeMerch.com.

Files

Comments

Anonymous

Nice! I didn’t know this about Matt. Makes sense though bc Macho was the ultimate character.

Anonymous

Sorry to hear about Matt having his Twitter hacked. I have enough knowledge in this area to know how to protect yourself as wellas possible. Now sounds like a good time to share that knowledge. It's a bit too late for Matt. But maybe this will help others. 50% of it is actually on the sites you use. Since there's nothing you can really do about that, I'll ignore those topics. First of all, use a different password for every site you're a member of. The vast majority of the time somebody has an account hacked, the password itself was actually stolen from a different site. Different passwords on each site means there's only site they can get into with that password. Assuming Matt's password was stolen from another site, chances are the hacker who stole his initial password and the person who hacked his Twitter are two different people. How do I know this? Passwords are kept in decrypted for in something called a passfile. Getting one is very hard. That's a part of why most hacked accounts had their password stolen on another site. It's because they can't steal the passfile from the site they want access to. Also, if you have access to a site to the point where you can get the passfile, you have much deeper access to that site than you do by just logging in with somebody's password into a regular account. It would be like breaking into a house and stealing a key that only gets you access to the laundry room. When you were in the house where you got the key to begin with, you had access to the laundry room and the rest of the house as well. Make sense? Chances are it was a skript kiddie or "skiddie" who hacked his Twitter. That's not a real hacker. It's somebody who knows what somebody else taught them and that's the only hacking they can do. These are what most of the hackers you encounter really are. True hackers don't like drawing attention to themselves. Skiddies have knowledge they haven't earned the right to and are quick to show that off. The next most important thing to do is make your passwords as strong as possible. Passwords are kept in the passfile in decrypted form. in order for a hacker or skiddie to use any of the accounts, the encryption has to be brocken. Your password gets run through a non-reversible mathematical algorithm. In number form if you multiply 3 by 9 then you get 27. All you have to do to get back to your original number is divide it by 9. Let's say that multiplication gets done by a number with a long remainder after the decimal. If a portion of that remainder gets lopped off, then when you divide it back, you get a completely different number. That's what encryption kind of does. The only way to find out what your password is is to run it through the same mathematical algorithm and see if the decrypted hash matches the one taken from the passfile. There's multiple differnt types of encryption and some take longer than others to run. Md5 is long out of date. My computer would do those at 1.300,000 attempts per second. You read that right. DES(unix) are around 10,000 guesses per second and md5(unix) at around 100 attempts per second. This is one of those things that's on the site's end. It's probably the only thing on their end I'll mention. You'll know why in a minute. We just established that you basically have to run a guess at the password through the decryption method used and see if the created hash mathces the one stored in the passfile. There are multiple ways of doing this. A dictionary attack uses a diction of words and runs them through the algorithm. A combined dictionary attack combines a word from one dictionary with a word from another dictionary to create a new word. Lets say your password was appleseed and for some reason it wasn't in the dictionary used in the dictionary attack. If apple is in one dictionary and seed is in the other, then a combined dictionary attack will eventually get to appleseed and crack your password. A mask attack adds an incremental number to the start or end of a dictionary word and tries that. Using the appleseed from above, it would try appleseed001, apleseed002, appleseed003 and so on and so forth all the way through the different parameters the person cracking the hash set. I'm willing to bet a mask attack would eventually cover 99% of the passwords used by people reading this. The last attack method is a brute force attack and that's the one you want to force them to use by using things like words that don't exist in a known dictionary. A brute force attack will just run through all the different possible combinations one right after another with the parameters set. The different parameters you can set are lowercase letters, uppercase letter, numbers and special characters. You want very long passwords that contain each of those things and the longer the better. The more possible combinations to your password the longer it will take to try and bruteforce it. Examples below are how many possibilities there are in a one digit, two digit and three digit password containing in order just lowercase letters followed by lowercase letters and uppercase letters followed by lowercase letters, uppercase letter and numbers and finally all four 26-676-17,576 possible combinations 52-2,704-140,608 possible combinations 62-3,844-238,328 possible combinations 84-7,056-592,704 possible combinations As you can see, the more possibilites there are, the longer it would take to possible crack your password. My Amazon password is 66 characters long and contains all 4 possiblities. We'll all be long dead before that gets cracked. Even worse, if they try to brute force the hash and don't include the special character option, then they'll never crack it no matter how long they try. On to the how. My passwords aren't passwords. They're sentences. That makes them a lot easier to remember. Since this is a wrestling patreon, I'll use a wrestling based sentence and turn it into an example of the password I recommend. thefingerpokeofdoomkilledwcw I don't believe that. But that's the example I'll use and spice it up using my above recommendations about uppercase, number and special characters. We'll capitalize wcw to WCW. That's an easy and we now have lowercase and uppercase letters. Using a special character as a space between words makes a ton of sense. I'll go with an underscore. Since a 1 looks like an I, then I'll replace the I's with a 1. Our new password now contains uppercase letters, lowercase letters, numbers and special characters. the_f1ngerpoke_of_doom_k1lled_WCW Look at the math I did earlier and run that out to the above password to figure out how many possible combinations you would have to run through to crack that password hash. It's a shitload. When somebody swipes a passfile, they aren't getting just one password, they're getting all of them for that site. If I'm decrypting 100,000 passwords and manage to get 99,000 of them, am I going to lose sleep about the last 1,000? NO!!! It's about not being low hanging fruit. If the above password is in an encrypted passfile, anybody trying to decrypt it will give up years before they ever get it. Additional advice: Matt mentioned two factor authorization. That's where a site sends you a one time use security code when you log in to go with your password. Not all sites offer that. If a site does, use it. If at all possible, try to create an email alias. An email alias is a second email that sends emails to the exact same email you're currently using. The only difference is you can't log in with it. Think about it. Every time you give somebody your email, you're giving them half of what they need to log in to it. Check your password rest process for your email. Are there people you know who can guess your secret question or whatever they need to reset it? If so, they can hack your password. Using an alias prevents that. Things like getting notified when a new device logs in using your account helps notify ou when your email is hacked. But it's too late by then. With all these different passwords and them being kind of hard to remember, it can be easy to forget one. I don't recommend password keepers. That's like telling people exactly where your passwords are and it's software like everything else. That mens it's vulnerable to potential hacks too. My advice is to hide your passwords on a mislabelled text document. Files have file extensions. A text document in windows is a .txt. Do you have a lot of mpss on your computer? Put your passwords on a text document and change the file extension to .mp3. It will look just like a regular mp3 file. You can do this with a bunch of different files. .dll files in a programs installation folder. Image files. Mine aren't even kept on this device. It's not going to occur to somebody that the corrupted .jpg file on my ps4 is my password backup. That's just an example. Keep your broser and computer up to date. Those security updates are almost always containing hole patches that are vulnerable to hacks until patched. I'm sure there's more I'm forgetting. This is long enough as is. I hope this helps somebody and I hope there's no limit on how long a post can be on Patron.

Anonymous

Thanks for this. I don’t think I would be the low hanging fruit but you definitely opened my eyes to making it even more difficult and how easy it can be to do so. Very informative on how that all works. Thanks Ron. Get the man a shirt or some kind of swag Adfreeshows! He deserves it!