Well the password cracker used the IP <b>124.13.180.168</b> which is stated to be in <b>Malaysia</b>. <br>I changed the password within minuted after it was cracked but the harm was already done. But the cracker did not change the password neither sent any requests for new password. <br>
<br><br><div class="gmail_quote">On Sat, Apr 24, 2010 at 10:53 AM, Ramnarayan.K <span dir="ltr"><<a href="mailto:ramnarayan.k@gmail.com">ramnarayan.k@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div class="im">On Sat, Apr 24, 2010 at 12:31 AM, Manish Sinha <<a href="mailto:mail@manishsinha.net">mail@manishsinha.net</a>> wrote:<br>
><br>
</div><div class="im">> You can use Google accounts SMS password recovery.<br>
> This is something nice since I find mobile to be more secure than<br>
> password. Someone can install a key logger and steal your password and<br>
> even the secondary email address.<br>
> For account recovery via sms, the cracker has to get hold of your mobile<br>
> physically which makes this SMS recovery more reliable.<br>
> <a href="http://www.google.com/support/accounts/bin/answer.py?hl=en&answer=152124" target="_blank">http://www.google.com/support/accounts/bin/answer.py?hl=en&answer=152124</a><br>
<br>
</div><div class="im">One learns something new every day<br>
<br>
Thanks Manish, this is really useful to know. Makes life a bit less<br>
scary , esp if one is on vulnerable systems<br>
<br>
</div>ram<br>
<div><div></div><div class="h5"><br>
--<br>
ubuntu-in mailing list<br>
<a href="mailto:ubuntu-in@lists.ubuntu.com">ubuntu-in@lists.ubuntu.com</a><br>
<a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-in" target="_blank">https://lists.ubuntu.com/mailman/listinfo/ubuntu-in</a><br>
</div></div></blockquote></div><br>