{"id":3842,"date":"2010-12-13T12:31:25","date_gmt":"2010-12-13T12:31:25","guid":{"rendered":"https:\/\/test.transversalmedia.eu\/about-password-security\/"},"modified":"2010-12-13T12:31:25","modified_gmt":"2010-12-13T12:31:25","slug":"about-password-security","status":"publish","type":"post","link":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/","title":{"rendered":"About Password security"},"content":{"rendered":"<p>If you were\/ are a Gawker Media commenter and changed your password, it might not be enough to protect yourself. If you used that password somewhere else, now others can access those profiles as well. But how to know if you used that password somewhere else when everyone has profiles at so many places, right? For Firefox users, there is a trick.<\/p>\n<p>Go to Preferences and then click on Security. This is the window that will populate:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg\" \/><\/p>\n<p>Click on &ldquo;Saved Passwords&rdquo; and new (smaller) window will pop up. It will contain a list of all sites with their respective stored passwords. At the bottom, a menu of options like this will show:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8w8VxaG1qcrizfo1_400.jpg\" width=\"299\" height=\"51\" \/><\/p>\n<p>Now, highlight the sites on the list one by one and click on &ldquo;show passwords&rdquo; each time. That&rsquo;s how you can go through the list and check if you have used the password somewhere else (and change it accordingly). Keep in mind this: in the hacked database, not only usernames and some passwords have been made public but also the email address associated to them. So, if you used the email address to sign up some place elsewhere, it&rsquo;s better to double check and change the passwords accordingly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you were\/ are a Gawker Media commenter and changed your password, it might not be enough to protect yourself. If you used that password somewhere else, now others can access those profiles as well. But how to know if you used that password somewhere else when everyone has profiles at so many places, right? &#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"loftocean_post_format_gallery":"","loftocean_post_format_gallery_ids":"","loftocean_post_format_gallery_urls":"","loftocean_post_format_video_id":0,"loftocean_post_format_video_url":"","loftocean_post_format_video_type":"","loftocean_post_format_video":"","loftocean_post_format_audio_type":"","loftocean_post_format_audio_url":"","loftocean_post_format_audio_id":0,"loftocean_post_format_audio":"","loftocean-featured-post":"","loftocean-like-count":0,"loftocean-view-count":1007,"loftocean_coauthors":"","alpaca_post_content_reading_setting":"","alpaca_reading_speed_per_minute":0,"alpaca_reading_speed_unit":"","alpaca_single_post_template_layout":"","footnotes":""},"categories":[1],"tags":[843,1829,2250],"class_list":["post-3842","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-gawker-media","tag-servicey","tag-why-didnt-lifehacker-point-out-these-things"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>About Password security - The Research Papers<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About Password security - The Research Papers\" \/>\n<meta property=\"og:description\" content=\"If you were\/ are a Gawker Media commenter and changed your password, it might not be enough to protect yourself. If you used that password somewhere else, now others can access those profiles as well. But how to know if you used that password somewhere else when everyone has profiles at so many places, right? ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/\" \/>\n<meta property=\"og:site_name\" content=\"The Research Papers\" \/>\n<meta property=\"article:published_time\" content=\"2010-12-13T12:31:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg\" \/>\n<meta name=\"author\" content=\"Flavia Dzodan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Flavia Dzodan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/\"},\"author\":{\"name\":\"Flavia Dzodan\",\"@id\":\"https:\/\/theresearchpapers.org\/archive\/#\/schema\/person\/69281d20ffc4c45de29cedfa61ec6e38\"},\"headline\":\"About Password security\",\"datePublished\":\"2010-12-13T12:31:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/\"},\"wordCount\":211,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/theresearchpapers.org\/archive\/#organization\"},\"image\":{\"@id\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg\",\"keywords\":[\"Gawker Media\",\"Servicey\",\"why didn't Lifehacker point out these things?\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/\",\"url\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/\",\"name\":\"About Password security - The Research Papers\",\"isPartOf\":{\"@id\":\"https:\/\/theresearchpapers.org\/archive\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg\",\"datePublished\":\"2010-12-13T12:31:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#primaryimage\",\"url\":\"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg\",\"contentUrl\":\"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg\",\"width\":500,\"height\":388},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/theresearchpapers.org\/archive\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About Password security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/theresearchpapers.org\/archive\/#website\",\"url\":\"https:\/\/theresearchpapers.org\/archive\/\",\"name\":\"The Research Papers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/theresearchpapers.org\/archive\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/theresearchpapers.org\/archive\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/theresearchpapers.org\/archive\/#organization\",\"name\":\"The Research Papers\",\"url\":\"https:\/\/theresearchpapers.org\/archive\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/theresearchpapers.org\/archive\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/07\/cropped-Screenshot-2021-07-29-at-15.01.52.png\",\"contentUrl\":\"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/07\/cropped-Screenshot-2021-07-29-at-15.01.52.png\",\"width\":943,\"height\":269,\"caption\":\"The Research Papers\"},\"image\":{\"@id\":\"https:\/\/theresearchpapers.org\/archive\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/theresearchpapers.org\/archive\/#\/schema\/person\/69281d20ffc4c45de29cedfa61ec6e38\",\"name\":\"Flavia Dzodan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/theresearchpapers.org\/archive\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3eedf3ed7334274cfc4d525a46aa4e85c5a246418835528410ecf354d0861e1?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3eedf3ed7334274cfc4d525a46aa4e85c5a246418835528410ecf354d0861e1?s=96&d=monsterid&r=g\",\"caption\":\"Flavia Dzodan\"},\"url\":\"https:\/\/theresearchpapers.org\/archive\/author\/trp-adm-fdz02\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About Password security - The Research Papers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/","og_locale":"en_US","og_type":"article","og_title":"About Password security - The Research Papers","og_description":"If you were\/ are a Gawker Media commenter and changed your password, it might not be enough to protect yourself. If you used that password somewhere else, now others can access those profiles as well. But how to know if you used that password somewhere else when everyone has profiles at so many places, right? ...","og_url":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/","og_site_name":"The Research Papers","article_published_time":"2010-12-13T12:31:25+00:00","og_image":[{"url":"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg","type":"","width":"","height":""}],"author":"Flavia Dzodan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Flavia Dzodan","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#article","isPartOf":{"@id":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/"},"author":{"name":"Flavia Dzodan","@id":"https:\/\/theresearchpapers.org\/archive\/#\/schema\/person\/69281d20ffc4c45de29cedfa61ec6e38"},"headline":"About Password security","datePublished":"2010-12-13T12:31:25+00:00","mainEntityOfPage":{"@id":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/"},"wordCount":211,"commentCount":0,"publisher":{"@id":"https:\/\/theresearchpapers.org\/archive\/#organization"},"image":{"@id":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#primaryimage"},"thumbnailUrl":"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg","keywords":["Gawker Media","Servicey","why didn't Lifehacker point out these things?"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/theresearchpapers.org\/archive\/about-password-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/","url":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/","name":"About Password security - The Research Papers","isPartOf":{"@id":"https:\/\/theresearchpapers.org\/archive\/#website"},"primaryImageOfPage":{"@id":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#primaryimage"},"image":{"@id":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#primaryimage"},"thumbnailUrl":"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg","datePublished":"2010-12-13T12:31:25+00:00","breadcrumb":{"@id":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/theresearchpapers.org\/archive\/about-password-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#primaryimage","url":"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg","contentUrl":"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/08\/tumblr_ldd8urbM9R1qcrizfo1_500.jpg","width":500,"height":388},{"@type":"BreadcrumbList","@id":"https:\/\/theresearchpapers.org\/archive\/about-password-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/theresearchpapers.org\/archive\/"},{"@type":"ListItem","position":2,"name":"About Password security"}]},{"@type":"WebSite","@id":"https:\/\/theresearchpapers.org\/archive\/#website","url":"https:\/\/theresearchpapers.org\/archive\/","name":"The Research Papers","description":"","publisher":{"@id":"https:\/\/theresearchpapers.org\/archive\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/theresearchpapers.org\/archive\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/theresearchpapers.org\/archive\/#organization","name":"The Research Papers","url":"https:\/\/theresearchpapers.org\/archive\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/theresearchpapers.org\/archive\/#\/schema\/logo\/image\/","url":"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/07\/cropped-Screenshot-2021-07-29-at-15.01.52.png","contentUrl":"https:\/\/theresearchpapers.org\/archive\/wp-content\/uploads\/2021\/07\/cropped-Screenshot-2021-07-29-at-15.01.52.png","width":943,"height":269,"caption":"The Research Papers"},"image":{"@id":"https:\/\/theresearchpapers.org\/archive\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/theresearchpapers.org\/archive\/#\/schema\/person\/69281d20ffc4c45de29cedfa61ec6e38","name":"Flavia Dzodan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/theresearchpapers.org\/archive\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3eedf3ed7334274cfc4d525a46aa4e85c5a246418835528410ecf354d0861e1?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3eedf3ed7334274cfc4d525a46aa4e85c5a246418835528410ecf354d0861e1?s=96&d=monsterid&r=g","caption":"Flavia Dzodan"},"url":"https:\/\/theresearchpapers.org\/archive\/author\/trp-adm-fdz02\/"}]}},"loftoceanMetas":{"readingTime":"&lt; 1 min read","authorName":"Flavia Dzodan","categories":[{"name":"Uncategorized","link":"https:\/\/theresearchpapers.org\/archive\/category\/uncategorized\/","count":3467}],"date":"13.12.2010"},"_links":{"self":[{"href":"https:\/\/theresearchpapers.org\/archive\/wp-json\/wp\/v2\/posts\/3842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/theresearchpapers.org\/archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/theresearchpapers.org\/archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/theresearchpapers.org\/archive\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/theresearchpapers.org\/archive\/wp-json\/wp\/v2\/comments?post=3842"}],"version-history":[{"count":0,"href":"https:\/\/theresearchpapers.org\/archive\/wp-json\/wp\/v2\/posts\/3842\/revisions"}],"wp:attachment":[{"href":"https:\/\/theresearchpapers.org\/archive\/wp-json\/wp\/v2\/media?parent=3842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/theresearchpapers.org\/archive\/wp-json\/wp\/v2\/categories?post=3842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/theresearchpapers.org\/archive\/wp-json\/wp\/v2\/tags?post=3842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}