During a routine check for uploaded junk, I saw two gzipped SQL files. I downloaded one (the other was huge) and found that it contained my password, as well as other user names. This means that any of our junk uploaders (and junk was uploaded) could have found this file, read it, and log in as anyone, including a sysop (the file also tells who is a sysop). Please change your passwords immediately to prevent this.
phma
I tried, but the page timed out while changing it. Now neither my old nor my new passwords work. Can someone please help me?
Just reset my password to anything, then reply, and I'll try changing it again.
Also, just checking: will the software accept a passphrase 28 characters long? (That's the length of the one I was going to use.)
__________________________________________________ Do You Yahoo!? Yahoo! - Official partner of 2002 FIFA World Cup http://fifaworldcup.yahoo.com
On Saturday 29 June 2002 15:11, Tim Chambers wrote:
I tried, but the page timed out while changing it. Now neither my old nor my new passwords work. Can someone please help me?
Just reset my password to anything, then reply, and I'll try changing it again.
Also, just checking: will the software accept a passphrase 28 characters long? (That's the length of the one I was going to use.)
The password is a "tinytext", whatever that is. (I know Postgres, not MySQL.) If the page timed out and it claims that you are not logged in, the new password is in effect. My guess is that a tinytext is shorter than 28 characters. Try the first 16 characters, and other lengths, of your password.
phma
The password is a "tinytext", whatever that is. (I know Postgres, not MySQL.) If the page timed out and it claims that you are not logged in, the new password is in effect. My guess is that a tinytext is shorter than 28 characters. Try the first 16 characters, and other lengths, of your password.
Scratch that idea. A tinytext is up to 255 characters.
phma
wikipedia-l@lists.wikimedia.org