Showing Posts For koldan lonly.4293:
im having a horrible time with this fight, the closest ive gotten was with the fresh air D/D (i killed chomper once out of ~ 30 attempts, and immediatly died to that massive meat on a stick). got full berserker gear with ‘of strength’ runes, sigil of battle and blood lust (pre charged to 25 kills) as well as 3/6 ascended berserk ascended slots (i will not be able to get the rings in time and the backpiece is far too weak). tornado works suprisingly well to stun lock the mobs until there is ~ 3 meat on the ground but you cannot pick them up until it ends. in the mean time i am constantly being pulled, charged, or snared when im not using armor of earth or tornado so i have no idea what else to try. i have no other characters above level 20.
picked of strength over scholar because to be honest i am always well below 90% (on these gauntlets) but i always have might up, so to be oozing even more might seems like a win win.
ive tried fresh air D/D with heavy vigor and dodges (worked the best), sceptor, staff, and FGS builds i die at a laughable 90-95% health remaining on the boss’s
i dont have the money remaining to try to build yet another equipment set, so i am stuck with some combo of berserker and valkyrie. given we have only a few more days before the next content patch is due and the achievements/pets from this one are removed, i dont think i have a real shot.
i dont know what arena net had in mind when they decided to make temporary content that requires you to have a certain class/equipment set ready to go within 2 weeks or you miss out on a chunk of it. i do wish my earth elementals actually did theyre job and AGROED the mobs so i can do what eles are meant for and pew pew from a distance without needing to take damage.
i did a quick check on the howsecure site, there is no followup communication with any server according to my web proxy and i didnt see anything really fishy in the javascript. but of course its just stupid to use your actual password.
would be easyer to track this stuff if we could record log’s to a file (looted item, killed mob, damage done, ect)
Warning: wall of text
I am yet another one who is using a ‘completely unique no way that my password could possibly be used by someone else’ in addition to being only used for this game. the numbers involved are actually relevant to the word pattern so incrementing would be just as bad as changing one of the words.
by requiring me to change my password you make it MORE likely for me to choose one i use for a different game (which i no longer play) that (was) technically unique, than it is for me to memorize a brand new one, compromising the security of both logins. assuming of course that account wasn’t compromised and someone didn’t get my account blacklisted from that password already.
i have several types of passwords, each with patterns. first the ‘i don’t care if this thing is hacked because quite frankly i think they will sell my email and spam me’ pass. email accounts themselves (all unique but woefully old passwords), real life involved stuff (banks ect) true random giberish passwords i just hit password reset on when i need in, junk game logins (similar to junk sites but different pattern). and then valued games (steam, anet, blizzard)
could i generate a brand new truly unique password? sure. is it the easiest path? no. human nature is to follow the path of least resistance. while ANET may feel they’re successfully improving security by using a password that’s never been seen before… most of the population will just randomly increment or re use passwords until it successfully goes through the system.
that try your password website (no i didn’t use a real one, just a modified pattern) is a joke btw. using an assumed 4 billion passwords per second. different password hashes have different calculation times. (and if the hashes were also encrypted with no clues on when you successfully decrypted the hashes and can now compare them, good luck). Its quite easy to buy computational time or hooking multiple computers in parallel, driving 40 days down to 1 minute. Additional note: compared to hashing a password, looking up matches in a list of all known hashes is trivially fast. It may take 5 hours to brute force 1 password, it will also take 5 hours 2 minutes to brute force 100000 if they have the same allowed keys and length.
unless the password database is compromised, brute forcing just will not work. (number increment brute force is the only thing that has a shot before the account is disabled). most cases nowdays attack lazy reuse, phishing, or keyloggers. i am practically immune to the last 2 >=)