Hacker Newsnew | past | comments | ask | show | jobs | submit | eidorianu's commentslogin

Google "upgrading" services to suspension:

"Discontinued in 2012, the G Suite legacy free edition has provided access to premium Google Apps features for over 10 years. On June 1, 2022, Google will begin upgrading G Suite legacy free edition accounts to Google Workspace."

"If you do not take action by June 1, 2022, Google will begin transitioning your organization to a new Google Workspace subscription. To complete the transition and avoid account suspension, enter your billing details in your Admin Console before August 1, 2022."



What about DDG? DDG supposedly doesn't know about the user searching.


^ Just followed this. It worked. Seems like they are batching the stock avail. Got the 8GB at 9:45 PST Good luck!

EDIT: server interacting popups are the root of all evil.


I agree, I've tried several passwords and they match. If you're a Math person, please shed some light on the chances that this list covers the full space.


I'm not a math person either, but here's some fodder for someone who is.

Mark Burnett's extensive password collection (which he acknowledges is skewed, because it's largely based on cracked passwords, he only harvests passwords between 3 and 30 chars, etc.). Here's how some of his stats shake out:

* Although my list contains about 6 million username/password combos, the list only contains about 1,300,000 unique passwords.

* Of those, approximately 300,000 of those passwords are used by more than one person; about 1,000,000 only appear once (and a good portion of those are obviously generated by a computer).

* The list of the top 20 passwords rarely changes and 1 out of every 50 people uses one of these passwords.

So it's conceivable that 6M unique passwords could cover a very significant portion of a 120M user namespace.

Ref: http://xato.net/passwords/how-i-collect-passwords


It's neat that the hashes are unique enough to serve as their own key. Obvious in retrospect, but still neat.

Curious why some of the hashes have been obscured with 00000 but not all. It means more than one possible password could generate the remaining characters, but what does that help or protect?


6.5 million? Off the top of my head, assuming that passwords are only letters and 5 characters long this still wouldn't cover the possible space. [I think it's safe to ignore hash collisions]

Are you trying passwords you've used on other sites, or random ones? If it's the former, then LI might not be the only source for the file.


0. There are known cases of peoples' passwords (including my own) not on the list.


Any password that I try works...


Google Galaxy Nexus: ~400 usd (Play Store)

Menotek Micro USB to HDMI MHL Adapter: ~13 usd (Amazon)

Microsoft Bluetooth Mobile Keyboard 6000: ~50 usd (Staples)

Microsoft Bluetooth Notebook Mouse 5000: ~50 usd (Staples)

Full Android ICS Desktop, battery, camera/mic, hspda+, 1920x1080, Chrome for Android.

EDIT: added camera/mic, format


Intriguing. Have you or someone you know actually used this setup?


It looks like she/he was ultimately "walking away from the river" (and his family) on the first answer given.


True! I gave him 3 creative answers and the job required me to be creative. I felt I had shown that with my answers.

In hindsight, the office was shutdown and I would have been there only a few months. The scary thought is that he's out there somewhere continuing with this interview technique.


Nothing to see here. Move along.


I think the whole of Hacker News thanks you for this generous service you provide for them. You are, truly, a hero.


We will not target a significant progress in US-EAST-1. (I knew it!)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: