Are you pwned?

PeterWallace

PWN (verb)

1. An act of dominating an opponent.

2. Great, ingenious; applied to methods and objects.

Originally dates back to the days of WarCraft, when a map designer misspelled “Own” as “Pwn”. What was originally supposed to be “player has been owned.” was “player has been pwned”.

Pwn eventually grew from there and is now used throughout the online world, especially in online games.

  1. “I pwn these guys on battlenet”
  2.  “This strategy pwns!” or “This game pwn.”

 

About 50,000 breached records appear online every week.  Do any of them include your usernames and passwords?  A free website – http://www.pwnedlist.com – has been created that lets you easily check if your information has been compromised.  I sure would not want to be the one that sees the following message after inputting their information:

PWNED LIST

 As of November 4, 2011 almost 5 Million e-mail and user names were recorded in the system. PwnedList introduces itself as

“…a tool that allows an average person to check if their accounts have been compromised. No passwords are stored in our database. You can read more about where our data comes from here. Just enter an email address or username associated with any of your accounts to see if it’s on our list. Data entered is not stored, re-used, or given to any third parties. Don’t trust us? You can also use a SHA-512 hash of your email/username as input. Just don’t forget to lowercase all characters first.”

Now this will sound like great news to a lot of people. A team of security experts are doing some good work to help the folks on the internet find out whether or not they have been compromised. That’s great but how many of you know how to do a SHA-512 Hash?  Let alone what is? (You can find more information about the SHA-512 algorithm at The SHA-512 algorithm ) SHA512 is a hashing algorithm that cannot be decrypted so the information they have stored may be safe.

My worry about sites like this is what is stopping a hacker from putting up a site like this to collect information?  Sure the site looks good but if you’re worried that your user name or password may have been hacked it’s time to go change them.  Also you’re not using the same user name and password on different sites are you?  Are your passwords dictionary words?  Time to change that around and create secure passwords and different ones for the different sites you are using.

Think about it is it real safe or is it fakes just trying to get your information?

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers