arturotuono: 6-7, but it was a word but not in English.
Then it's technically more like 1-3 based on that scale, because if it's an actual word then it's in a dictionary and vulnerable. English word or not.
wpegg: One other site suggests that (unless it happened to be a site all other compromised accounts visited, which I feel unlikely) that this is a direct GOG vulnerability.
Not really, it suggests an easily guessable password.
... oh my god, why do people
still not download things from their proper source? I mean, why download the GoG Galaxy client from GoG directly, when you can download it from some random sketchy website completely unaffiliated with GoG because they're
never infected with malware, am I right?
Ugh! Seriously, this shouldn't even need a warning, this
should be common-freaking-sense.
[edit]
JMich: To quote Intel, "Compl3xity_<_Length"
While true that a short complex password is easier to brute force than a long phrase of standard words, there are far too many websites that don't let you have very long passwords making passphrases next to useless. Which is why I use a password manager to randomly generate long passwords. I get complexity and I tailor the length to whatever the longest the website will allow.
wpegg: Would you tell a hit and run victim that just described a bmw to say, "don't cross while a bmw is coming".
Yes. Actually. If the victim was crossing the street into oncoming traffic, that was a very stupid thing to do. It's better to learn your lessons and
why something happened. It's the only way to not make the same mistakes again in the future.
"You got hit by a bmw because you crossed the street while a bmw was coming towards you. Don't do that again and you won't likely be hit by another car in the future."
"Your account got compromised because you used a dictionary word for a password, regardless whether it was an English dictionary, don't do that again and you won't likely be compromised in the future."