1 00:00:00,240 --> 00:00:07,120 So we will use our email address and password to sign up for almost all the websites we are interested 2 00:00:07,120 --> 00:00:07,260 in. 3 00:00:07,740 --> 00:00:10,910 So there are there are so many data breaches going on. 4 00:00:11,070 --> 00:00:17,760 There are so many of us that we just and so many e-mails and passwords like the account credentials 5 00:00:17,760 --> 00:00:18,730 have been compromised. 6 00:00:19,500 --> 00:00:27,600 Are these hackers are trying their way into the databases and then they're exciting thing, them and 7 00:00:27,600 --> 00:00:28,190 the puzzle. 8 00:00:28,920 --> 00:00:35,850 So how if you go to this Web site to have a panda come, these guys are maintaining the database that 9 00:00:35,850 --> 00:00:39,030 contains all of the compromised emails and passwords. 10 00:00:39,030 --> 00:00:45,810 So these guys are not hacking, but there are already breaches and they are collecting information from 11 00:00:45,810 --> 00:00:49,830 those breaches, as you can see there, for 40 different websites. 12 00:00:50,130 --> 00:00:57,360 And see, these many accounts are already compromised and they have the database of these compromised 13 00:00:57,360 --> 00:00:57,930 accounts. 14 00:00:58,590 --> 00:01:00,420 So, as you can see, largest breaches. 15 00:01:00,960 --> 00:01:10,410 And these are the accounts, if you how a business websites, you can just check this e-mail address 16 00:01:11,340 --> 00:01:11,730 and. 17 00:01:13,760 --> 00:01:19,320 And I'm going to type in my email address, all you have to do is typing the address and how to verify 18 00:01:19,820 --> 00:01:22,280 if your account has been breached or not. 19 00:01:29,900 --> 00:01:32,270 So McKagan despond. 20 00:01:34,220 --> 00:01:36,330 It is good news, no pun it's fun. 21 00:01:37,310 --> 00:01:49,520 OK, so this my e-mail has not because I have no icons in these main, main Web sites, so that's sweet 22 00:01:50,090 --> 00:01:50,950 to me. 23 00:01:50,980 --> 00:01:51,520 Good news. 24 00:01:51,530 --> 00:01:57,200 And it is always a good practice to check like these Web sites, whether your e-mail addresses have 25 00:01:57,200 --> 00:01:58,080 been banned or not. 26 00:01:58,370 --> 00:01:59,930 And there is also another Web site. 27 00:02:00,830 --> 00:02:09,800 That is what is IP, what is my producer come and and Breccia might want to do is to enter an e-mail 28 00:02:09,800 --> 00:02:13,430 to see if you are concerned with the organization hit by breach or not. 29 00:02:14,660 --> 00:02:15,920 So if you can reach. 30 00:02:20,880 --> 00:02:26,190 So we had that, uh, e-mail you enter has no data we just saw. 31 00:02:28,190 --> 00:02:35,330 This Web site also using the database from having been dot com, so it's, uh, you can also check this 32 00:02:35,330 --> 00:02:36,230 out, this Web site. 33 00:02:36,680 --> 00:02:37,670 It's both the same. 34 00:02:38,780 --> 00:02:46,730 So you can use the password manager, one password, other pass to safely secure your passwords and 35 00:02:46,730 --> 00:02:47,990 the Web browser. 36 00:02:49,440 --> 00:02:56,670 So that's sort of what this has been part, and that is my circle, these this website 37 00:02:59,260 --> 00:03:03,320 allows used to check whether their accounts have been compromised or not.