<?xml version="1.0"?>
<rss version="2.0">
	<channel>
		<title>Online password managers?</title>
		<link>http://www.allegro.cc/forums/view/613770</link>
		<description>Allegro.cc Forum Thread</description>
		<webMaster>matthew@allegro.cc (Matthew Leverton)</webMaster>
		<lastBuildDate>Tue, 14 Jan 2014 03:58:19 +0000</lastBuildDate>
	</channel>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Anyone ever use them?</p><p>I&#39;ve used GoogleDocs before, but they <b>still</b> don&#39;t support per-document passwords. So since GoogleDocs is likely tied to E-mail account, it would stand to reason that a <b>very</b> strong password should be protecting my e-mail/drive.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Chris Katko)</author>
		<pubDate>Sat, 11 Jan 2014 05:11:11 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>In this day and age, why would you keep something of such value on the Internet, especially hosted on US soil (as LastPass is)?
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (SiegeLord)</author>
		<pubDate>Sat, 11 Jan 2014 05:31:24 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995107#target">SiegeLord</a> said:</div><div class="quote"><p>
In this day and age, why would you keep something of such value on the Internet, especially hosted on US soil (as LastPass is)?
</p></div></div><p>
I&#39;m not worried about the NSA. I&#39;m worried about random Chinese/Russians/Script-Kiddies getting access to my password file. My wife&#39;s accounts have been compromised before, and once my debit card (which got picked up immediately, some kid buying... WoW stuff). But not everyone is as thorough as by bank/credit card in keeping my data safe. My random Linux box connected to the internet isn&#39;t going to have staff keeping an eye on it.</p><p>And it&#39;s not that passwords are hard. It&#39;s that every bloody website has their own idea of what constitutes a &quot;valid&quot; password and many of them do not overlap.</p><p>GoDaddy requires you to use an account <b>number</b> instead of a name for frak sake. I mean what is this, the stone age? </p><p>Let me clarify. GoogleDocs would be <b>great</b> if only it allowed an additional password for file access instead of giving gaping access to my e-mail, social media, and documents. Which of course, is why I have to use my strongest password on my e-mail. It&#39;s good too!
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Chris Katko)</author>
		<pubDate>Sat, 11 Jan 2014 06:48:30 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>I use LastPass. If you&#39;re talking NSA, why do they need your passwords? They already have all the backdoors they need. Plus, unless they&#39;re lying, there&#39;s no way to get at your passwords without your master password anyway.</p><p>Google Docs, or any Google service for that matter, is one of the last places I&#39;d store sensitive data like passwords. They have absolutely zero reason to make it secure enough (if they can&#39;t read it, then they can&#39;t use it to target ads at you).</p><p>Please, use the proper tool for this job... a <i>proper</i> password manager.</p><p>[edit]<br />But yes, to answer your question, I do use LastPass (premium) myself. I&#39;ve not had any problems with it, and the Chrome plugin is great. There are only a handful of passwords I have committed to memory, the rest are unique, long, randomly generated strings of <span class="cuss"><span><span class="cuss"><span>shit</span></span></span></span>.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (BAF)</author>
		<pubDate>Sat, 11 Jan 2014 10:17:04 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>I use Lastpass. Works great.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Matthew Leverton)</author>
		<pubDate>Sat, 11 Jan 2014 17:45:47 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995111#target">BAF</a> said:</div><div class="quote"><p> They already have all the backdoors they need.</p></div></div><p>I store passwords in my password manager for more things than just random websites. While each random website (especially if it is hosted on US soil) could be/is compromised, those items individually are not as likely to be.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (SiegeLord)</author>
		<pubDate>Sun, 12 Jan 2014 02:10:40 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>You guys store your passwords online? Mind blown <img src="http://www.allegro.cc/forums/smileys/shocked.gif" alt=":o" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (torhu)</author>
		<pubDate>Sun, 12 Jan 2014 02:16:23 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>I store mine on sheets of paper which my roomies would be unable to decide what they&#39;re for or how they&#39;re used.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Arthur Kalliokoski)</author>
		<pubDate>Sun, 12 Jan 2014 02:22:18 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995139#target">torhu</a> said:</div><div class="quote"><p> You guys store your passwords online?</p></div></div><p>Everybody does.</p><p>Your password here is stored as bcrypt hash. If somebody gets access to the database and they wish to target you, they&#39;ll be able to crack your easy-to-remember password. And if it is the same as your other passwords, or similar enough, they may easily be able to get in to your other sites.</p><p>The difference with using Lastpass is that those dozens of insecure sites you use all now have different, random, and very hard to crack passwords. </p><p>And what&#39;s the difference between storing your encrypted file of passwords on your workstation that is connected to the Internet, or a Lastpass server that is connected to the Internet? I bet it&#39;s easier to break into your computer.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Matthew Leverton)</author>
		<pubDate>Sun, 12 Jan 2014 03:16:09 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995143#target">Matthew Leverton</a> said:</div><div class="quote"><p>
 I bet it&#39;s easier to break into your computer.
</p></div></div><p>
Impossible! I&#39;m running OS/2 Warp!</p><p>I heard a funny story from a security admin at a conference about boxes he connected to the internet that he told the world &quot;own my box.&quot; More or less every box would be &quot;owned&quot; sooner or later except one in Alaska... that he forgot about. It was running a FreeBSD distro so old that it had custom compiled binaries that didn&#39;t use modern binary formats (whenever that big switch happened) so all of the exploits people tried to run didn&#39;t work because they weren&#39;t binary compatible. [Vagueish story it&#39;s been a few years.] I&#39;ll see if I can find the source [Notacon 4 2007, Bruce Potter]
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Chris Katko)</author>
		<pubDate>Sun, 12 Jan 2014 03:41:09 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Is there any way to use LastPass with standalone android apps?</p><p>edit: nevermind, theres an ime.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Thomas Fjellstrom)</author>
		<pubDate>Sun, 12 Jan 2014 04:31:35 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995143#target">Matthew Leverton</a> said:</div><div class="quote"><p>And what&#39;s the difference between storing your encrypted file of passwords on your workstation that is connected to the Internet, or a Lastpass server that is connected to the Internet? I bet it&#39;s easier to break into your computer. </p></div></div><p>

I don&#39;t know about that other stuff, but I&#39;m pretty sure it would be a major pain in the <span class="cuss"><span>ass</span></span> for someone in Eastern Europe, Africa, or China to get hold of my local file of secret stuff <img src="http://www.allegro.cc/forums/smileys/grin.gif" alt=";D" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (torhu)</author>
		<pubDate>Sun, 12 Jan 2014 05:40:44 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Actually, a great idea that would stump even government officials? NTFS Alternate Data streams. You can hide entire files inside files... that won&#39;t show up even in disk usage, and <b>won&#39;t copy</b> if the original file is moved out of the partition.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Chris Katko)</author>
		<pubDate>Sun, 12 Jan 2014 07:40:55 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>It&#39;ll still show up with data recovery tools, which they probably use.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Thomas Fjellstrom)</author>
		<pubDate>Sun, 12 Jan 2014 08:01:39 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Personally I think that having a &quot;password file&quot; is incredibly stupid. You underestimate the capacity of your brain if you think that you can&#39;t remember complex passwords. Granted, we don&#39;t like to learn new ones. I&#39;d never record them anywhere. That goes for a file on my machine (which could easily be compromised without me knowing), and a third party service (which could also easily be compromised without me knowing).</p><p>I imagine I do what most [smart] people do: reuse passwords based on a &quot;class&quot; system of importance. Most sites I consider useless and I avoid storing any deeply personal information on. I really couldn&#39;t care less if my account on these sites is compromised. I only created the account because I had to for some trivial function (that probably could have been granted without an account, but the programmer is &quot;special&quot;). Those sites all get a simple password that would be trivial to crack, and I&#39;m certain that I have inadvertently sent it to an IRC channel more than 3 times. The password that I choose for any given site is also based on how much I trust them to secure it.</p><p>Alarmingly I find that financial sites (bank, PayPal, etc.) are actually the worst for password limitations. I&#39;d attempt to give them an extremely complex passphrase only to discover that I can&#39;t because all of the various character classes that I&#39;m using aren&#39;t allowed and/or they have a physical size limit... OMFG, shake my head... I&#39;ve even messaged my bank several times telling them they need to fix it. The response I get back is always, &quot;We appreciate your feedback, but the limitations we have on our passwords protect you from dangerous characters!&quot; Which is really just another way of saying that either the programmers employed by that bank are incompetent, and/or the managers are...
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Sun, 12 Jan 2014 08:41:29 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>one of my credit cards has a site that requires digits in your username. now isn&#39;t that super extra secure!
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Thomas Fjellstrom)</author>
		<pubDate>Sun, 12 Jan 2014 08:53:21 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995152#target">bamccaig</a> said:</div><div class="quote"><p> I&#39;d attempt to give them an extremely complex passphrase only to discover that I can&#39;t because all of the various character classes that I&#39;m using aren&#39;t allowed and/or they have a physical size limit... OMFG, shake my head... </p></div></div><p>So basically your method doesn&#39;t work.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (SiegeLord)</author>
		<pubDate>Sun, 12 Jan 2014 09:21:57 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>No method works with them. Their system is inherently insecure. And they&#39;re too incompetent to comprehend the weaknesses. They&#39;re convinced that they&#39;re making things more secure.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Sun, 12 Jan 2014 09:27:39 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>I&#39;ve got LastPass setup so my wife can have her passwords automated, and routinely dump the LastPass passwords into KeePass (every month or so; we usually don&#39;t update or add passwords more frequently than that).</p><p>KeePass + Dropbox, where the KeePass database requires both a password and a key file (which I don&#39;t store in Dropbox).</p><p>I use KeePass because LastPass doesn&#39;t work in Incognito mode, nor do I want LastPass &quot;tied&quot; to me when I&#39;m on the TOR network.</p><p>Google: My main accounts have 2-step authentication, where some use an SMS message and the others uses the Google Authenticator app. I&#39;ve got Application Passwords enabled (or whatever the official name of those are called) so my email and contacts can&#39;t be accessed with my normal login password.</p><p>I also visit YouTube on a browser running AdBlock with which I&#39;ve never signed into my Google accounts. It gives me ad-free videos without linking all those into my Watched History.</p><p>And if I ever need to check something from work, I just ssh tunnel into my home computer and make it handle all my requests from there.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (OnlineCop)</author>
		<pubDate>Sun, 12 Jan 2014 14:10:08 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995159#target">OnlineCop</a> said:</div><div class="quote"><p>, I just ssh tunnel into my home computer</p></div></div><p>
So anyone can just ssh into an open ssh port on your home computer? I&#39;d never feel safe with that.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Elias)</author>
		<pubDate>Sun, 12 Jan 2014 14:59:28 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995160#target">Elias</a> said:</div><div class="quote"><p> So anyone can just ssh into an open ssh port on your home computer? I&#39;d never feel safe with that. </p></div></div><p>Have you ever done it?  Used ssh, I mean.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Arthur Kalliokoski)</author>
		<pubDate>Sun, 12 Jan 2014 15:00:12 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Yes, ssh-tunneling so I can use the internet from work. What I&#39;m saying is I don&#39;t feel it&#39;s safe at all.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Elias)</author>
		<pubDate>Sun, 12 Jan 2014 15:28:36 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title">Quote:</div><div class="quote"><p>
The keys that Amazon EC2 uses are 1024-bit SSH-2 RSA keys. You can have up to five thousand key pairs per region.
</p></div></div><p>
Not bad... not bad... if I need more, then I&#39;m probably someone hiding something expensive enough to hire <b>security professionals</b>, or at the very least, the time and effort to increase the difficulty.</p><p>[edit] It appears that PR documentation is old and <a href="http://docs.aws.amazon.com/AWSEC2/latest/CommandLineReference/ApiReference-cmd-CreateKeyPair.html">2048-bit</a> is standard. But don&#39;t quote me on that yet.</p><p>[edit 2]</p><div class="quote_container"><div class="title">Quote:</div><div class="quote"><p>
Supported lengths: 1024, 2048, and 4096.
</p></div></div><p>
Booya.</p><p>That&#39;s a lot of work to get access to my bloody resume.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Chris Katko)</author>
		<pubDate>Sun, 12 Jan 2014 17:08:55 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995162#target">Elias</a> said:</div><div class="quote"><p> Yes, ssh-tunneling so I can use the internet from work. What I&#39;m saying is I don&#39;t feel it&#39;s safe at all.</p></div></div><p>What precludes you from using a key instead of a password? I assume OnlineCop has only a single work computer to generating a single key pair shouldn&#39;t be a problem.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (SiegeLord)</author>
		<pubDate>Sun, 12 Jan 2014 18:45:13 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995165#target">SiegeLord</a> said:</div><div class="quote"><p>What precludes you from using a key instead of a password?</p></div></div><p>
I am using a key, but anyone with access to my work computers harddrive as well as the NSA have it as well :p
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Elias)</author>
		<pubDate>Sun, 12 Jan 2014 21:13:23 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995168#target">Elias</a> said:</div><div class="quote"><p> access to my work computers harddrive</p></div></div><p>Well there&#39;s your problem right there.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Arthur Kalliokoski)</author>
		<pubDate>Sun, 12 Jan 2014 21:17:39 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995168#target">Elias</a> said:</div><div class="quote"><p> I am using a key, but anyone with access to my work computers harddrive as well as the NSA have it as well :p</p></div></div><p>That could be a good thing <img src="http://www.allegro.cc/forums/smileys/wink.gif" alt=";)" />... &quot;I didn&#39;t download all these movies and music, someone ssh&#39;d into my computer and did it!&quot;</p><p>More seriously, why not password protect that key? I recently switched to using password protected ssh keys for exactly that reason... it&#39;s a bit of a pain to use ssh-agent all the time, but I find that I feel a lot safer.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (SiegeLord)</author>
		<pubDate>Sun, 12 Jan 2014 22:52:57 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995172#target">SiegeLord</a> said:</div><div class="quote"><p>
More seriously, why not password protect that key? I recently switched to using password protected ssh keys for exactly that reason... it&#39;s a bit of a pain to use ssh-agent all the time, but I find that I feel a lot safer.
</p></div></div><p>
Yeah, but you lose the automation factor of not having to enter a password. </p><p>But in general, if your computer is physically compromised, a password on the key file isn&#39;t going to help you. Even if your password file has a 16368-bit cipher, it won&#39;t help <b>if it&#39;s already logged in</b>!
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Chris Katko)</author>
		<pubDate>Mon, 13 Jan 2014 02:18:11 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>My work bought me a new Macbook Pro, which I wiped and reinstalled the OS. I take it home with me every day, and I&#39;m paranoid enough to always lock my screen whenever I walk away (it&#39;s nice to have a hotkey to lock the desktop).</p><p>So I&#39;m pretty confident that none of my co-workers have accessed my laptop and obtained my private key. My router only accepts SSH on a specific port (something like 16666 or some other) and it denies all SSH requests that don&#39;t already have a key pair set up.</p><p>The router forwards that port to 22, through which I connect to my home computer.</p><p>It&#39;s very possible that I&#39;ve forgotten something and have already been hacked, but I never do anything illegal from that work computer anyway (I just want to use it to remain anonymous <img src="http://www.allegro.cc/forums/smileys/undecided.gif" alt=":-/" /> ).</p><p>If you guys have suggestions on how to be more secure, I&#39;m all ears. I figure you can always be paranoid, but can you be paranoid <i>enough</i>? <img src="http://www.allegro.cc/forums/smileys/grin.gif" alt=";D" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (OnlineCop)</author>
		<pubDate>Mon, 13 Jan 2014 08:33:06 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995178#target">Chris Katko</a> said:</div><div class="quote"><p> Yeah, but you lose the automation factor of not having to enter a password. </p></div></div><p>You enter it once per session (or, if you set a time out, only every couple or so minutes). Either way, there&#39;s more to using public key login than just convenience.</p><div class="quote_container"><div class="title">Quote:</div><div class="quote"><p> Even if your password file has a 16368-bit cipher, it won&#39;t help if it&#39;s already logged in!</p></div></div><p>ssh-agent has a timeout option, and so does Keepass (which is what I use for my password management). You could also always manually log out if you hear the partyvan pull up.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (SiegeLord)</author>
		<pubDate>Mon, 13 Jan 2014 09:09:10 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995185#target">OnlineCop</a> said:</div><div class="quote"><p>
My work bought me a new Macbook Pro, which I wiped and reinstalled the OS. I take it home with me every day, and I&#39;m paranoid enough to always lock my screen whenever I walk away (it&#39;s nice to have a hotkey to lock the desktop).
</p></div></div><p>
If you have a Mac, thanks to the absurd hyper-valuation of mac products (both new and as old as the Apple II!), you&#39;re biggest problem with your Mac is it being <b>physically stolen</b> and sold at a pawn shop/flea market/directly-to-college-kids. The computer itself is a thousand times more valuable and easy to access than anything you might have on your computer.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Chris Katko)</author>
		<pubDate>Mon, 13 Jan 2014 10:46:53 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995187#target">Chris Katko</a> said:</div><div class="quote"><p>The computer itself is a thousand times more valuable and easy to access than anything you might have on your computer. </p></div></div><p>

On my work laptop it&#39;s the opposite. The computer itself is maybe 1000€, my boss&#39; secret code on there is (at least according to him) worth millions.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Elias)</author>
		<pubDate>Mon, 13 Jan 2014 18:28:25 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/613770/995191#target">Elias</a> said:</div><div class="quote"><p>
On my work laptop it&#39;s the opposite. The computer itself is maybe 1000€, my boss&#39; secret code on there is (at least according to him) worth millions.
</p></div></div><p>
That&#39;s what I&#39;m getting at. Security is application dependant.</p><p>My laptop is a lot harder to steal:</p><p><a href="http://oldcomputers.net/pics/compaqI.JPG">http://oldcomputers.net/pics/compaqI.JPG</a>
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Chris Katko)</author>
		<pubDate>Tue, 14 Jan 2014 03:58:19 +0000</pubDate>
	</item>
</rss>
