I have previously written about one of my many responsibilities; contacting users whose login credentials have shown up in breach lists. While the pertinent results of the breach files are delivered to me in a flat file, I use Excel’s Text to Columns feature to separate logins (usually email addresses) from the password. While this might take a little fiddling with the delimiters, it is worth it to ensure that you have a good basis on which to work.
(more…)