Within the aftermath of the RockYou attack, security researchers, both industrial and tutorial, did extensive research on the revealed passwords and compiled lists of the mostly used passwords and figured out the recurring algorithms that people had. http://advwagon.com/__media__/js/netsoltrademark.php?d=Yedlove5.com