Error opening template: advertisement/zones/468x60_generic.tplError opening template: advertisement/zones/728x90_leaderboard.tplError opening template: advertisement/zones/728x90_bottom_ad.tplError opening template: advertisement/zones/300x250_right_ros_up.tplError opening template: advertisement/zones/300x250_right_ros_down.tplError opening template: advertisement/zones/160x600_left_nav.tplError opening template: advertisement/zones/160x600_right_nav.tpl Create Passwords That Can't Be Hacked

Create Passwords That Can't Be Hacked

Perhaps you've spent a great deal of time and money on software or hardware to make your computer secure. But all the time, money and effort you put into your computer security will be a waste of money is you make the mistake of not creating a strong password. Passwords are usually the weakest link in the chain of computer security. Password cracking tools are constantly evolving so that some network passwords that once took weeks or months to break can be broken in mere hours.

Password Cracking Tools

Password cracking tools or software work using one of three or a combination of three approaches: dictionary attacks, intelligent guessing and automation.

Dictionary attacks goes through all possible words most likely to succeed from a list in a dictionary or even a religious book like a Bible. These attacks succeed because so many people choose simple passwords of fewer than seven characters easily found in a dictionary.

Intelligent guessing

In this method of computer guessing the software or the hacker goes through a list of possible passwords one by one sometimes even based on personal knowledge of the victim. Examples of guessing passwords is using a row of letters, the user's name or login, the vehicle license plate, date of birth, name of a pet, favorite celebrity, profanity or a slight spelling modification of any of the previous scenarios or adding a single number, like one, after the word.

Personal data can be collected from many sources including online where information such as the university you went to, the year you graduated and your major may be easily accessed.

Automation

This method, also sometimes called brute force, automatically tries every possible password based on knowledge of common password length and randomly choosing characters, letters or numbers.

Strong Password Dos

A strong password should be between eight to 10 characters. The password should contain both uppercase and lowercase letters, numbers and symbols. Make sure you have at least one symbol between the second and the sixth character of your password. Change your password routinely, every other month or so, depending on your personal chosen schedule and your security concerns. When you change your password, make sure the new one is significantly different from the previous one.

Strong Password Don'ts

Never use your name. You may use part of it as long as the rest of the characters of your password are not easily guessed. Don't use personal information like address, phone number, you school or birthdays. Spelling any of these options backwards isn't a good idea either since this is easily guessed.

Remembering Your Fabulous New Password

The biggest challenge to creating a difficult-to-hack password is managing it or remembering it. Try this formula. Create a strong base term, sometimes called a salt term, that's a date, place, phrase, event or anything else unique to you that you'll be able to remember. Create your own formula where you replace regular characters with special characters. An uppercase B could be replaced with "!" and the lowercase b could be replaced with "*(." Change this formula as frequently and simply plug in the appropriate replacement symbol, number or character.

 

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
Identity theft comes in many forms.

A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.

Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.

There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:

*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.