Can I Guess Your Password?
We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?
But of course remembering all the different passwords can be a headache. And writing them down somewhere isn't a great deal safer than using the same password again and again.
You can buy software that stores the passwords for you, but do you really want to pay money for another piece of software that performs a solitary function?
Try this simple, two-step, technique that lets you generate an infinite number of passwords, without having to remember any of them.
Step One: Choose a 4-6 letter word or number sequence that you can remember easily. Needless to say, don't reveal this to anyone. For the purpose of this demonstration, I'll choose the word "cash"
Step Two: Apply this secret word or number sequence to the name of the program you are setting up the password for.
To accomplish this, invent a couple of easy to remember rules.
Rule 1: Decide which part of the program name you are going to use. It could be the whole name, the first 6 letters of the name, the last 8 letters of the name. It's totally up to you, be as creative as you like.
eg - For the program TrafficSwarm, I might choose the first 8 letters of the name. This give me: "traffics"
Rule 2: Take the portion of the program name you have selected and merge it with your secret word or number sequence to create a unique password. Again, be as creative as you can with this rule. You could replace every second letter, every third letter, every vowel or every consonant.
eg - If I replace every second letter of "traffics" with my secret word "cash", I get " t c a a f s c h "
- If I replace every vowel of "traffics" with my secret word "cash", I get " t r c f f a c s ". The "s" and the "h" are not used as "traffics" has only two vowels, but some words will use all four letters of "cash". Some words might have more than four vowels, in which case just start back at the beginning with "c" and "a" and so on?
You don't have to worry about making your rules overly complex. Even the best code-breakers would need to see several of your passwords before they could start to guess what you rules are.
As long as you keep your rules safe and sound, your password is secure. But the real beauty of this system, is that you don't have to remember the passwords you create. You ONLY have to remember the rules.
When you log into the program the next time, just apply your rules to the program name, and you can work out what password you generated. Once you have been using the rules for a while, you'll generate the password in your head, without even having to pause.
Don't worry if it seems a little complicated at first. Read this article through a couple more times and then try this technique with just a couple of programs. Once you are happy with it, all that's left to do is to start working your way through existing programs and update your passwords. It's time consuming, but for peace of mind you'll be glad you did.
David Congreave is owner of The Nettle Ezine, the newsletter for the home business -- online. David lives in Leeds, in the United Kingdom, with his wife Leanne.
OSCE in crisis as Russian veto threatens security body Financial Times
Security alert: Itâ€™s time to update your iPhone â€” again NewsNation Now
PM Modi lauds security official who worked at Bharat Mandapam amid G20 Summit despite mother's heart attack | Watch | Mint - Mint
PM Modi lauds security official who worked at Bharat Mandapam amid G20 Summit despite mother's heart attack | Watch | Mint Mint
Secretary Antony J. Blinken At the Addressing the Urgent Security Situation in Haiti Meeting - United States Department ... - Department of State
Secretary Antony J. Blinken At the Addressing the Urgent Security Situation in Haiti Meeting - United States Department ... Department of State
Man attempts to breach PM Modi's security in Varanasi, held Hindustan Times
Mozambique-U.S. seek to deepen defence, security ties Africanews English
Rules Committee Hearing on Funding Bills for Homeland Security, State, Defense, and Agriculture Departments - C-SPAN
Rules Committee Hearing on Funding Bills for Homeland Security, State, Defense, and Agriculture Departments C-SPAN
TSA showcases security checkpoint technologies in use at Antonio ... - Transportation Security Administration
TSA showcases security checkpoint technologies in use at Antonio ... Transportation Security Administration
Biden-Harris Administration Announces Final National Security ... US Department of Commerce
United States Hosts UNGA Side Event: Addressing the Urgent ... Department of State
Austin Lauds Mozambique's Leadership on Regional Security > U.S Department of Defense
Biden Administration Announces Additional Security Assistance for ... Department of Defense
Five questions with security expert Greg Parker Johnson Controls
Operation Lone Star Bolsters Border Security To Stem Historic Influx Office of the Texas Governor
Software supply chain security Grant Thornton
Increased online security coming soon to El Camino El Camino College Union
TSA canines enhancing security at John F. Kennedy International ... - Transportation Security Administration
TSA canines enhancing security at John F. Kennedy International ... Transportation Security Administration
Fact Sheet: The Biden-Harris Administration Takes New Actions to ... Homeland Security
Secretary Antony J. Blinken At United Nations Security Council ... Department of State
At Disagree Better Event, National Security Experts Warn of the ... - National Governors Association
At Disagree Better Event, National Security Experts Warn of the ... National Governors Association
DHS Homeland Security Investigations Announces Strategy to ... Homeland Security
Statement by President Charles Michel at the UN Security Council ... - PrÃ©sidence franÃ§aise du Conseil de l'Union europÃ©enne 2022
Statement by President Charles Michel at the UN Security Council ... PrÃ©sidence franÃ§aise du Conseil de l'Union europÃ©enne 2022
CU Boulder earns $5 million award for 5G cellular security research - CU Boulder's College of Engineering & Applied Science
CU Boulder earns $5 million award for 5G cellular security research CU Boulder's College of Engineering & Applied Science
Diving Deep Into Key Input on the Access Control Market Security Sales & Integration
Building the Quad: A Diamond of National Security United States Army
Job Security Isn't Enough to Keep Many Accountants From Quitting The Wall Street Journal
GEN Nakasone Offers Insight into Future of Cybersecurity and SIGINT National Security Agency
Unlocking IoT Endpoint Security in 2023: What You Need to Know Security Boulevard
Indiana University Health reports data security incident pertaining to one of its vendors - FOX 59 Indianapolis
Indiana University Health reports data security incident pertaining to one of its vendors FOX 59 Indianapolis
30th Security Forces Squadron Expeditionary Training ... Vandenberg Space Force Base
At the edge of the UN security perimeter, those with causes (and ... Chattanooga Times Free Press
ROSEN, TRUSTED INVESTOR COUNSEL, Encourages NAPCO ... GlobeNewswire
Airport Security Officer Caught Stealing From Passenger, Stuffs ... View from the Wing
Secretary Mayorkas Delivers Remarks at Ukrainian Cultural Artifacts ... Homeland Security
Fleeing Militants Pose Challenge to Somaliaâ€™s Security Voice of America - VOA News
LastPass: 'Horse Gone Barn Bolted' is Strong Password â€“ Krebs on ... Krebs on Security
Remarks by Ambassador Thomas-Greenfield at a UN Security ... U.S. Embassy Moscow
Robert Habeck on Germany's new approach to 'economic security ... Atlantic Council
Ambassador Linda Thomas-Greenfield Joins Secretary Blinken for ... - United States Mission to the United Nations
Ambassador Linda Thomas-Greenfield Joins Secretary Blinken for ... United States Mission to the United Nations
Why We're Pulling Our Recommendation of Wyze Security Cameras The New York Times
Chicago Mayor Signs $29 Million Deal With Private Security Firm To Create Tent Camps For Migrants - Forbes
Chicago Mayor Signs $29 Million Deal With Private Security Firm To Create Tent Camps For Migrants Forbes
D.C. Dispatch: Lawmakers call for Russian reparations, border ... Iowa Capital Dispatch
Security Forces Teargas, Arrest Family Of Protester Killed In Iran - Ø§ÛŒØ±Ø§Ù† Ø§ÛŒÙ†ØªØ±Ù†Ø´Ù†Ø§Ù„
Security Forces Teargas, Arrest Family Of Protester Killed In Iran Ø§ÛŒØ±Ø§Ù† Ø§ÛŒÙ†ØªØ±Ù†Ø´Ù†Ø§Ù„
146th Security Forces Squadron Train with Emergency Management ... 146aw.ang.af.mil
Can I Guess Your Password?
We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache.
Identity Theft - Dont Blame The Internet
Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.
5 Tips For An Unbreakable Password
Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible.
How To Cover Your Tracks On The Internet
Every single time you access a website, you leave tracks. Tracks that others can access.
Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda
Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing.
Remove Rogue Desktop Icons Created By Spyware
If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1.
Phishing: A Scary Way of Life
The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail.
Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking
Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home.
Spyware Attacks! Windows Safe Mode is No Longer Safe
Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware.
The Important Steps To Protect Your Kids on the Internet
Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge.
Traditional Antivirus Programs Useless Against New Unidentified Viruses!
Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike.
Are You Surfing Safe?
Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on.
Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself
The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger.
What is Spyware?
The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own.
Data Security; Are Your Company Assets Really Secure?
Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today.
Wireless Network Security
Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken.
3 Simple Steps to Stay Safe from Spyware
There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D.
The Truth About Hiding Your Tracks on the Internet
Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet.
What is Hacking? Are You a Hacker?
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose.
Online Shoppers, Beware of a New Scam
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information.
|home | site map|