![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Can I Guess Your Password?
We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. And writing them down somewhere isn't a great deal safer than using the same password again and again. You can buy software that stores the passwords for you, but do you really want to pay money for another piece of software that performs a solitary function? Try this simple, two-step, technique that lets you generate an infinite number of passwords, without having to remember any of them. Step One: Choose a 4-6 letter word or number sequence that you can remember easily. Needless to say, don't reveal this to anyone. For the purpose of this demonstration, I'll choose the word "cash" Step Two: Apply this secret word or number sequence to the name of the program you are setting up the password for. To accomplish this, invent a couple of easy to remember rules. Rule 1: Decide which part of the program name you are going to use. It could be the whole name, the first 6 letters of the name, the last 8 letters of the name. It's totally up to you, be as creative as you like. eg - For the program TrafficSwarm, I might choose the first 8 letters of the name. This give me: "traffics" Rule 2: Take the portion of the program name you have selected and merge it with your secret word or number sequence to create a unique password. Again, be as creative as you can with this rule. You could replace every second letter, every third letter, every vowel or every consonant. eg - If I replace every second letter of "traffics" with my secret word "cash", I get " t c a a f s c h " or - If I replace every vowel of "traffics" with my secret word "cash", I get " t r c f f a c s ". The "s" and the "h" are not used as "traffics" has only two vowels, but some words will use all four letters of "cash". Some words might have more than four vowels, in which case just start back at the beginning with "c" and "a" and so on? You don't have to worry about making your rules overly complex. Even the best code-breakers would need to see several of your passwords before they could start to guess what you rules are. As long as you keep your rules safe and sound, your password is secure. But the real beauty of this system, is that you don't have to remember the passwords you create. You ONLY have to remember the rules. When you log into the program the next time, just apply your rules to the program name, and you can work out what password you generated. Once you have been using the rules for a while, you'll generate the password in your head, without even having to pause. Don't worry if it seems a little complicated at first. Read this article through a couple more times and then try this technique with just a couple of programs. Once you are happy with it, all that's left to do is to start working your way through existing programs and update your passwords. It's time consuming, but for peace of mind you'll be glad you did. David Congreave is owner of The Nettle Ezine, the newsletter for the home business -- online. David lives in Leeds, in the United Kingdom, with his wife Leanne.
MORE RESOURCES: What Is Security as a Service? MUO - MakeUseOf ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation SecurityWeek Breaking silence, GOP lawmakers lament overhaul’s security ramifications for Israel The Times of Israel Lumen Technologies hit with 2 separate security incidents Cybersecurity Dive Hunger and Malnutrition Threaten U.S. National Security, Report Says Drovers Magazine Remarks at a UN Security Council High-Level Debate on ... United States Mission to the United Nations GPT-4 kicks AI security risks into higher gear VentureBeat Homeland Security Chief Mayorkas calls Ted Cruz’s comments ... The Texas Tribune Security equipment taken in package theft - Oak Park Wednesday Journal Apple Issues Urgent Security Update for Older iOS and iPadOS ... The Hacker News Why cybersecurity risks matter - and how to raise security World Economic Forum Homeland Security warns about scam in Kansas City area WDAF FOX4 Kansas City Security experts discusses training practices to prepare for mass shootings Western Massachusetts News New World Bank Report: With Inclusion and Accountability, Water ... World Bank Group Commerce Department Outlines Proposed National Security ... US Department of Commerce Security guard dead, 2 hurt in Hyattsville gentleman’s club shooting DC News Now | Washington, DC Microsoft's Charlie Bell Confirms Security Layoffs in Internal Email Business Insider Microsoft pushes OOB security updates for Windows Snipping tool flaw BleepingComputer ViVE 2023: How to tackle data privacy, security talent vacancies FierceHealthcare Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner Fact Sheet: Biden Administration's National Security Memorandum ... Homeland Security Under pressure, St. Louis' Railway Exchange boosts security to ... St. Louis Post-Dispatch TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration FACT SHEET: President Biden’s Budget Strengthens Border ... The White House The Case for a Security Guarantee for Ukraine Foreign Affairs Magazine Biden Administration Announces Additional Security Assistance for ... Department of Defense After Denver school shooting, an outcry erupts over security The Associated Press TikTok Pushed by U.S. to Resolve National Security Concerns The New York Times Feds Charge NY Man as BreachForums Boss “Pompompurin ... Krebs on Security Topeka senator calls for security as frustrations flare at Kansas anti ... The Topeka Capital-Journal TikTok CEO's Message to Washington: A Sale Won't Solve Security ... The Wall Street Journal Officials are preparing security in case of Trump indictment The Associated Press Microsoft Patch Tuesday, March 2023 Edition – Krebs on Security Krebs on Security Is Ether a Security? CoinDesk Jenkins Security Alert: New Security Flaws Could Allow Code ... The Hacker News Saudi Arabia Seeks U.S. Security Pledges, Nuclear Help for Peace ... The Wall Street Journal Profiles of the January 6th Inmates in the D.C. Jail Just Security |
![]() |
![]() |
![]() |
RELATED ARTICLES
Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. 5 Tips For An Unbreakable Password Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. The Important Steps To Protect Your Kids on the Internet Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge. Traditional Antivirus Programs Useless Against New Unidentified Viruses! Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. What is Hacking? Are You a Hacker? WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. ![]() |
home | site map |
© 2006 |