How to Manage Your Username and Password The Easy and Secure Way
Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. I'm now even more paranoid after I joined YMMSS because I use online paymentsystems on weekly basis if not daily.
I used to use Microsoft Excel to manage my usernames, passwords, and other registration information, both online and offline. Excel is not safe because there are programs to crack password protected Excel workbooks and I even cracked the spreadsheet and VBA source code password for one of my old Excel financial models I developed. Today I still use Excel to store some personal information but I only save the Excel file on my another PC that is not connected to Internet.
In my article "6 Essential Steps to Protect Your Computer On the Internet", I highly recommended the award winning RoboForm. Free version of RoboForm (http://www.roboform.com) does come with limitations such as 10 Passcards only. If you don't want to buy the Pro version (costs $29.99 as of my writing), there is an easy-to-use freeware (see below) you can download right now and manage unlimited usernames and passwords.
Download freeware Password Safe from SourceForge.net - the Open Source community.
Here are some great features of Password Safe:
- No installation is required. Simply download and double click the pwsafe.exe file.
- Easy portable. Just copy and paste the EXE file and .dat database file to any disks. Be aware that when you open Password Safe in the other disk, you need to specify the database file location (the .dat file).
- One master password unlocks an entire password database that can contain all your other passwords.
- Grouping. Usernames and passwords can be grouped into different categories you define, eg. Email Address, Payment, etc. You are in total control.
- Strong, random password generation.
- Copy username and password to clipboard so that you don't have to type them. Always keep in mind that you should never type any username and password.
- Browse to URL. With one click, the URL related to your username and password can be opened in your default web browser. Another save on typing.
- You can create more than one password database (but you have to memorize more than one master password. Not recommended.)
Here are some tips of using Password Safe (version 2.04) and managing password in general.
Tip #1 - Always create a strong master password (Safe Combination as used in the software).
Strong password should meet the following criteria:
- At least 8 characters long to prevent cracking. The longer the better.
- The password should contain lowercase, uppercase, numeric, and any other characters that are available on keyboard.
- Ideally you should not use any meaningful words or numbers in the password. Totally random password is the best.
Tip #2 - Let PasswordSafe generate random password for you.
To generate random password:
- Click the menu item Edit.
- Select Add Entry (or use corresponding icon button).
- When the dialogue window opens, on the right hand side, you can see a Random Password Generate button. Click it, a random password will be automatically inserted in the Password field.
The generated random password is constructed according to the password policy defined in Password Safe. You can modify the default policy.
- Click the menu item Manage. - In the dropdown menu, click Options. - Click the Password Policy tab. - Change the policy based on the strong password criteria stated above.
Some sites only allow alphanumeric passwords so make sure you select the appropriate check boxes when this is the case.
Tip #3 - Very Important: Never type your master password when open PasswordSafe.
Keylogger spyware can record keystrokes.
How can you enter master password without typing? I do this.
Step 1: Open a Notepad file (.txt).
Step 2: Copy and paste an article from any Internet website to this .txt file.
Step 3: Select characters from this article and copy, paste to form your master password.
Tip #4 - Very Important: Never lose your master password.
I memorize my master password. In addition, I also physically write it down to a hand written study material that has my previous uni works. Among the 1,000's of words, I placed my 22 characters master password in two different pages in encrypted format that can let me derive my master password.
Tip #5 - Categorize username and password.
When you add a new entry, you need to specify Group, Title, Username, Password, and Notes. The entries that share the same Group name will be gathered together automatically.
One Group can contain another Group as its sub Group. For example, I have Email Address group which contains three sub-groups as Friend, Work, Family.
Tip #6 - For security reasons, always use Copy Username to Clipboard and Copy Password to Clipboard.
Remember, never type username and password on a web form. This is how to do it.
- Highlight an entry.
- Right click mouse.
- In the pop-up menu, select Copy Username to Clipboard or Copy Password to Clipboard
- Go to your login form, paste the username or password.
You can use mouse to do copy and paste. If you prefer short-cut keys, this is how.
Copy: Ctrl+CPaste: Ctrl+V
Tip #7 - Use "Browse to URL" rather than typing URL in browser address bar.
When you enter a new entry or edit an existing one, you can enter a URL (must start with http://) at the first line in the Notes field. You can save website login page's URL in this field. When you need to open a login page in browser, right click the entry and click Browse to URL in the pop-up menu. Then the login page will be opened in your default web browser automatically.
Tip #8 - Don't forget to backup your password database file.
Use the Make Backup menu item to save a second copy of your password file.
Tip #9 - Store your backups in a different offline computer or location.
This is a widely used backup strategy.
Tip #10 - Use the Notes field to store as many information as you want. Very handy for memo.
If you don't have two computers, you need to use other storage media to save a second copy of your backup file and version them by date (easy to track back). Other storage media can be zip drive, thumb drive, floppy disk, CD, etc.
Off site backups are also important. Don't overlook this. You lose all your data if you lose both your computer and your other storage media all together for any reason.
Many companies provide online storage services for a fee. You can store any digital files (you should password protect these files first) on their secure servers. Search Google and you will find a lot.
I have two computers. One is used to surf net and it does not have any sensitive info stored on it. Another one is for my development work (not connected to Internet) and it has my backup files. I also store my backups in a thumb drive and CDs sometimes.
The author, Jerry Yu, is an experienced internet marketer and web developer. He is a proud member of YMMSS. Visit his site Get Paid Full Time Income By Reading Ads Online - YMMSS for FREE "how-to" step-by-step action guide to kick start a successful online business, tips, knowledge base articles, and more.
What happens when an organization has no security culture? World Economic Forum
What To Know: New Laws on Education, Public Safety and Water Security Go Into Effect Today - Arizona Governor's Office (.gov)
What To Know: New Laws on Education, Public Safety and Water Security Go Into Effect Today Arizona Governor's Office (.gov)
Anable: Cyber Security Month highlights 'team effort' of internet safety Daily Independent
How the CIO's relationship to IT security is changing Help Net Security
Opinion | The Uber Hack Exposes More Than Failed Data Security The New York Times
Two Republican audit committee leaders launch an inquiry into security costs for Gov. Evers and Lt. Gov. Barnes - Milwaukee Journal Sentinel
Two Republican audit committee leaders launch an inquiry into security costs for Gov. Evers and Lt. Gov. Barnes Milwaukee Journal Sentinel
Lakeland Downtown Development Authority to focus on security, cleanliness, drinks in 2023 - The Ledger
Lakeland Downtown Development Authority to focus on security, cleanliness, drinks in 2023 The Ledger
Security Monitoring System Market Size-Share, Emerging Demands 2022 | Growing Factors and Future Market Outlook Till 2030 | Cost Analysis, New Entrants, Innovative Trends, Consumer Behavior, Competitor Ecosystem, Expansion, and Acquisition - Yahoo Finance
Security Monitoring System Market Size-Share, Emerging Demands 2022 | Growing Factors and Future Market Outlook Till 2030 | Cost Analysis, New Entrants, Innovative Trends, Consumer Behavior, Competitor Ecosystem, Expansion, and Acquisition Yahoo Finance
U.S. slips down rankings in food security index Food Safety News
Complete Guide to SCADA Security Security Boulevard
Back to Basics: Parking Garage Security - Total Security Advisor Total Security Advisor
KPRC 2 Investigates years-long HOA debate over security guard gate KPRC Click2Houston
High-level independent panel on security and development in crisis-torn Sahel region launched at UN - UN News
High-level independent panel on security and development in crisis-torn Sahel region launched at UN UN News
How Integrated Security Ecosystems Can Improve Campus Safety - Campus Safety - Campus Safety Magazine
How Integrated Security Ecosystems Can Improve Campus Safety - Campus Safety Campus Safety Magazine
Pentagon launches effort to assess crypto's threat to national security The Washington Post
Security guarding in the future: Robocop meets sensor integration Security Magazine
Joint Statement on the High-Level Meeting on the Safety and Security of Civil Nuclear Facilities in Armed Conflicts - United States Department of State - Department of State
Joint Statement on the High-Level Meeting on the Safety and Security of Civil Nuclear Facilities in Armed Conflicts - United States Department of State Department of State
NextGen 2.0 helmets on the way to security forces across DAF Air Force Link
Politics impede long-advocated growth of UN Security Council The Washington Post
Maritime Security Market Size to Reach over US$38 Bn by 2027 End, Forecasts Fairfield Market Research in a New Study - GlobeNewswire
Maritime Security Market Size to Reach over US$38 Bn by 2027 End, Forecasts Fairfield Market Research in a New Study GlobeNewswire
Mark Knudson’s 3 Strikes: Broncos winning formula, Dorrell job security and Avs success - Mile High Sports
Mark Knudson’s 3 Strikes: Broncos winning formula, Dorrell job security and Avs success Mile High Sports
Homeland Security Investigations Renews Partnership with Palantir for Case Management Software that Supports Investigations into Human Trafficking, Drug Smuggling, and Transnational Criminal Organizations - Business Wire
Homeland Security Investigations Renews Partnership with Palantir for Case Management Software that Supports Investigations into Human Trafficking, Drug Smuggling, and Transnational Criminal Organizations Business Wire
Albuquerque church security guard killed, suspect arrested The Associated Press - en Español
5 Network Security Threats And How To Protect Yourself The Hacker News
National security risk review of material Trump kept at Mar-a-Lago resumes after appeals court ruling - POLITICO
National security risk review of material Trump kept at Mar-a-Lago resumes after appeals court ruling POLITICO
How Does FAIR Fit into Cybersecurity? Security Boulevard
OLLI symposium to explore global food security | Nebraska Today | University of Nebraska–Lincoln - Nebraska Today
OLLI symposium to explore global food security | Nebraska Today | University of Nebraska–Lincoln Nebraska Today
Afghanistan Is a Threat to Global Security Once Again The National Interest Online
Phonexa Fortifies Its Telecommunications Security With STIR/SHAKEN Compliance Certification - PR Newswire
Phonexa Fortifies Its Telecommunications Security With STIR/SHAKEN Compliance Certification PR Newswire
Tougaloo to receive $420000 for security and mental health care in wake of HBCU bomb threats - Mississippi Today
Tougaloo to receive $420000 for security and mental health care in wake of HBCU bomb threats Mississippi Today
A 'School Within A School' Is Building Community And Food Security In Hana Honolulu Civil Beat
'Fat Leonard,' Navy scandal mastermind, had relaxed security before escape The Washington Post
South Sudan should disarm civilians – the evidence shows this improves security - The Conversation Indonesia
South Sudan should disarm civilians – the evidence shows this improves security The Conversation Indonesia
Beaumont ISD set to hold biannual, state-mandated safety and security meeting on Monday - 12newsnow.com KBMT-KJAC
Beaumont ISD set to hold biannual, state-mandated safety and security meeting on Monday 12newsnow.com KBMT-KJAC
UNC System Board Approves Student Fee for Campus Security Campus Safety Magazine
US Security Advisor Denounces Iran’s Brutal Repression Of People ایران اینترنشنال
Workers at Brewvies movie theater in Ogden go on strike, citing safety and security concerns - FOX 13 News Utah
Workers at Brewvies movie theater in Ogden go on strike, citing safety and security concerns FOX 13 News Utah
January 6 Defendant Says He Attended Events as Security Detailee The Epoch Times
Early Edition: September 26, 2022 Just Security
Lebanon: Calls to put security forces charged with torturing Syria refugee on trial in criminal court - Middle East Monitor
Lebanon: Calls to put security forces charged with torturing Syria refugee on trial in criminal court Middle East Monitor
Microsoft Releases Out-of-Band Security Update for Microsoft Endpoint Configuration Manager | CISA - US-CERT
Microsoft Releases Out-of-Band Security Update for Microsoft Endpoint Configuration Manager | CISA US-CERT
As catalytic converter thefts continue across the country, these security devices can help keep your car safe - WPRI.com
As catalytic converter thefts continue across the country, these security devices can help keep your car safe WPRI.com
IT Security Takeaways from the Wiseasy Hack The Hacker News
United States Security Manual Job Template 2022: Excel Security Audit Program and 22 Full Job Descriptions - ResearchAndMarkets.com - Business Wire
United States Security Manual Job Template 2022: Excel Security Audit Program and 22 Full Job Descriptions - ResearchAndMarkets.com Business Wire
When Ransomware Meets IoT: What’s Next? Security Boulevard
Lapid holds security talks to prepare for gas extraction from disputed Karish field - The Times of Israel
Lapid holds security talks to prepare for gas extraction from disputed Karish field The Times of Israel
Police say threat of gun violence against Allentown school not credible; security to be increased as precaution - 69News WFMZ-TV
Police say threat of gun violence against Allentown school not credible; security to be increased as precaution 69News WFMZ-TV
Executive Order on Ensuring Robust Consideration of Evolving National Security Risks by the Committee on Foreign Investment in the United States - The White House
Executive Order on Ensuring Robust Consideration of Evolving National Security Risks by the Committee on Foreign Investment in the United States The White House
The IAEA started negotiations on the creation of a security zone at the ZNPP | odessa-journal.com - Odessa Journal
The IAEA started negotiations on the creation of a security zone at the ZNPP | odessa-journal.com Odessa Journal
Secretary Antony J. Blinken at the United Nations Security Council Ministerial Meeting on Ukrainian Sovereignty and Russian Accountability - U.S. Embassy Moscow
Secretary Antony J. Blinken at the United Nations Security Council Ministerial Meeting on Ukrainian Sovereignty and Russian Accountability U.S. Embassy Moscow
N.Y.C. Subway System to Install Security Cameras in Train Cars The New York Times
$675 Million in Additional Security Assistance for Ukraine > U.S Department of Defense
DHS Establishes First-Ever Tribal Homeland Security Advisory Council Homeland Security
DHS Publishes Fair and Humane Public Charge Rule Homeland Security
Uber Boss Testifies He ‘Could Not Trust’ Ex-Security Chief The New York Times
Queen Elizabeth II's funeral: U.K.'s biggest security detail post-WWII The Washington Post
Whistle-Blower Peiter Zatko Says Twitter ‘Chose to Mislead’ on Security The New York Times
Before Midterms, Election Officials Increase Security Over Threats The New York Times
A CISO's Ultimate Security Validation Checklist The Hacker News
FTC Releases Final Agenda for Public Forum on Commercial Surveillance and Lax Data Security Practices - Federal Trade Commission News
FTC Releases Final Agenda for Public Forum on Commercial Surveillance and Lax Data Security Practices Federal Trade Commission News
Firewalls: What They Are And Why You MUST Have One!
A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data.
Internet Identity Theft - How You Can Shield Yourself
With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan.
Lottery Scam, What It is and how to Avoid It?
Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago.
How to Get Rid of New Sobig.F Virus?
As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak.
Remove Rogue Desktop Icons Created By Spyware
If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1.
The One Critical Piece Of Free Software Thats Been Overlooked
Can You Prevent Spyware, Worms, Trojans, Viruses,..
An Open Letter From a So-called Stupid
Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me.
Hacking Threats and Protective Security
The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000.
Web and Computer Security
Well, if that would have been said to me by my father when I was 2 years of age, I would have understood. But when today, my own computer tells me that when I am 34, I wonder why I spent $1500 on my computer hardware and software just to enjoy the (un-realized) benefits of this great and revolutionary information technology?Today’s cyberspace is hazardous.
AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years . In fact, few steganographers would disagree with the investigation of spreadsheets.
How To Prevent Spyware Attacking Your Computer
Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source.
The Important Steps To Protect Your Kids on the Internet
Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge.
SCAMS - Be Aware - And Report When Necessary
The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run.
Reclaim Your PC from the Internet Spies
Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs.
How To Avoid Hackers From Destroying Your Site?
Recently, my site and other internet accounts ( http://www.nabaza.
Spyware Attacks! Windows Safe Mode is No Longer Safe
Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware.
Social Engineering - The Real E-Terrorism?
One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale.
Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself
The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger.
Money Mule Email Scam Hits U.S.
Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required.
Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms
Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially.
|home | site map|