How to Manage Your Username and Password The Easy and Secure Way
Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. I'm now even more paranoid after I joined YMMSS because I use online paymentsystems on weekly basis if not daily.
I used to use Microsoft Excel to manage my usernames, passwords, and other registration information, both online and offline. Excel is not safe because there are programs to crack password protected Excel workbooks and I even cracked the spreadsheet and VBA source code password for one of my old Excel financial models I developed. Today I still use Excel to store some personal information but I only save the Excel file on my another PC that is not connected to Internet.
In my article "6 Essential Steps to Protect Your Computer On the Internet", I highly recommended the award winning RoboForm. Free version of RoboForm (http://www.roboform.com) does come with limitations such as 10 Passcards only. If you don't want to buy the Pro version (costs $29.99 as of my writing), there is an easy-to-use freeware (see below) you can download right now and manage unlimited usernames and passwords.
Download freeware Password Safe from SourceForge.net - the Open Source community.
Here are some great features of Password Safe:
- No installation is required. Simply download and double click the pwsafe.exe file.
- Easy portable. Just copy and paste the EXE file and .dat database file to any disks. Be aware that when you open Password Safe in the other disk, you need to specify the database file location (the .dat file).
- One master password unlocks an entire password database that can contain all your other passwords.
- Grouping. Usernames and passwords can be grouped into different categories you define, eg. Email Address, Payment, etc. You are in total control.
- Strong, random password generation.
- Copy username and password to clipboard so that you don't have to type them. Always keep in mind that you should never type any username and password.
- Browse to URL. With one click, the URL related to your username and password can be opened in your default web browser. Another save on typing.
- You can create more than one password database (but you have to memorize more than one master password. Not recommended.)
Here are some tips of using Password Safe (version 2.04) and managing password in general.
Tip #1 - Always create a strong master password (Safe Combination as used in the software).
Strong password should meet the following criteria:
- At least 8 characters long to prevent cracking. The longer the better.
- The password should contain lowercase, uppercase, numeric, and any other characters that are available on keyboard.
- Ideally you should not use any meaningful words or numbers in the password. Totally random password is the best.
Tip #2 - Let PasswordSafe generate random password for you.
To generate random password:
- Click the menu item Edit.
- Select Add Entry (or use corresponding icon button).
- When the dialogue window opens, on the right hand side, you can see a Random Password Generate button. Click it, a random password will be automatically inserted in the Password field.
The generated random password is constructed according to the password policy defined in Password Safe. You can modify the default policy.
- Click the menu item Manage. - In the dropdown menu, click Options. - Click the Password Policy tab. - Change the policy based on the strong password criteria stated above.
Some sites only allow alphanumeric passwords so make sure you select the appropriate check boxes when this is the case.
Tip #3 - Very Important: Never type your master password when open PasswordSafe.
Keylogger spyware can record keystrokes.
How can you enter master password without typing? I do this.
Step 1: Open a Notepad file (.txt).
Step 2: Copy and paste an article from any Internet website to this .txt file.
Step 3: Select characters from this article and copy, paste to form your master password.
Tip #4 - Very Important: Never lose your master password.
I memorize my master password. In addition, I also physically write it down to a hand written study material that has my previous uni works. Among the 1,000's of words, I placed my 22 characters master password in two different pages in encrypted format that can let me derive my master password.
Tip #5 - Categorize username and password.
When you add a new entry, you need to specify Group, Title, Username, Password, and Notes. The entries that share the same Group name will be gathered together automatically.
One Group can contain another Group as its sub Group. For example, I have Email Address group which contains three sub-groups as Friend, Work, Family.
Tip #6 - For security reasons, always use Copy Username to Clipboard and Copy Password to Clipboard.
Remember, never type username and password on a web form. This is how to do it.
- Highlight an entry.
- Right click mouse.
- In the pop-up menu, select Copy Username to Clipboard or Copy Password to Clipboard
- Go to your login form, paste the username or password.
You can use mouse to do copy and paste. If you prefer short-cut keys, this is how.
Copy: Ctrl+CPaste: Ctrl+V
Tip #7 - Use "Browse to URL" rather than typing URL in browser address bar.
When you enter a new entry or edit an existing one, you can enter a URL (must start with http://) at the first line in the Notes field. You can save website login page's URL in this field. When you need to open a login page in browser, right click the entry and click Browse to URL in the pop-up menu. Then the login page will be opened in your default web browser automatically.
Tip #8 - Don't forget to backup your password database file.
Use the Make Backup menu item to save a second copy of your password file.
Tip #9 - Store your backups in a different offline computer or location.
This is a widely used backup strategy.
Tip #10 - Use the Notes field to store as many information as you want. Very handy for memo.
If you don't have two computers, you need to use other storage media to save a second copy of your backup file and version them by date (easy to track back). Other storage media can be zip drive, thumb drive, floppy disk, CD, etc.
Off site backups are also important. Don't overlook this. You lose all your data if you lose both your computer and your other storage media all together for any reason.
Many companies provide online storage services for a fee. You can store any digital files (you should password protect these files first) on their secure servers. Search Google and you will find a lot.
I have two computers. One is used to surf net and it does not have any sensitive info stored on it. Another one is for my development work (not connected to Internet) and it has my backup files. I also store my backups in a thumb drive and CDs sometimes.
The author, Jerry Yu, is an experienced internet marketer and web developer. He is a proud member of YMMSS. Visit his site Get Paid Full Time Income By Reading Ads Online - YMMSS for FREE "how-to" step-by-step action guide to kick start a successful online business, tips, knowledge base articles, and more.
Tallahassee hospital cancels procedures, diverts EMS after IT security issue Tallahassee Democrat
Security guard shocked with Taser after macing Lauderhill Police officer during traffic stop - WSVN 7News | Miami News, Weather, Sports | Fort Lauderdale
Security guard shocked with Taser after macing Lauderhill Police officer during traffic stop WSVN 7News | Miami News, Weather, Sports | Fort Lauderdale
The forgotten Black woman who invented the video home security system The Washington Post
Biden Administration Announces Additional Security Assistance for ... Department of Defense
President Biden Announces Appointments to the President’s ... The White House
Texas Senate leaders signal intent to spend big on border security The Texas Tribune
CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection
CVA reports data security breach involving some patient information Alabama's News Leader
Leveraging K-9 capabilities within security Security Magazine
Mitigating security risks with an evolving workforce Security Magazine
A call for data-first security VentureBeat
Burlington police: Mayor condemns police's private security contract Burlington Free Press
DHS Expands Abraham Accords to Cybersecurity Homeland Security
School security: Local schools get $7.6 million for safety upgrades Dayton Daily News
Video security cameras that help ensure compliance Security Magazine
US. Department of Homeland Security and Finnish Ministry of the ... Homeland Security
Claude ISD applying for more funding to support security abc7amarillo.com
Memphis Police Chief Trained With Israel Security Forces The Intercept
Williamsport security guard allegedly chokeholds boy PAHomePage.com
Jeetu Patel on Having a Consistent Design at Cisco Security BankInfoSecurity.com
Security guard accused of killing man during fight at grocery store will not face charges - Fox Baltimore
Security guard accused of killing man during fight at grocery store will not face charges Fox Baltimore
IBM Security GM on Seeing a Target Through the Hacker's Eyes BankInfoSecurity.com
Market Map: Information security guards against economic threats PitchBook News & Analysis
Smaller krewes, ready to roll despite security setbacks, hopeful for ... FOX 8 Local First
Wiz CEO on the Need to Consolidate Cloud Security Technology BankInfoSecurity.com
Statement of Homeland Security Secretary Mayorkas on the Family ... Homeland Security
Hamden schools examine security upgrades after intruder assaulted ... New Haven Register
2nd suspect arrested in security guard's fatal shooting at DeKalb ... - The Atlanta Journal Constitution
2nd suspect arrested in security guard's fatal shooting at DeKalb ... The Atlanta Journal Constitution
HISD addresses security concerns after shooting, police chase ... KPRC Click2Houston
DMPS parents call for more security after two guns found in high schools in two weeks - KCCI Des Moines
DMPS parents call for more security after two guns found in high schools in two weeks KCCI Des Moines
ZURIK: Mayor Cantrell's security officers clocked time while nowhere ... FOX 8 Local First
Seceon 2023 Cybersecurity Predictions by Seceon Thought Leadership Security Boulevard
Off-duty security guard receives 5-year sentence for fatal shooting after gang brawl erupts during Portland b - OregonLive
Off-duty security guard receives 5-year sentence for fatal shooting after gang brawl erupts during Portland b OregonLive
Street Talk: Ferris partners with National Security Agency Grand Rapids Business Journal
Town of Ulster officials vow increased security for Pawan Circle homes after break-ins - The Daily Freeman
Town of Ulster officials vow increased security for Pawan Circle homes after break-ins The Daily Freeman
SRPD, cannabis companies gather to hash out security concerns ... The Santa Rosa Press Democrat
Security Think Tank: In 2023, we need a new way to cultivate better habits ComputerWeekly.com
USENIX Security ’22 – Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati – ‘Transferring Adv... - Security Boulevard
USENIX Security ’22 – Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati – ‘Transferring Adv... Security Boulevard
US will send Stryker combat vehicles to Ukraine for first time as part of $2.5 billion security package - CNN
US will send Stryker combat vehicles to Ukraine for first time as part of $2.5 billion security package CNN
DHS Announces Process Enhancements for Supporting Labor ... Homeland Security
DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security
More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense
Firewalls: What They Are And Why You MUST Have One!
A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data.
Internet Identity Theft - How You Can Shield Yourself
With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan.
Lottery Scam, What It is and how to Avoid It?
Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago.
How to Get Rid of New Sobig.F Virus?
As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak.
Remove Rogue Desktop Icons Created By Spyware
If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1.
The One Critical Piece Of Free Software Thats Been Overlooked
Can You Prevent Spyware, Worms, Trojans, Viruses,..
An Open Letter From a So-called Stupid
Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me.
Hacking Threats and Protective Security
The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000.
Web and Computer Security
Well, if that would have been said to me by my father when I was 2 years of age, I would have understood. But when today, my own computer tells me that when I am 34, I wonder why I spent $1500 on my computer hardware and software just to enjoy the (un-realized) benefits of this great and revolutionary information technology?Today’s cyberspace is hazardous.
AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years . In fact, few steganographers would disagree with the investigation of spreadsheets.
How To Prevent Spyware Attacking Your Computer
Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source.
The Important Steps To Protect Your Kids on the Internet
Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge.
SCAMS - Be Aware - And Report When Necessary
The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run.
Reclaim Your PC from the Internet Spies
Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs.
How To Avoid Hackers From Destroying Your Site?
Recently, my site and other internet accounts ( http://www.nabaza.
Spyware Attacks! Windows Safe Mode is No Longer Safe
Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware.
Social Engineering - The Real E-Terrorism?
One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale.
Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself
The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger.
Money Mule Email Scam Hits U.S.
Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required.
Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms
Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially.
|home | site map|