Securing Your Accounts With Well-Crafted Passwords
In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. This led to an unfortunate incident that involved my website being attacked, apparently by a skillful youth with a propensity for mischief.
The main security flaw with my website was probably the simple fact that the username and password were exactly the same. Granted I did realize that this wasn't highly intelligent but I didn't have the power to change it myself, and I didn't think it really mattered enough to bother about it. Having an identical username and password is a massive "no-no" in computer security. Your username and password should not even be related along the same line of thought. A username of "Dragon" and a password of "Fire" is not a secure combination.
For maximum security, passwords should not be cohesive words or phrases and should not be too obviously related to something like your birthday or the birthday of someone close to you. Personal information is one of the first things used when people attempt to break passwords. Having a password of "Password" is indeed humorous and ironic but it is not in the least bit secure.
A "brute force" password hacking technique involves using certain rules and guidelines to take a guess at possible passwords and generally works through a dictionary of sorts, trying combinations of possible words and common characters. Your best bet at creating a secure password is to pick a random collection of letters, numbers, and symbols, including varying case changes (in a password the letter "a" is not the same as the letter "A", so alternating at random between upper and lower case will increase the difficulty encountered in cracking your password). Selecting a sequence of characters on the keyboard (such as "asdf" or, worse, "1234") definitely does not create a secure, random password.
Having symbols in your password is an easy way to greatly increase security. These are the special characters accessed by holding the "Shift" key and pressing one of the numbers at the top of the keyboard. If you want to truly expand your arsenal of special characters, try holding down the "alt" key and pressing a combination of numbers on the num pad (the rectangular collection of numbers on the right hand side of most keyboards) then release "alt". For example, holding "alt" and pressing numbers, 1 then 6 then 8 and releasing "alt" will give the character "ż". Most combinations of 3 numbers will enter a different symbol into your password. This may make it a little harder to enter your password but it makes it a lot harder for anyone else to crack it.
To make passwords easier to remember you can use something original, like the name of your favorite character in a book (personal information that other people won't know). Then add some numbers to it, perhaps use the "Leet speak" (check http://en.wikipedia.org/wiki/Leet for exact definition) method of changing letters to numbers and generally mix things up so that to you it seems coherent and memorable but to an automated pattern recognizer it seems random. For example, "jAm35_5m1Thż" ("James Smith") is actually surprisingly secure. In this case the password's meaning is obvious to a human reader but it will take a lot of work for them to divine the password without prior knowledge.
For additional security you should not use the one user name and password for every account that you have. If you do and someone manages to get hold of your details for one site they pretty much have the run of your digital life. It is not particularly vital to have perfect passwords for less important accounts (e.g. web based email from Hotmail, forums you visit etc.). These sites can quite happily be accessed using the same password. However, bank accounts, work email etc. should be made as secure as possible.
Hopefully a few of these tips will assist you in making your online activities more secure. Keep these guidelines in mind, change your password on a semi regular basis, and with any luck you'll be able to avoid the hacking menace that befell me.
M6.Net Web Helpers
Exclusive: DHS investigating whether floor plans and other security information were exposed in ransomware attack on contractor - CNN
Exclusive: DHS investigating whether floor plans and other security information were exposed in ransomware attack on contractor CNN
US National Security Agency unveils artificial intelligence security centre Al Jazeera English
AI Security Center to Open at National Security Agency Department of Defense
NSA establishing âArtificial Intelligence Security Centerâ Federal News Network
Netanyahu to reportedly hold special security assessment on Sunday The Times of Israel
How a government shutdown would affect Dept. of Homeland Security KSAT San Antonio
Burkina Faso: 'elections not a priority compared to security', says military leader - Africanews English
Burkina Faso: 'elections not a priority compared to security', says military leader Africanews English
Designating Actors Undermining the Peace, Security, and Stability of Sudan - United States Department of State - Department of State
Designating Actors Undermining the Peace, Security, and Stability of Sudan - United States Department of State Department of State
Suspicious item shuts down checked baggage screening system at ... - Transportation Security Administration
Suspicious item shuts down checked baggage screening system at ... Transportation Security Administration
FACT SHEET: Impact of a Government Shutdown on the DHS ... Homeland Security
House Approves H.R. 4367, The Department of Homeland Security ... House Appropriations
Liberty schools adding new security measures | News, Sports, Jobs Youngstown Vindicator
Get Up to Date on CISSP Security and Risk Management Entrepreneur
Border Security is National Security Cathy McMorris Rodgers
Protesters confront security forces as Iran marks anniversary of crackdown Al Jazeera English
FBI Academy gives Tuskegee CIO foundation for increased campus ... Tuskegee University
Security Council Press Statement on Yemen | UN Press United Nations
Message from Secretary Mayorkas Regarding a Potential Federal ... Homeland Security
US, Mexican Officials Talk About Trade, Economic Growth, Border Security - Voice of America - VOA News
US, Mexican Officials Talk About Trade, Economic Growth, Border Security Voice of America - VOA News
DSS protects athletes and attendees at Womenâs World Cup State Magazine
Safety & Security Newsletters Adams 12 Five Star Schools
Ministerial Conference's Contribution to Nuclear Security; ICONS ... - International Atomic Energy Agency
Ministerial Conference's Contribution to Nuclear Security; ICONS ... International Atomic Energy Agency
Fact Sheet: DHS Western Hemisphere Cyber Conference Homeland Security
Secretary tours Foreign Affairs Security Training Center State Magazine
Strategies for the Digital Age: Comprehensive Cyber Security Market Insights Revealed for 2023-2033 - Yahoo Finance
Strategies for the Digital Age: Comprehensive Cyber Security Market Insights Revealed for 2023-2033 Yahoo Finance
Private security company quits DTSM contract Santa Monica Daily Press
Best Arlo security cameras in 2023 Android Police
Remarks at a UN Security Council Meeting on Maintenance of ... - United States Mission to the United Nations
Remarks at a UN Security Council Meeting on Maintenance of ... United States Mission to the United Nations
Innovative Solutions Discussed at Global Nuclear Safety and ... - International Atomic Energy Agency
Innovative Solutions Discussed at Global Nuclear Safety and ... International Atomic Energy Agency
CPD commander demoted after working for private security during White Sox Guaranteed Rate Field shooting, sources tell ABC7 - WLS-TV
CPD commander demoted after working for private security during White Sox Guaranteed Rate Field shooting, sources tell ABC7 WLS-TV
University Tennessee Baker School expands national security ... Knoxville News Sentinel
Texas congressional delegation spars over border security The Highland County Press
Biden-Harris Administration Announces Final National Security ... US Department of Commerce
Remarks by Ambassador Linda Thomas-Greenfield at UN Security ... - United States Mission to the United Nations
Remarks by Ambassador Linda Thomas-Greenfield at UN Security ... United States Mission to the United Nations
10 Apple Ecosystem Security Features That Keep You and Your ... MUO - MakeUseOf
BHS Principal, School Board Applaud Security Camera Policy Draft The Bedford Citizen
Lane College employees concerned about campus security Inside Higher Ed
Data-driven cyber: empowering government security with... - NCSC ... - National Cyber Security Centre
Data-driven cyber: empowering government security with... - NCSC ... National Cyber Security Centre
Senate GOP floats border security amendment in funding bill negotiations, but some say it's too weak - Fox News
Senate GOP floats border security amendment in funding bill negotiations, but some say it's too weak Fox News
Female soldiers no longer to guard security prisons amid suspected sex scandal - The Times of Israel
Female soldiers no longer to guard security prisons amid suspected sex scandal The Times of Israel
Utica security officers recognized for role in stopping fight Utica Observer Dispatch
NAPCO SECURITY SHAREHOLDER ALERT BY FORMER ... PR Newswire
Biden Administration Announces Additional Security Assistance for ... Department of Defense
Security guard questions county's double standard after he was shot near downtown Macon bar - wgxa.tv
Readout: U.S. - Mexico Meeting on Joint Actions to Further Enhance ... - Customs and Border Protection
Readout: U.S. - Mexico Meeting on Joint Actions to Further Enhance ... Customs and Border Protection
New U.S.-Poland Foreign Military Financing Direct Loan Agreement ... Department of State
PA: âIsrael occupation direct threat to region, Europe, world securityâ Middle East Monitor
Comprehensive Security Integration and Prosperity Agreement ... Department of State
Secretary Antony J. Blinken At the Addressing the Urgent Security ... Department of State
Dave Mustaine Ejects Security Guards at Megadeth Show: âI Hate Bulliesâ Yahoo Entertainment
Security Chattanooga Times Free Press
WHO calls cholera a âthreat to global health securityâ The Washington Post
Fact Sheet: The Biden-Harris Administration Takes New Actions to ... Homeland Security
How To Avoid Hackers From Destroying Your Site?
Recently, my site and other internet accounts ( http://www.nabaza.
The Truth About Hiding Your Tracks on the Internet
Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet.
The Saga of the Annoying Adware
When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra.
8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft
Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow.
The Move to a New Anti-Virus Model
This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution.
Hacking Threats and Protective Security
The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000.
Top Five Spyware Fighting Tips
Spyware and adware are becoming major problems for onlinesurfers and PC owners. Some highly respected sources such as AOL, Earthlink and Webroot place the rate of infection at 80-90% of all computers.
How To Give Away Your Personal Information
Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information.
Internet Shopping - How Safe Is It?
Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with.
How to Fight Spyware
If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware.
From Spyware with Love!
It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho.
Is Your Email Private? Part 1 of 3
In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure.
The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft.
A Painless Plagiarism Solution
A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www.
Secrets On Security: A Gentle Introduction To Cryptography
Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg.
Consumers: Shop Online and Get Information Safely
Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker.
Preventing Online Identity Theft
Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you.
Make Money Online - Defend Against The Latest Scam
First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product.
Is Your Music Player Spying On You?
In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware.
Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers
I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.
|home | site map|