Securing Your Accounts With Well-Crafted Passwords
In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. This led to an unfortunate incident that involved my website being attacked, apparently by a skillful youth with a propensity for mischief.
The main security flaw with my website was probably the simple fact that the username and password were exactly the same. Granted I did realize that this wasn't highly intelligent but I didn't have the power to change it myself, and I didn't think it really mattered enough to bother about it. Having an identical username and password is a massive "no-no" in computer security. Your username and password should not even be related along the same line of thought. A username of "Dragon" and a password of "Fire" is not a secure combination.
For maximum security, passwords should not be cohesive words or phrases and should not be too obviously related to something like your birthday or the birthday of someone close to you. Personal information is one of the first things used when people attempt to break passwords. Having a password of "Password" is indeed humorous and ironic but it is not in the least bit secure.
A "brute force" password hacking technique involves using certain rules and guidelines to take a guess at possible passwords and generally works through a dictionary of sorts, trying combinations of possible words and common characters. Your best bet at creating a secure password is to pick a random collection of letters, numbers, and symbols, including varying case changes (in a password the letter "a" is not the same as the letter "A", so alternating at random between upper and lower case will increase the difficulty encountered in cracking your password). Selecting a sequence of characters on the keyboard (such as "asdf" or, worse, "1234") definitely does not create a secure, random password.
Having symbols in your password is an easy way to greatly increase security. These are the special characters accessed by holding the "Shift" key and pressing one of the numbers at the top of the keyboard. If you want to truly expand your arsenal of special characters, try holding down the "alt" key and pressing a combination of numbers on the num pad (the rectangular collection of numbers on the right hand side of most keyboards) then release "alt". For example, holding "alt" and pressing numbers, 1 then 6 then 8 and releasing "alt" will give the character "Ņ". Most combinations of 3 numbers will enter a different symbol into your password. This may make it a little harder to enter your password but it makes it a lot harder for anyone else to crack it.
To make passwords easier to remember you can use something original, like the name of your favorite character in a book (personal information that other people won't know). Then add some numbers to it, perhaps use the "Leet speak" (check http://en.wikipedia.org/wiki/Leet for exact definition) method of changing letters to numbers and generally mix things up so that to you it seems coherent and memorable but to an automated pattern recognizer it seems random. For example, "jAm35_5m1ThŅ" ("James Smith") is actually surprisingly secure. In this case the password's meaning is obvious to a human reader but it will take a lot of work for them to divine the password without prior knowledge.
For additional security you should not use the one user name and password for every account that you have. If you do and someone manages to get hold of your details for one site they pretty much have the run of your digital life. It is not particularly vital to have perfect passwords for less important accounts (e.g. web based email from Hotmail, forums you visit etc.). These sites can quite happily be accessed using the same password. However, bank accounts, work email etc. should be made as secure as possible.
Hopefully a few of these tips will assist you in making your online activities more secure. Keep these guidelines in mind, change your password on a semi regular basis, and with any luck you'll be able to avoid the hacking menace that befell me.
M6.Net Web Helpers
Why security should be on every IT department's end-of-year agenda The Enterprisers Project
National Terrorism Advisory System Bulletin - November 30, 2022 Homeland Security
Lastpass discloses the second security breach this year Security Affairs
State of physical security 2022 Security Magazine
China is a growing threat to national security, U.S. companies and American workers, U.S. Commerce Secretary Raimondo says - CNBC
China is a growing threat to national security, U.S. companies and American workers, U.S. Commerce Secretary Raimondo says CNBC
CITE 2022: Overcome Security Challenges and Prepare for 2023's Growing Threats - EdTech Magazine: Focus on K-12
CITE 2022: Overcome Security Challenges and Prepare for 2023's Growing Threats EdTech Magazine: Focus on K-12
Hong Kong publisher's national security trial postponed The Associated Press - en Espa√Īol
Energy Security Support to Ukraine - United States Department of State Department of State
DOD Releases Path to Cyber Security Through Zero Trust Architecture Department of Defense
Chinese cities ease some COVID controls but step up security Los Angeles Times
FACT SHEET: Biden-Harris Administration Announces Expansion of Global Health Security Partnerships and Releases Annual Progress Report - The White House
FACT SHEET: Biden-Harris Administration Announces Expansion of Global Health Security Partnerships and Releases Annual Progress Report The White House
2022 Report on Military and Security Developments Involving the People's Republic of China - Department of Defense
2022 Report on Military and Security Developments Involving the People's Republic of China Department of Defense
43 Cloud Security Terms You Need to Know for 2023 Security Boulevard
‚ÄėDo not come‚Äô: Security for Herzog‚Äôs trip to Gulf said boosted due to online threats - The Times of Israel
‚ÄėDo not come‚Äô: Security for Herzog‚Äôs trip to Gulf said boosted due to online threats The Times of Israel
Microsoft Defender Gets New Security Protections DARKReading
Armed gangs kill 12 in Haiti as public security crisis deepens Al Jazeera English
Apple‚Äôs iOS 16.1.2 update just dropped with security fixes and crash detection improvements - TechCrunch
Apple‚Äôs iOS 16.1.2 update just dropped with security fixes and crash detection improvements TechCrunch
Remarks by Ambassador Linda Thomas-Greenfield at a UN Security Council Arria-Formula Meeting on Climate, Peace, and Security - United States Mission to the United Nations
Remarks by Ambassador Linda Thomas-Greenfield at a UN Security Council Arria-Formula Meeting on Climate, Peace, and Security United States Mission to the United Nations
SMCPS implements increased security at after-school events The Southern Maryland Chronicle
Wib API PTaaS provides validation of API security posture Help Net Security
Open Systems Buys Tiberium to Automate Security on Microsoft BankInfoSecurity.com
U.S.-Colombia Defense Leaders to Discuss Security, Migration, Climate Change - Department of Defense
U.S.-Colombia Defense Leaders to Discuss Security, Migration, Climate Change Department of Defense
Readout of Under Secretary of Defense for Policy Dr. Colin Kahl's Meeting With Czech Natio - Department of Defense
Readout of Under Secretary of Defense for Policy Dr. Colin Kahl's Meeting With Czech Natio Department of Defense
GSC raises concerns about new security app for student use The Stanford Daily
Pickerington Schools security supervisor resigns after five months The Columbus Dispatch
Cornyn: Delay in Passing Defense Bill Jeopardizes National Security Senator John Cornyn
Wiz and BigID expand collaboration to boost cloud security strategies Help Net Security
Friend of Iran midfielder killed by 'security forces' for celebrating World Cup loss to US: report - Fox News
Friend of Iran midfielder killed by 'security forces' for celebrating World Cup loss to US: report Fox News
Security head, US officials discuss sanctions on Russia The First News
Suspects wanted by Homeland Security for breaking into UPS facilities arrested in Lake County - Cleveland 19 News
Suspects wanted by Homeland Security for breaking into UPS facilities arrested in Lake County Cleveland 19 News
The coverage must go on for theater security guard NU PropertyCasualty360
Stop Russia's war against Ukraine, strengthen international security, say civil society groups ahead of ŇĀ√≥dŇļ Ministerial Council - OSCE
Stop Russia's war against Ukraine, strengthen international security, say civil society groups ahead of ŇĀ√≥dŇļ Ministerial Council OSCE
Deputy Involved In Bar Fight, Suggested Security Footage Be Edited, Detectives Say - LevittownNow.com
Keynote speech by NATO Secretary General Jens Stoltenberg at the Berlin Security Conference - NATO HQ
JupiterOne Announces Key Initiatives with AWS to Help Customers Strengthen Security Posture - PR Newswire
JupiterOne Announces Key Initiatives with AWS to Help Customers Strengthen Security Posture PR Newswire
Man skirted security at Atlanta airport, harassed restaurant worker before arrest, TSA says - The Atlanta Journal Constitution
Man skirted security at Atlanta airport, harassed restaurant worker before arrest, TSA says The Atlanta Journal Constitution
Vanderbilt‚Äôs Jerry Stackhouse ejected, held back by security after shouting expletives at officials - AL.com
Vanderbilt‚Äôs Jerry Stackhouse ejected, held back by security after shouting expletives at officials AL.com
Press Briefing by Press Secretary Karine Jean-Pierre and National Security Council Coordinator for Strategic Communications John Kirby - The White House
Press Briefing by Press Secretary Karine Jean-Pierre and National Security Council Coordinator for Strategic Communications John Kirby The White House
Broncos‚Äô Nathaniel Hackett Addresses Russell Wilson‚Äôs Job Security Sports Illustrated
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture - The White House
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture The White House
Exclusive: World Cup soccer fans stopped by security officials for wearing rainbow-colored items - CNN
Exclusive: World Cup soccer fans stopped by security officials for wearing rainbow-colored items CNN
CISA Applauds the Beginning of Infrastructure Security Month Declaring Infrastructure Security is National Security - CISA
CISA Applauds the Beginning of Infrastructure Security Month Declaring Infrastructure Security is National Security CISA
Boost Your Security with Europe's Leading Bug Bounty Platform The Hacker News
New attacks use Windows security bypass zero-day to drop malware BleepingComputer
UN official calls on Security Council to support a 'secure, peaceful and prosperous Sahel' - UN News
Security Cameras Make Us Feel Safe, but Are They Worth the Invasion? The New York Times
How To Avoid Hackers From Destroying Your Site?
Recently, my site and other internet accounts ( http://www.nabaza.
The Truth About Hiding Your Tracks on the Internet
Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet.
The Saga of the Annoying Adware
When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra.
8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft
Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow.
The Move to a New Anti-Virus Model
This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution.
Hacking Threats and Protective Security
The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000.
Top Five Spyware Fighting Tips
Spyware and adware are becoming major problems for onlinesurfers and PC owners. Some highly respected sources such as AOL, Earthlink and Webroot place the rate of infection at 80-90% of all computers.
How To Give Away Your Personal Information
Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information.
Internet Shopping - How Safe Is It?
Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with.
How to Fight Spyware
If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware.
From Spyware with Love!
It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho.
Is Your Email Private? Part 1 of 3
In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure.
The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft.
A Painless Plagiarism Solution
A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www.
Secrets On Security: A Gentle Introduction To Cryptography
Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg.
Consumers: Shop Online and Get Information Safely
Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker.
Preventing Online Identity Theft
Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you.
Make Money Online - Defend Against The Latest Scam
First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product.
Is Your Music Player Spying On You?
In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware.
Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers
I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.
|home | site map|