Security Information |
|
Can I Guess Your Password?
We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. And writing them down somewhere isn't a great deal safer than using the same password again and again. You can buy software that stores the passwords for you, but do you really want to pay money for another piece of software that performs a solitary function? Try this simple, two-step, technique that lets you generate an infinite number of passwords, without having to remember any of them. Step One: Choose a 4-6 letter word or number sequence that you can remember easily. Needless to say, don't reveal this to anyone. For the purpose of this demonstration, I'll choose the word "cash" Step Two: Apply this secret word or number sequence to the name of the program you are setting up the password for. To accomplish this, invent a couple of easy to remember rules. Rule 1: Decide which part of the program name you are going to use. It could be the whole name, the first 6 letters of the name, the last 8 letters of the name. It's totally up to you, be as creative as you like. eg - For the program TrafficSwarm, I might choose the first 8 letters of the name. This give me: "traffics" Rule 2: Take the portion of the program name you have selected and merge it with your secret word or number sequence to create a unique password. Again, be as creative as you can with this rule. You could replace every second letter, every third letter, every vowel or every consonant. eg - If I replace every second letter of "traffics" with my secret word "cash", I get " t c a a f s c h " or - If I replace every vowel of "traffics" with my secret word "cash", I get " t r c f f a c s ". The "s" and the "h" are not used as "traffics" has only two vowels, but some words will use all four letters of "cash". Some words might have more than four vowels, in which case just start back at the beginning with "c" and "a" and so on? You don't have to worry about making your rules overly complex. Even the best code-breakers would need to see several of your passwords before they could start to guess what you rules are. As long as you keep your rules safe and sound, your password is secure. But the real beauty of this system, is that you don't have to remember the passwords you create. You ONLY have to remember the rules. When you log into the program the next time, just apply your rules to the program name, and you can work out what password you generated. Once you have been using the rules for a while, you'll generate the password in your head, without even having to pause. Don't worry if it seems a little complicated at first. Read this article through a couple more times and then try this technique with just a couple of programs. Once you are happy with it, all that's left to do is to start working your way through existing programs and update your passwords. It's time consuming, but for peace of mind you'll be glad you did. David Congreave is owner of The Nettle Ezine, the newsletter for the home business -- online. David lives in Leeds, in the United Kingdom, with his wife Leanne.
MORE RESOURCES: Trump's inauguration coincides with an unprecedented string of high-stakes security events in DC The Associated Press Lawyers for security consultant say CNN report on Afghan evacuations destroyed his career Los Angeles Times Louisiana Attorney General announces full review of New Orleans security plan ahead of terror attack WDSU New Orleans Pensacola stepping up security of Mardi Gras in wake of New Orleans truck attack Pensacola News Journal U.S. House GOP kicks off new session with border security push Colorado Newsline âFaithful public servantâ: Alabama trooper on Gov. Kay Iveyâs security team dies of cancer AL.com Heightened security in DC ahead of President Jimmy Carter's state funeral ABC6OnYourSide.com Social Security Fairness Act signed into law by Biden, enhancing retirement benefits for millions CBS News Security guard killed in shooting at Honduran Consulate in Doraville The Atlanta Journal Constitution New Orleansâ Homeland Security director expects more federal resources for Carnival season FOX 8 Local First Veracode Boosts Supply Chain Security Via Phylum Acquisition BankInfoSecurity.com Opinion | Banning TikTok Wonât Solve Your Data-Security Problem The Wall Street Journal Kansas audit flags staff safety, security concerns at Osawatomie State Hospital KSHB 41 Kansas City News January 2025 security patch rolling out for Google Pixel devices, here's what's fixed Android Central Women in Security Profile: âThe industry needs to apply outside-the-box thinking when it comes to recruiting SECURITY SYSTEMS NEWS UW-Stevens Point announces new chief of police, security services Wausau Pilot and Review Security guard killed while trying to stop gunman from entering Honduras consulate in DeKalb County WSB Atlanta CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes CSO Online Skyhigh Security Completes Breakthrough 2024, Surpasses Key Customer and Financial Milestones Business Wire A Look at Changes in the NEW HIPAA Security Rule Healthcare IT Today Marine Corps bases heighten security after New Year's Day attacks Jacksonville Daily News GlobalLogic and Hitachi Systems Trusted Cyber Management Open Cutting-Edge Security Operations Center in Poland Business Wire Border security is national security Washington Times Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Alert: New HIPAA Security Rule Updates You Need to Understand Telehealth.org | Professional Training & Consultation Nebraska Distributes $10 Million to Boost School Security and Safety Campus Safety Magazine Merced police to increase security at upcoming MLK parade, following New Orleans terrorist attack Hanford Sentinel Ron Dermer meets with US National Security Advisor at White House The Jerusalem Post UN aviation agency investigating 'potential' security breach BleepingComputer AuditBoard Ranked #1 in Enterprise Security Compliance in G2 Winter 2025 Grid Report - Business Wire How to Lose Your Security Clearance: 2024 Edition ClearanceJobs Security questions CEOs should be asking after the UnitedHealthcare killing, according to experts Fortune New Orleans carnival season begins with high tension, tight security after New Year's attack WBUR News Massachusetts awards $1.8 million to fund abortion access, security upgrades for abortion providers Boston 25 News Data deregulation to AI protection: Security priorities in 2025 Security Magazine Cactus Custody Releases 2024 Highlights: Advancing Security, Compliance, and Innovation Markets Insider Marine Corps Air Station Beaufort heightens security measures WJCL News Savannah 2025 Security Industry Predictions: Faisal Pandit, VP and GM, Johnson Controls Security Sales & Integration Valley Metro selects STV to implement new safety and security on its rail and streetcar network Mass Transit Magazine Kevin Kelly on Arcfield's Continued and Growing Commitment to National Security and Space Missions WashingtonExec Former security guard accused of secretly recording young girls at The Woodlands Mall KPRC Click2Houston Cymulate acquires CYNC Secure to accelerate continuous threat exposure management capabilities SecurityInfoWatch Amazon's Choice Solar-Powered Eufy S220 Security Camera Is Nearly 50% Off for a Limited Time Gizmodo Parks Associates: 32% of US households have a paid security service SecurityInfoWatch INE Security Alert: Comprehensive Training Solutions to Help Organizations Achieve CMMC Compliance Yahoo Finance Napco Access Proâs Continental Enterprise Security Management Platform, GSA Certified, FIPS 201 Approved Security Today Joint Base San Antonio tightens security after Army vet, Green Beret suspected in unrelated New Yearâs attacks The Texas Tribune |
RELATED ARTICLES
Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. Dont Miss Information Because of Misinformation It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other medium on the planet. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Anti-Spyware Protection: Behind How-To Tips There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. If You Sell Anything Online Your ePockets Are Being Picked You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT. All About Computer Viruses Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. |
home | site map |
© 2006 |