Security Information |
|
How to Manage Your Username and Password The Easy and Secure Way
Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. I'm now even more paranoid after I joined YMMSS because I use online paymentsystems on weekly basis if not daily. I used to use Microsoft Excel to manage my usernames, passwords, and other registration information, both online and offline. Excel is not safe because there are programs to crack password protected Excel workbooks and I even cracked the spreadsheet and VBA source code password for one of my old Excel financial models I developed. Today I still use Excel to store some personal information but I only save the Excel file on my another PC that is not connected to Internet. In my article "6 Essential Steps to Protect Your Computer On the Internet", I highly recommended the award winning RoboForm. Free version of RoboForm (http://www.roboform.com) does come with limitations such as 10 Passcards only. If you don't want to buy the Pro version (costs $29.99 as of my writing), there is an easy-to-use freeware (see below) you can download right now and manage unlimited usernames and passwords. Download freeware Password Safe from SourceForge.net - the Open Source community. https://sourceforge.net/projects/passwordsafe/ Here are some great features of Password Safe: - No installation is required. Simply download and double click the pwsafe.exe file. - Easy portable. Just copy and paste the EXE file and .dat database file to any disks. Be aware that when you open Password Safe in the other disk, you need to specify the database file location (the .dat file). - One master password unlocks an entire password database that can contain all your other passwords. - Grouping. Usernames and passwords can be grouped into different categories you define, eg. Email Address, Payment, etc. You are in total control. - Strong, random password generation. - Copy username and password to clipboard so that you don't have to type them. Always keep in mind that you should never type any username and password. - Browse to URL. With one click, the URL related to your username and password can be opened in your default web browser. Another save on typing. - You can create more than one password database (but you have to memorize more than one master password. Not recommended.) Here are some tips of using Password Safe (version 2.04) and managing password in general. Tip #1 - Always create a strong master password (Safe Combination as used in the software). Strong password should meet the following criteria: - At least 8 characters long to prevent cracking. The longer the better. - The password should contain lowercase, uppercase, numeric, and any other characters that are available on keyboard. - Ideally you should not use any meaningful words or numbers in the password. Totally random password is the best. Tip #2 - Let PasswordSafe generate random password for you. To generate random password: - Click the menu item Edit. - Select Add Entry (or use corresponding icon button). - When the dialogue window opens, on the right hand side, you can see a Random Password Generate button. Click it, a random password will be automatically inserted in the Password field. The generated random password is constructed according to the password policy defined in Password Safe. You can modify the default policy. - Click the menu item Manage. - In the dropdown menu, click Options. - Click the Password Policy tab. - Change the policy based on the strong password criteria stated above. Some sites only allow alphanumeric passwords so make sure you select the appropriate check boxes when this is the case. Tip #3 - Very Important: Never type your master password when open PasswordSafe. Keylogger spyware can record keystrokes. How can you enter master password without typing? I do this. Step 1: Open a Notepad file (.txt). Step 2: Copy and paste an article from any Internet website to this .txt file. Step 3: Select characters from this article and copy, paste to form your master password. Tip #4 - Very Important: Never lose your master password. I memorize my master password. In addition, I also physically write it down to a hand written study material that has my previous uni works. Among the 1,000's of words, I placed my 22 characters master password in two different pages in encrypted format that can let me derive my master password. Tip #5 - Categorize username and password. When you add a new entry, you need to specify Group, Title, Username, Password, and Notes. The entries that share the same Group name will be gathered together automatically. One Group can contain another Group as its sub Group. For example, I have Email Address group which contains three sub-groups as Friend, Work, Family. Tip #6 - For security reasons, always use Copy Username to Clipboard and Copy Password to Clipboard. Remember, never type username and password on a web form. This is how to do it. - Highlight an entry. - Right click mouse. - In the pop-up menu, select Copy Username to Clipboard or Copy Password to Clipboard - Go to your login form, paste the username or password. You can use mouse to do copy and paste. If you prefer short-cut keys, this is how. Copy: Ctrl+CPaste: Ctrl+V Tip #7 - Use "Browse to URL" rather than typing URL in browser address bar. When you enter a new entry or edit an existing one, you can enter a URL (must start with http://) at the first line in the Notes field. You can save website login page's URL in this field. When you need to open a login page in browser, right click the entry and click Browse to URL in the pop-up menu. Then the login page will be opened in your default web browser automatically. Tip #8 - Don't forget to backup your password database file. Use the Make Backup menu item to save a second copy of your password file. Tip #9 - Store your backups in a different offline computer or location. This is a widely used backup strategy. Tip #10 - Use the Notes field to store as many information as you want. Very handy for memo. If you don't have two computers, you need to use other storage media to save a second copy of your backup file and version them by date (easy to track back). Other storage media can be zip drive, thumb drive, floppy disk, CD, etc. Off site backups are also important. Don't overlook this. You lose all your data if you lose both your computer and your other storage media all together for any reason. Many companies provide online storage services for a fee. You can store any digital files (you should password protect these files first) on their secure servers. Search Google and you will find a lot. I have two computers. One is used to surf net and it does not have any sensitive info stored on it. Another one is for my development work (not connected to Internet) and it has my backup files. I also store my backups in a thumb drive and CDs sometimes. The author, Jerry Yu, is an experienced internet marketer and web developer. He is a proud member of YMMSS. Visit his site Get Paid Full Time Income By Reading Ads Online - YMMSS for FREE "how-to" step-by-step action guide to kick start a successful online business, tips, knowledge base articles, and more.
MORE RESOURCES: Homeland Security Department to Release New A.I. Guidance The New York Times Officials detail increased D.C. security for certification, inauguration The Washington Post US ambassador says Mexico 'closed the doors' on security cooperation and denies its violence problem ABC News The UN cybercrime convention threatens security research. The US should do something about it CyberScoop Nuclear power for military bases will increase our national security Breaking Defense Brief altercation between fans mars France-Israel soccer match despite heavy security The Associated Press Opinion | Trump’s national security wrecking crew The Washington Post U.S. ambassador bashes Mexico’s security efforts. Mexico’s president pushes back - Los Angeles Times The Fastest Airport Security Line You Don’t Know About The Wall Street Journal Do Titans QB, Coach Have Job Security? Sports Illustrated ‘Never trust, always verify’: The zero trust approach to network security United States Army The campus will be closed to anyone who is not a student, faculty or staff member. WVTM13 Birmingham Tuskegee president releases security updates following shooting WIAT - CBS42.com Video: How The Fortinet Security Fabric Is Combatting Cybersecurity Threats And Talent Shortage Channel Insider Tuskegee University Shifts Security, Facilities Leadership Tuskegee University Endpoint Security from BlackBerry BlackBerry 3rd Annual U.S.-Mexico Defense and Security Roundtable smallwarsjournal France draws with Israel in high-security operation to reach Nations League quarterfinals with Italy The Associated Press Homeland Security Department releases framework for using AI in critical infrastructure The Associated Press France-Israel Soccer Match is Overshadowed by Amsterdam Attack The New York Times After student allegedly threatens classmate with gun, Ambridge Area School District makes security changes CBS Pittsburgh Tom Homan, Trump’s ‘Border Czar,’ on Border Security The New York Times St. Francis Seraph hires security guards for Christmas, Nativity display visitors as crowds still plague area WCPO 9 Cincinnati Suspect in Little Italy shootout with police was a security guard doing contract work for MTS CBS News 8 Trump’s National Security Team Keeps Getting More Extreme The New Republic South Florida campus security officer arrested after attempting to meet minor for sex WPBF West Palm Beach Linn County’s Food for Health pilot program aims to improve food security, support local economy KEZI TV Lamar CISD invests in safety, security amid rapid growth Community Impact How security partnerships are transforming to meet modern demands SecurityInfoWatch Rand Paul Will Continue His COVID-19 Investigations From Atop the Senate Homeland Security Committee Reason Mexico’s ‘hugs, not bullets’ security strategy has failed, says US Ambassador Ken Salazar Mexico News Daily Trump names Florida’s Rep. Mike Waltz as national security adviser Nebraska Examiner ESA opens registration for 2024 Town Hall Broadcast SecurityInfoWatch Mexican Officials Arrest Top Security Official in Mayor’s Beheading The New York Times 11/14/24 National Security and Korean News and Commentary smallwarsjournal ASIS, International Protective Security Board Sign Memorandum of Understanding Security Sales & Integration Federal officials warn Boston churches to increase security after wave of arson attacks CatholicVote org Akamai: 84% of security professionals experienced an API security incident in the past year SecurityInfoWatch Suspect in Little Italy shootout with police was a security guard doing contract work for MTS CBS News 8 Arizona governor pledges work with Trump to secure the border Arizona's Family Gov. Gianforte unveils budget proposal built around 'security and prosperity' Bozeman Daily Chronicle Trump Picks Kristi Noem for Homeland Security Secretary The New York Times ASIS International, International Protective Security Board sign MOU SecurityInfoWatch Microsoft Patch Tuesday, November 2024 Edition Krebs on Security USX Cyber Expands Phishing Defense in GUARDIENT XDR with Advanced Email Security Training Tools PR Newswire Seven Recommendations for the New Administration and Congress: Building U.S. Critical Minerals Security Center for Strategic & International Studies Who Is Michael Waltz, Trump’s Pick to Be National Security Adviser? The New York Times |
RELATED ARTICLES
The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,.. Temporary Internet Files - the Good, the Bad, and the Ugly A little bit of time invested into learning about internet security can go a long way in preventing mishaps on your computer. Temporary internet files are not something we should be afraid of, but we should certainly be careful in how much we trust them and how we deal with them. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. How to Get Rid of New Sobig.F Virus? As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Breaking Into Your PC: News... You'd better learn news from media, not from emails, security experts warn us users again.Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. Identity Theft - Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Phishing Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. How To Avoid Hackers From Destroying Your Site? Recently, my site and other internet accounts ( http://www.nabaza. |
home | site map |
© 2006 |