the Internet Windows Android

Check the complexity of the password and its compilation. How can you come up with a reliable password

12345 - We need to change the password. How to come up with a challenging password and remember it forever

Internet fraudsters die every day millions of passwords from mailboxes and user accounts. But do not despair - we will give some very simple, but effective tips that will protect you from losing control over your resources.

1. Use complex passwords

You guessed, yes? Sorry for the banality, but this is the main advice - which still most users neglege. No wonder the QWERTY passwords remain in the top of the most popular to this day.

Do not use the names of your favorite heroes as a password, the name of the football club or a nickname of a pet, since this information is easy to find in your social networks. A difficult password should consist of an arbitrary combination of various signs and symbols.

2. Use capital and lowercase letters, numbers and symbols.

Users do not like long passwords - they are easy to forget and lazy to gain. Password of 8 characters was considered reliable only at the dawn of the development of computers; Today, the eight-digit combination is mechanically selected in a couple of hours.

However, even a short password (up to 8 characters) can be made relatively reliable if you use numbers and letters in different registers. The selection of such a password will require 2-3 days.

Maximum reliability is achieved by a simple increase in password length and use different characters ($,%, &, ', #), In those services where possible.

3. Use Acronym

Select the phrase that you definitely do not forget, and use the combination of the first letters from each word as a password. For example, the poem of 1828 "At Lukomorye Oak Green, the Children's chain on the oak volume ..." turns into ULDZZCNDT1828.




4. Use with a keyword

Select a keyword and mix it with the name of each site where you have account. For example, for keywords "Antivirus" Password on the site will look like this: C a.l. n.u. t.b. i.e. v.s. i.e. r.t. u.n. s.oD32. The advantage of such a trick is that you will have reliable password For each site.

As prompted in the comments, this method can be summarized in case of changing the address of the site - but in this case it is enough to use the password router.

5. Do not use one password for different accounts.

Like a real artist, be original. Remember that different sites have a different level of security. For example, most services send passwords by email through the password recovery procedure. Favoring a password from unsafe service, hackers can try to use it and for your mail or social networks - the same password will become the key to all your resources.

You can reduce risks only using unique complex passwords for all accounts.

6. Change passwords more often

In the case of the alarm of passwords Mail.Ru 99.982% of all passwords were irrelevant. In many ways, this happened due to the fact that most of the base of stolen accounts was compiled from a number of other bases.

However, in the case of 57 million addresses (precisely as many records were in the leaked database) this is not enough - you can vouch that your box on Mail.Ru is not compromised by intruders? And this is just one example of a leaked base - how many millions of current addresses are walking today by the hands of hackers, we do not know.

But we know exactly what they would be less than if users regularly changed passwords.




7. Use password manager

How not to forget password from account VKontakte, mailbox and Internet banking? Few people can remember dozens of difficult passwords. This is normal.

Fortunately, developers software Invented a solution. Today there are many tools that help users reliably store an unlimited number of the most difficult passwords. For example, you can use the most popular - LastPass or 1PASSWORD.

However, password managers have their weaknesses. The most important accounts through which you can access your bank information should not be trusted even the most reliable programs.

8. Do not forget about the "Secret Question"

In the Council number 1, we recommended not to use data as a password that you can easily learn about you from social networks. The same applies to the "secret questions", which many for some reason forget or do not give them importance. In addition, attackers can easily choose the response from the base of popular options.

Try using the tactics of the absurd when the answer has nothing to do with the secret question. Mother's maiden name? Aspirin! Pet nickname? 1989!

9. Use two-factor authentication

To maximally reduce the risk of leakage of credentials, use two-factor authentication wherever possible.

Most social networks, postal and banking services allow you to enable SMS authorization confirmation. Thus, fraudsters will not be able to access your account if they have no mobile phone in their hands.

So, if you have an account on Yandex, we recommend using the function two-factor authentication Yandex.Chelch:

  • Download app for Android or iOS
  • Enter the password or QR code
  • Log in to Yandex.
  • PROFIT!
P. S. Print and save the recovery codes in case the smartphone fails or lost.


10. Antivirus - our all

Passwords do not just fall into hackers, do not float them through the air (except for ordinary fraud, when users themselves report to the criminals passwords from their services).

Personal data are assembled and sent to hackers quite specific malicious programsthat all truths and inconsistencies seek to get to your PC, laptop or smartphone.

Therefore, put a reliable antivirus with (and regularly update the bases) - one of the main ways to save your money, nerves and privacy.

Password during registration. Login and password. Forgot password. This is what everyone faces. What password to put in order to be reliable? Best of all you will answer hackers.

The problem of installing passwords has two aspects. The first one should be reliable. The second - you should not forget it. If we can give advice on the first item, then there are no. Everything depends on you. Get yourself a paperbook and record all passwords there. You can burn on a rarely used flash drive.

Hack the password is quite simple if someone set this goal. This is only a matter of time and tools. But on the path of intruders, you can put a lot of obstacles, including the correctly selected password. In principle, each password password that you enter is encrypted from MD5 encryption to 3-speed reverse. However, who intends to hack already knows how encrypted, and if you give a direct hint incorrectly by choosing a password, then a thousand times easier for him.

If you just lose control of registration on the site, then this is not a problem. That's if you lose control of your mailbox or account on the social network, then this is a big problem. In a light case, spam will be sent from you, and you will lose confidence with many of your contacts. In the worst case, you lose money and compromise yourself. Restore and update the password is usually possible, but you still get problems.

It is like the height of the fence. The higher, the more difficult it is to overcome the attackers. It is possible to climb, but much more complicated.

Do not neglect the tips.

  1. The longer the password, the better. !!! Even a simple bust in much more difficult to hack him. Pure "brutal" attacks on your time password is more complicated. Now the norm from 8 acquaintance.
  2. Never login should match the password.
  3. Use a unique password that has not previously indicated. Those. No need to use the password that you have already used somewhere. At least with hacking you lose and the rest. Enter the habit to record them on paper or throw off the flash drive that is rarely used.
  4. Password must be diluted. The letters are numbers, and symbols. Necessarily. After all, it is easy to put, but for hacking another problem over time.
  5. Better if the password is meaningless VI3% DRSOWTZ5, and not ordinary words in Russian, English.
  6. Symbols of different registers are more than welcome.
  7. Never use your name and people close to you, dogs and cats, and even more than birth dates. Do not believe, but this is the first to check before hacking a password manually.
  8. Phone number and all sorts bank cards in no case.
  9. Conventional keyboard passwords are also not - type QWERTY and 12345678

And now the easiestly wigble that was introduced at the end of 2013 on the Internet. Do not use at least them.

Last year, the most popular was 123456.

What password to put the choice for you, but the tips are based on elementary hacking algorithms.

We live in an information age when everyone can hack your post, profile in social networks Or your site, if anyone is.

How to come up with a login and password for registration so that no one hacked you? Very simple…

It is extremely important to have at hand reliable protectionthat even the strongest hackers will not be able to hack you.

I always considered it a little nonsense, well, who needs data of a person or another. But, because if we reasonably, people who know how to hack it can do it. If it is not clear, then I will try to bring such an example that it is like the desire of the pocket, who tied, stretch the handbag from the old woman, on the bus.

That is, the hackers can also be improved its skills. Although, everyone has their own motives, which is why I decided to write a detailed post, how can I protect my Internet resources and data.

How to come up with a login and password for registration

Now, everywhere on the Internet, what is being introduced constantly? That's right: passwords and passwords again, therefore it is important to register such that no one and never hacked.

A good password must meet such modern requirements:

  • there should be not only Latin letters, but also numbers;
  • its length should be from 8-12 characters and this is a minimum;
  • it is best to use for a password all the letters of your keyboard;
  • it will be great if your passwords will be spaces, and somewhat;
  • do not try to start the passwords in which your date of birth is indicated or the street number and home;
  • you do not need to enter the password, as the letters that are accommodated next to the keyboard.

These are simple rules that you must take into account when registering passwords to your profiles on social networks, for example: in vK, Facebook, Twitter, google Plus. . Let's say if you are registered on a disposable forum, for example, only to download, you can enter anything.

By the way, the excellent rule, try, from time to time, to update the passwords on your sites, it will complicate, and then let go of possible haters. And best, attach to your sites authorization via SMS.

Even if your login and password find out, you still will not be able to go, since they will need to access your mobile.

Reliable username and password

There are many ways to help you pick up a sophisticated password.

  1. It must be not clear. How we come up with the password, mostly, this is the word and some numbers that honor it means. Come up with the word that is not in the dictionary, then add numbers to it, which, in your life, do not mean anything.
  2. Come up with a few words, and already in the middle of each, put some kind of sign, for example, comma. Here is an example "Luck !! Jipa, RO". It seems to be phrase: "The best password", and you try it to pick it up, because there are two signs of exclamations and commas.
  3. Enter password with big and small letters. Here: "Mojden woman229"Also such a password will be difficult to pick up.
  4. In general, it will be cool if you specify a word in your password, and add your non-existent birth date to it. Even if the hackers break you, they will check your date of birth, your relatives, but not else. Here, a simple example: "Sanechek19550202". As you can see, the numbers here do not designate anything at all, so it is extremely difficult to choose.
  5. We take some book or magazine and write a phrase there, which, again, nor how does it fit into your life. For example, the password of the next type, well, how not to solve "Valery Meladze in Minsk". The most important thing you do not forget him.

Well, with passwords, I think you figured out, now you know how a reliable and complex password should look like, which can be used to register mail, social networks, on sites, forums, Youtyub.

How to come up with Login

The most important thing is that you need to remember that the words you use in login should not be used in the password and vice versa.

To find a login, you can:

  • use the standard, on the site, the generator;
  • come up with such from your past or vice versa from what you dream to come, for example: biznes-cool;
  • you can take from your hobby;
  • profession in real life will also suit;

In short, there are many free words that you can use to log on to any site.

I hope that I did not miss anything and an article on the topic, how to come up with a login and a password for registration turned out to be normal. If even missed, I'm sorry, I can add.

I have everything on this, thank you for reading this post.

Yours faithfully, Yuri Vatsenko!

All blog articles

In order to securely protect the data on the computer from hacking intruders, it is necessary to always think over the options encryption information. As a rule, a password is always used to enter certain sites or using certain applications. However, thanks modern technologies Today's hackers guess very quickly and recognize simple methods encryption. In order not to lose the right data and not to be a victim of intruders, it is necessary to thoroughly think through the "Passvord". In order to figure out how to do it, first of all, it is worth considering varieties and methods of encryption.

Types of passwords

To date, the following varieties of encryption are distinguished:

  • alphabetic;
  • symbolic;
  • digital;
  • combined;
  • with the use of the register.

The first 3 categories are considered the most unreliable. If, when creating a password, letters or symbols were used, then such a cipher is quite simple to hack even the elementary program itself. Such "Passvorda" can be used exclusively on forums or accounts that are not scary to lose. It is more serious to consider the following categories of coding.

How to come up with a password: letters, numbers and symbols

The bigger for more information Contains the code, the better. Such ciphers are almost impossible to hack. If the codes use the combinations of letters and numbers or different characters, then these are the most complex passwords.

It is also worth considering that the code must be not very short. The fewer the characters were used in encryption, the easier it would be an attackers. Therefore, a difficult password out of 8 characters or more signs is considered the best.

If we talk about the examples of bad passwords, the worst of them are considered combinations consisting of identical repetitive numbers or letters. In this case, hacking is guaranteed.

However, many are faced with the fact that it is not easy to choose the options of complex passwords for the mailbox or other means of authorization on virtual resources. The fact is that many network users enter the most diverse portals. If for each of them come up with a separate code, you can eventually get confused. What to do in this situation?

Register

The most complex passwords, as a rule, simultaneously consist of capital and lowercase letters.

It is not recommended to use specific words that can be translated from English or other languages. It is better if it is a chaotic set of characters, in which some signs will be large, while others are small.

It is more convenient to memorize passwords written using the register if a certain sequence of uppercase and lowercase letters is observed. For example, the first character can be made small, the second is big and so on.

Calling

In order not to break your head, how to remember the complex password Some network users are very often used as a "Passvord" date of your birth. Unfortunately, such codes are considered the most unreliable. The fact is that the attackers will not be difficult to find this information on social network or other sources. However, this does not mean that this method It is worth excluding. If you mirrorize all characters in the code, you can create a fairly interesting password.

For example, a complex password from numbers "772010" means that a person was actually born on February 1, 1977. However, it is desirable to supplement such a cipher with some other characters.

Generators

And in order not to break your head over how to come up with a password much easier to use for this finished programs. However, it is necessary to understand that when using such applications, there is a risk that they themselves can be developed by intruders, so much better to invent "Passwords" on their own.

However, it is still worth considering what the generator is. This program creates passwords by the random selection of random combinations of letters, numbers and other characters. In this case, as a rule, several coding methods are used immediately, with the exception of "flutter".

Programs of this type are very small and easily installed. As a rule, they have only 1 button, so even an inexperienced user can easily choose the password most liked it and use it.

In such programs, internal antiviruses are usually installed, which prevent attacks of intruders. However, it should be borne in mind that the codes will be stored in the program base, respectively, the malware can access these files.

In addition, after using the generator, many users get extremely complex passwords that are simply impossible to remember. Some make a huge error, recording this information in the file, saving it on the desktop of the computer. Do it is categorically prohibited.

Encryption

This coding method echoes the methods described above. Consider in more detail how encryption is performed. Make it is much easier on the example of complex passwords.

You can take the most simple, but a unique phrase that a person can quite just remember. For example, someone liked the phrase "Space Oysters". You can also use any lines from loved songs and poems or just a set of chaotic words that most like the user.

  • Rewrite all Russian-speaking words using English layout. According to our example of a complex password, it should turn out something like RJCVBXTCRBT ECNHBWS.
  • Mirrorically display the swbhnce tBRCTXBVCJR phrase.
  • Replace all letters on symbols that look like them. For example, the letter "O" can be replaced with "()", and the symbol "I" can be fully indicated as "!" etc.
  • Remove pair or not pair characters.
  • Remove all consonants or, on the contrary, vowels.
  • Add Additional Special Symbols or Figures.

There is also another way that will help quickly make up the most difficult passwords and do not forget them. For example, take all the same phrase "Space Oysters". If you take the first 4 letters of the first word and 4 symbols from the second, then the incoherent word "cosmrices" will be. After that, it is enough to switch to English layout and dial this combination again. We get RJCVHBWS.

If a little complicate the cipher and add a capital letter, then in this case the password will be remembered very easily, as the original word is known only to the user.

Such combinations are considered the most complex passwords that are fairly easy to remember.

As a rule, many novice users of the network use their address as a login. email. In no case should do this, as it is not necessary to find out the data on the mailbox of a person will not be attackers of any difficulty. Therefore, it is better to come up with some other word. It is also worth adhere to the following recommendations:

  • When making passwords, it is impossible to use personal data (such as surname or name, as well as the names of relatives or nicknames of pets).
  • It is not recommended to enter addresses, date of birth and other information that can be easily obtained in any social network.
  • You should not use those phrases or phrases, which are widely used in the convenience of most people.
  • Code length should be at least 10 characters.

How to remember the new password?

To do this, it is best to use some phrases that no one else repeats. Apply quotes of famous people are not recommended, since many do it.

You can use the vehicle autogenerator for this, also other poetic services, which today there is a huge amount.

Perhaps in the family it is customary to use some kind of word or an expression that rarely use someone else. You can simply apply Latin letters to write it, as well as supplement them with some significant numbers that will not be a date of birth.

Today, each user has to work with a lot of services in. For your profile on social networks, on entertainment and professional sites, to electronic mailboxFor access to a bank account, you have to come up with such that it will be difficult to hack even an experienced hacker, because personal fraud is often and material losses.

What password is considered unreliable?

By registering at the next, it is necessary to remember several criteria that must be considered. Passwords for different services should be different!


Can not be invented simple passwords. Examples of passwords - 123, 12345, 321, 654321, 123456789, QWERTY, PASSWORD, (Your date), (Your name / surname / patronymic), (name of your favorite cat) and the like.


The password should not be short. It is advisable to come up with a password with a length of at least 8-10 characters.

Two very simple ways to come up with a reliable password

The first way. Dial B. text editor letters (capital and lowercase), numbers and special symbols (for example, &%,),\u003e, etc.) in random order.


The second way. Remember the long word and write it down in english layout (for example, the long-lkbyyjittt), after which some letters replace the title, and insert several digits between them between them. It should be something like - [Email Protected]+ TTT.