Today we are going to deal with the topic of password design.

The questions that arise from this are:

  1. Why should you Password security?
  2. What are secure passwords?
  3. How to use passwords correctly?

There are many good reasons why Making passwords secure should be used to prevent misuse. However, many are not yet aware of the topic Password security have been sensitized and this aspect is still very unspectacular in the Computer security consider.

Reasons for simple passwords are for example because one is afraid to forget his passwords again, many do not know which dangers threaten, if one chooses a too simple password or simply comfort.

Therefore I write this article because I want to point out the dangers, why you complicated passwords should use. The dangers on the Internet, spying on access data, cyber attacks and malware attacks are increasing exponentially every year.

1. Why should you make your password secure?

Many do not see the dangers, which can result when a password are created with only one simple combination. Number sequences like "1234", "0000" or simple words like "password", the first or last name, the date of birth or objects nearby are used with the thought: "What could possibly happen…?".

Well, a lot! For example, cracked e-mail accounts or web accounts (online stores, payment systems, communities,…) can be misused to spy out information, through authorization third-party purchases can be made or they can be used as a cover for further criminal activities, which consequently makes you suspect that you have carried out the actions yourself. The imagination has no limits!

If a criminal hacker crack a password would even like to encrypt, it uses a so-called rainbow table for the brute force method. In this form of attack, an attempt is made to common passwords to try. The hacker does not do this manually, of course, but everything is completely automated. (I don’t want to go into more detail now and the info should be enough.)

There are many forms of attack for different targets. Hackers always try to bypass a password with easy variations first. This also includes often used passwords or simple word/number combinations.

However, if you have a password very complex, the hacker no longer has a basic requirement to rely on the simple variants of. Predefined lists, dictionaries or tables containing standard passwords become almost useless for hacking. Thus, the security increases significantly!

2. What are secure passwords?

The password strength is formed from the complexity.

Here I present the characteristics for a secure password:

  1. The Length of the password should not be less than 8 characters. More than 20 characters are recommended for WLAN connections.
  2. The password should consist of an unrecognizable pattern. Simple character strings in combination with simple words also count. For example, if you combine a year of birth and your name ("1975Mustermann") or other example "aBcD1234", the password also no strength and can be easily cracked by various generators.
  3. The password should consist of a mixture of several numbers, special characters, upper and lower case letters.

Here is an example of a good password:

Of course you should this password do not copy and use now. The password consists of 20 mixed characters with an unrecognizable pattern. The hacker cannot use a dictionary or other tools that reference one.

3. How to use passwords correctly?

Passwords should be treated like an apartment key. If you share passwords you trust, do so only with the certainty that this person will also be sensitive with your password, respectively. can handle. However, it is recommended that as a matter of principle you do not share your password with anyone else, but better to create an extra account with another Create password.

Basically, it is also recommended that you NEVER use the same password for every access, but always create a well modified password. This way, in case of a security problem, you prevent that if a password becomes known to a third party, he cannot misuse it for other accesses. Change your passwords from time to time as well.

Finally, I would like to convey to you that if your system is infected with viruses or just suspected to be do not enter any access data via keyboard or should use in general. So-called spyware or. Keyloggers record keystrokes or/and screenshots and send them to a black source. These data could be misused as a result. Use your sensitive access data only on virus free systems!

If you suspect you have malware on your computer, contact me and don’t use any of your Access data.

Like this post? Please share to your friends:
Leave a Reply

;-) :| :x :twisted: :smile: :shock: :sad: :roll: :razz: :oops: :o :mrgreen: :lol: :idea: :grin: :evil: :cry: :cool: :arrow: :???: :?: :!: