wellcom-guest
well-come
   
|TöÞ-®ä†ëð-Pö§†§|
)))))|®äð¡ö|(((((
more than 6 different languages Eng,Tel,Hin,Tam,German,
Spanish,Malay,French





WORLD-SPACE-techpirates
Trojans-Worms
GET-RSS
Book Mark This Site


now online

Strong passwords: How to create and use them,do it yourself!
Sunday
Your passwords are the keys you use to access personal information that you've stored on your computer and in your online accounts.

If criminals or other malicious users steal this information, they can use your name to open new credit card accounts, apply for a mortgage, or pose as you in online transactions. In many cases you would not notice these attacks until it was too late.
Fortunately, it is not hard to create strong passwords and keep them well protected.
Password Strength & Password Security
Your passwords are the keys you use to access personal information that you've stored on your computer and in your online accounts.
If criminals or other malicious users steal this information, they can use your name to open new credit card accounts, apply for a mortgage, or pose as you in online transactions. In many cases you would not notice these attacks until it was too late.

Fortunately, it is not hard to create strong passwords and keep them well protected.
What makes a strong password
To an attacker, a strong password should appear to be a random string of characters. The following criteria can help your passwords do so:

Make it lengthy. Each character that you add to your password increases the protection that it provides many times over. Your passwords should be 8 or more characters in length; 14 characters or longer is ideal.


In general, passwords written on a piece of paper are more difficult to compromise across the Internet than a password manager, Web site, or other software-based storage tool, such as password managers.
Create a strong, memorable password in 6 steps

Use these steps to develop a strong password:

#Think of a sentence that you can remember. This will be the basis of your strong password or pass phrase. Use a memorable sentence, such as "My son Aiden is three years old."

#Check if the computer or online system supports the pass phrase directly. If you can use a pass phrase (with spaces between characters) on your computer or online system, do so.

#If the computer or online system does not support pass phrases, convert it to a password. Take the first letter of each word of the sentence that you've created to create a new, nonsensical word. Using the example above, you'd get: "msaityo".

#Add complexity by mixing uppercase and lowercase letters and numbers. It is valuable to use some letter swapping or misspellings as well. For instance, in the pass phrase above, consider misspelling Aiden's name, or substituting the word "three" for the number 3. There are many possible substitutions, and the longer the sentence, the more complex your password can be. Your pass phrase might become "My SoN Ayd3N is 3 yeeRs old." If the computer or online system will not support a pass phrase, use the same technique on the shorter password. This might yield a password like "MsAy3yo".

#Finally, substitute some special characters. You can use symbols that look like letters, combine words (remove spaces) and other ways to make the password more complex. Using these tricks, we create a pass phrase of "MySoN 8N i$ 3 yeeR$ old" or a password (using the first letter of each word) "M$8ni3y0".

#Test your new password with Password Checker. Password Checker is a non-recording feature on this Web site that helps determine your password's strength as you type.
Password strategies to avoid................

|read more|


cheq your password strength ,strength test by microsoft
|cheq my password strength|

my password:

Labels: , ,

posted by sidhu @ 14:24  
0 Comments:
Post a Comment
<< Home
 
Read this blog
in your language

CLICK ONT THE FLAG AND
SELECT YOUR LANGUAGE

About Me

Name: |devilofdisguise|
Home:   Google
|da land of live thunders|
About Me: Never Explain Yourself- your friends dont need it, Your Enemies wont believe it
Previous Post
Archives
Labels
Join this Community
Powered by

Utterly-alone
devil's workshop
Add to Google
PodNova
techpirates|blogarama - the blog directory
Blog Directory - photarium

© 2006 techpirates . devilofdisguise
script
DISCLAIMER: The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These Ebooks here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. IF YOU DO NOT AGREE TO THESE TERMS THEN LEAVE.

ALL RIGHTS RESERVED NO PART OF THIS TEMPLETE SHOULD BE COPIED
A DEVIL'S SYNDICATE.

Creative Commons License
This work is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0
United States License
.