Securing Your Accounts With Well-Crafted Passwords
In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. This led to an unfortunate incident that involved my website being attacked, apparently by a skillful youth with a propensity for mischief.
The main security flaw with my website was probably the simple fact that the username and password were exactly the same. Granted I did realize that this wasn't highly intelligent but I didn't have the power to change it myself, and I didn't think it really mattered enough to bother about it. Having an identical username and password is a massive "no-no" in computer security. Your username and password should not even be related along the same line of thought. A username of "Dragon" and a password of "Fire" is not a secure combination.
For maximum security, passwords should not be cohesive words or phrases and should not be too obviously related to something like your birthday or the birthday of someone close to you. Personal information is one of the first things used when people attempt to break passwords. Having a password of "Password" is indeed humorous and ironic but it is not in the least bit secure.
A "brute force" password hacking technique involves using certain rules and guidelines to take a guess at possible passwords and generally works through a dictionary of sorts, trying combinations of possible words and common characters. Your best bet at creating a secure password is to pick a random collection of letters, numbers, and symbols, including varying case changes (in a password the letter "a" is not the same as the letter "A", so alternating at random between upper and lower case will increase the difficulty encountered in cracking your password). Selecting a sequence of characters on the keyboard (such as "asdf" or, worse, "1234") definitely does not create a secure, random password.
Having symbols in your password is an easy way to greatly increase security. These are the special characters accessed by holding the "Shift" key and pressing one of the numbers at the top of the keyboard. If you want to truly expand your arsenal of special characters, try holding down the "alt" key and pressing a combination of numbers on the num pad (the rectangular collection of numbers on the right hand side of most keyboards) then release "alt". For example, holding "alt" and pressing numbers, 1 then 6 then 8 and releasing "alt" will give the character "¿". Most combinations of 3 numbers will enter a different symbol into your password. This may make it a little harder to enter your password but it makes it a lot harder for anyone else to crack it.
To make passwords easier to remember you can use something original, like the name of your favorite character in a book (personal information that other people won't know). Then add some numbers to it, perhaps use the "Leet speak" (check http://en.wikipedia.org/wiki/Leet for exact definition) method of changing letters to numbers and generally mix things up so that to you it seems coherent and memorable but to an automated pattern recognizer it seems random. For example, "jAm35_5m1Th¿" ("James Smith") is actually surprisingly secure. In this case the password's meaning is obvious to a human reader but it will take a lot of work for them to divine the password without prior knowledge (unless you've used your name or a close relative/friend's name which, as we've already discussed, is not a good idea).
For additional security you should not use the one user name and password for every account that you have. If you do and someone manages to get hold of your details for one site they pretty much have the run of your digital life. It is not particularly vital to have perfect passwords for less important accounts (e.g. web based email from Hotmail, forums you visit etc.). These sites can quite happily be accessed using the same password. However, bank accounts, work email etc. should be made as secure as possible.
Hopefully a few of these tips will assist you in making your online activities more secure. Keep these guidelines in mind, change your password on a semi regular basis, and with any luck you'll be able to avoid the hacking menace that befell me.
Daniel Punch
M6.Net Web Helpers
http://www.m6.net.
More Resources
Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exitingRelated Articles
Playing Games Like Its 80s
Do you miss the good old 80's Amiga and Commodore games? You are not the only one. In fact, creating remakes for popular eighties games is all the rage.
Rome Total War: Battle Strategy Guide
A. FormationsIt's pretty much common sense to come up with a good formation foryour army but the basic idea in most situations is to have your infantry in front, ranged units behind, cavalry protecting the flanks and your general right behind the infantry.
Why We Play Games, Part 2
Last week we started to get into the motivation of the gamer. We discussed challenge and its ugly stepsister competition, two of the most common motivators.
A Parents Guide to Online Gaming, Part 2
In part 1 we talked about online gaming and your children, including FPS games and exposure to violent content. We wrap up this week by talking about RTS games, MMORPGs and the additional threats of addiction and social predators.
Indie Games that Made It to the Tops of the Charts this Year
1. Platypushttp://www.
Drawing Hand Held Surface to Air Missile Fire at Night Using UAVs
One of the easiest ways to draw shoulder launched missiles at night is to fly UAVs very close and use the simulated sound of an Apache Attach Helicopter, Howling of a jet fighter or a few UAVs flying together the combined sound of a four engine transport. At night you could have a few UAVs with strobe lights or a tint of green glow simulating reflections off the canopy of an attack helicopter along with sound used by a whistler on the UAV, or even a whistler, which mimicked a high frequency sound which caused their equipment to whistler.
Review: Samurai Jack -- Code of the Samurai
Fans of Genndy Tartakovsky's "Samurai Jack," which wrapped last year on the Cartoon Network, enjoy the quirky storytelling and stunning visuals, also the martial arts sequences. Naturally, it was only a matter of time before the online gaming industry turned the time-traveling samurai's adventures into video games.
Zuma Deluxe Style Games Evolution
As I think most of gamers who play in shareware games know game called Zuma Deluxe. This game was extremly popular some time ago and still popular now.
A Comparison Of the Next Generation Gaming Consoles (Part 1)
It's been about 5 years since we have seen a new video game console. By spring of next year all three major companies will have released their new systems.
Full Version Pocket PC Games For Free
Play Games InsteadDo you like your full version pocket pc games free? Most people do. The world of freeware downloads for your pda or pocket pc is wide and varied.
Popular Electronic Games - They Are Not Just For Kids Anymore
Superheroes battle monsters and space invaders in fast action games. Players take on the role of these superheroes in epic battles.
Are You A PC Gamer And Want The Best Out Of Your Graphics Card?
IntroductionIn this article you will learn how to get the most out of your graphics card by installing new drivers and tweaking Windows. The guide is based around Windows XP Professional Edition but you can use the same guide to tweak other Windows operating systems.
The Future of Submarine Games
In the last six months, the demise of sims has been pronounced in abundance. Print mags and sim webzines have been telling you sims are being cancelled left and right Jane's A-10: Cancelled.
Best Space Themed Games - Part I
Space? How much we can place where? Incredible words, unknown planets, fantastic creatures.But now I want to tell you about some space themed computer shareware games, and want you to play it - I choose only best 19 games from about 200!Here you can find 10 shooters with each of it's own unique gameplay, 5 puzzles, some with actions twists, 2 strategy and 2 actions and 1 arkanoid.
Securing Your Accounts With Well-Crafted Passwords
In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype.
Downloadable Game Review: Diner Dash
Playvue.com Editor's Rating: 8.
UAV; Hunter II and RQ-1A Predator UAVs Needs Additional Modifications
Since the Predator has inverted "V" shaped stabilizers these stabilizers should contain wheel pants and wheels underneath to lessen weight and save costs in manufacturing, we need to bring down the costs of these units. Less mechanism will save weight and we can use that savings in weight for increased payload or more fuel to extend loitering time.
How to Write a Business Plan While Playing
BizTech 2.0 is an entrepreneur education program offering business assistance to students over 13.
Xbox vs. PS2 Game Consoles
There has been a great deal of discussion regarding the two most popular gaming consoles currently on the market: Playstation 2 (PS2) and Xbox. PS2 is a Sony product, while Xbox is owned by the software giant Microsoft.
Free Pocket PC Casino Game
Casino Gambling Wherever You LikeAre you absolutely crazy about pocket pc gaming? One of the very best things about pocket pc casino games is that nearly all of them are free games. There is a free pocket pc casino game everywhere you look on the Internet.