The secret of how to hack password and Anticipation - Part 3. Steps to Our Password Can Not be Opened Others

3 Secure Password
There are many factors that must be considered to ensure your passwords safe. Starting from the selection of passwords, using password, and know the system well in order to avoid the theft of passwords.

3.1 Choosing a Password
The first security should start from choosing a password that will be used. Bad password will be easily guessed by others. In addition, weak passwords are also easily uprooted by brute-force techniques and dictionary attack.

The question is: How to choose a good password? There are two things to consider:
• Password unpredictable others or by the application of brute force / dictionary attack. If your password is easy to guess, they can be broken into easily.
• Password memorable. What if your password is very difficult to guess, but also difficult to memorize? Of course, it could be dangerous if you own forgotten password. Therefore, the password should be difficult to guess but easy to remember.

To make the password hard to guess there are a few tricks that you can apply, namely:
• Do not use common words in Indonesian and English. Also, do not use common words such as names of people, local names, or dates that are too general lahir.Kata be easily guessed by others as well as more vulnerable uprooted by utilizing brute force dictionary (dictionary).

• Do not use the number of characters a bit. The characters are a little very vulnerable uprooted by the application of brute force. It is recommended to use a password at least 8 characters.

• We recommend using a combination of numbers and upper / lower. Do not only use lowercase letters only. To create passwords that are easy to remember would bother easy. The point should be as unique as possible but easy to remember.

Author trick to do is to use a combination of several syllables of the word list is important. For words, you can use the name, address, place of birth, and other names that are important to you. For numbers, can use date of birth, date of the feast, the number of employees / students, phone numbers, and other numbers that you remember.

Examples password: 192madRachKayuloko
Password above can be explained as follows. • 192. The initial number of IP that is widely used to build a network (IP private network usually 192.168.0.0). Incidentally author really remember this number.
• madRach. Taken from the name Rachmad Judge S.
• Kayuloko. Name of the village where the author grew up.
You can improvise their own resulting in passwords difficult to guess, difficult uprooted, but you can remember easily.

3.2 Using Password
Whenever a password to use the service, it must be done with caution. That is a critical moment in which passwords can be stolen. Sure you do not want any surveillance cameras peek your hand movements while typing a password.
For that, make sure you use a secure computer. Users computer rentals and internet cafes also have to be careful not miscast.

3.3 Understanding System with Good
By understanding how the system works, you will know the weak points in the system. Thus, you can be more careful in using the service.
For example, many new internet users who do not know that the Internet messaging like Yahoo Messenger can save passwords. In fact there are no log out after using a service such as Yahoo email.
Whenever log in to access data and services, then always do log out. Additionally, never store passwords in a computer used for the public.
3.1 Options Remember my ID and password used to store the password 
3.2 option to save the password after login


SHARE

Milan Tomic

Hi. I’m Designer of Blog Magic. I’m CEO/Founder of ThemeXpose. I’m Creative Art Director, Web Designer, UI/UX Designer, Interaction Designer, Industrial Designer, Web Developer, Business Enthusiast, StartUp Enthusiast, Speaker, Writer and Photographer. Inspired to make things looks better.

  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment
    Facebook Comment

0 komentar:

Posting Komentar