We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?
But of course remembering all the different passwords can be a headache. And writing them down somewhere isn't a great deal safer than using the same password again and again.
You can buy software that stores the passwords for you, but do you really want to pay money for another piece of software that performs a solitary function?
Try this simple, two-step, technique that lets you generate an infinite number of passwords, without having to remember any of them.
Step One: Choose a 4-6 letter word or number sequence that you can remember easily. Needless to say, don't reveal this to anyone. For the purpose of this demonstration, I'll choose the word "cash"
Step Two: Apply this secret word or number sequence to the name of the program you are setting up the password for.
To accomplish this, invent a couple of easy to remember rules.
Rule 1: Decide which part of the program name you are going to use. It could be the whole name, the first 6 letters of the name, the last 8 letters of the name. It's totally up to you, be as creative as you like.
eg ? For the program TrafficSwarm, I might choose the first 8 letters of the name. This give me: "traffics"
Rule 2: Take the portion of the program name you have selected and merge it with your secret word or number sequence to create a unique password. Again, be as creative as you can with this rule. You could replace every second letter, every third letter, every vowel or every consonant.
eg ? If I replace every second letter of "traffics" with my secret word "cash", I get " t c a a f s c h "
or
- If I replace every vowel of "traffics" with my secret word "cash", I get " t r c f f a c s ". The "s" and the "h" are not used as "traffics" has only two vowels, but some words will use all four letters of "cash". Some words might have more than four vowels, in which case just start back at the beginning with "c" and "a" and so on?
You don't have to worry about making your rules overly complex. Even the best code-breakers would need to see several of your passwords before they could start to guess what you rules are.
As long as you keep your rules safe and sound, your password is secure. But the real beauty of this system, is that you don't have to remember the passwords you create. You ONLY have to remember the rules.
When you log into the program the next time, just apply your rules to the program name, and you can work out what password you generated. Once you have been using the rules for a while, you'll generate the password in your head, without even having to pause.
Don't worry if it seems a little complicated at first. Read this article through a couple more times and then try this technique with just a couple of programs. Once you are happy with it, all that's left to do is to start working your way through existing programs and update your passwords. It's time consuming, but for peace of mind you'll be glad you did.
David Congreave is owner of The Nettle Ezine, the newsletter for the home business -- online. David lives in Leeds, in the United Kingdom, with his wife Leanne.
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Microsoft routinely releases new security updates, many of which are... Read More
This is not some new fangled techno-speak, it is a... Read More
You may not realize it, but as you are surfing... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Only the top spyware removers are successful at detecting and... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
In the past I've never really paid much attention to... Read More
When we think of adware, what comes to mind are... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
File sharing on p2p is soaring despite the music and... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
If you are a parent, as am I, I think... Read More
A few nights ago I received an email from "2CO"... Read More
Shopping for horse gifts or other gift items on the... Read More
When it comes to reporting Internet scams most of us... Read More
Do you sometimes notice your computer running slower. Is your... Read More
It's late. You've been scouring the web for that perfect... Read More
If you are a parent, you have probably wondered at... Read More
Is your data secure? Think again. Securing data is unlike... Read More
It has been said that with the wealth of information,... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Over the past few years as the internet has become... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Sooner or later everyone with an email account will receive... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Imagine this ? you open up your email box and... Read More
Ok, you've got a computer, and you get online. You... Read More
Every day millions of people go online to find information,... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Paypal is a great site and is used by many... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Phishing is the act of some individual sending an email... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
In the past I've never really paid much attention to... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Well, if that would have been said to me by... Read More
Threats we ordinary Web users face online leave us no... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Afraid that someone is monitoring your PC or installed a... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
P C. owners are constantly at risk from attacks by... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Before you enter your name, address or any other data... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Since its birth, the Internet has grown and expanded to... Read More
You may not realize it, but as you are surfing... Read More
Pharming is one of the latest online scams and rapidly... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Internet Security |