Can I Guess Your Password?

We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?

But of course remembering all the different passwords can be a headache. And writing them down somewhere isn't a great deal safer than using the same password again and again.

You can buy software that stores the passwords for you, but do you really want to pay money for another piece of software that performs a solitary function?

Try this simple, two-step, technique that lets you generate an infinite number of passwords, without having to remember any of them.

Step One: Choose a 4-6 letter word or number sequence that you can remember easily. Needless to say, don't reveal this to anyone. For the purpose of this demonstration, I'll choose the word "cash"

Step Two: Apply this secret word or number sequence to the name of the program you are setting up the password for.

To accomplish this, invent a couple of easy to remember rules.

Rule 1: Decide which part of the program name you are going to use. It could be the whole name, the first 6 letters of the name, the last 8 letters of the name. It's totally up to you, be as creative as you like.

eg ? For the program TrafficSwarm, I might choose the first 8 letters of the name. This give me: "traffics"

Rule 2: Take the portion of the program name you have selected and merge it with your secret word or number sequence to create a unique password. Again, be as creative as you can with this rule. You could replace every second letter, every third letter, every vowel or every consonant.

eg ? If I replace every second letter of "traffics" with my secret word "cash", I get " t c a a f s c h "

or

- If I replace every vowel of "traffics" with my secret word "cash", I get " t r c f f a c s ". The "s" and the "h" are not used as "traffics" has only two vowels, but some words will use all four letters of "cash". Some words might have more than four vowels, in which case just start back at the beginning with "c" and "a" and so on?

You don't have to worry about making your rules overly complex. Even the best code-breakers would need to see several of your passwords before they could start to guess what you rules are.

As long as you keep your rules safe and sound, your password is secure. But the real beauty of this system, is that you don't have to remember the passwords you create. You ONLY have to remember the rules.

When you log into the program the next time, just apply your rules to the program name, and you can work out what password you generated. Once you have been using the rules for a while, you'll generate the password in your head, without even having to pause.

Don't worry if it seems a little complicated at first. Read this article through a couple more times and then try this technique with just a couple of programs. Once you are happy with it, all that's left to do is to start working your way through existing programs and update your passwords. It's time consuming, but for peace of mind you'll be glad you did.

David Congreave is owner of The Nettle Ezine, the newsletter for the home business -- online. David lives in Leeds, in the United Kingdom, with his wife Leanne.

In The News:


pen paper and inkwell


cat break through


How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More