We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?
But of course remembering all the different passwords can be a headache. And writing them down somewhere isn't a great deal safer than using the same password again and again.
You can buy software that stores the passwords for you, but do you really want to pay money for another piece of software that performs a solitary function?
Try this simple, two-step, technique that lets you generate an infinite number of passwords, without having to remember any of them.
Step One: Choose a 4-6 letter word or number sequence that you can remember easily. Needless to say, don't reveal this to anyone. For the purpose of this demonstration, I'll choose the word "cash"
Step Two: Apply this secret word or number sequence to the name of the program you are setting up the password for.
To accomplish this, invent a couple of easy to remember rules.
Rule 1: Decide which part of the program name you are going to use. It could be the whole name, the first 6 letters of the name, the last 8 letters of the name. It's totally up to you, be as creative as you like.
eg ? For the program TrafficSwarm, I might choose the first 8 letters of the name. This give me: "traffics"
Rule 2: Take the portion of the program name you have selected and merge it with your secret word or number sequence to create a unique password. Again, be as creative as you can with this rule. You could replace every second letter, every third letter, every vowel or every consonant.
eg ? If I replace every second letter of "traffics" with my secret word "cash", I get " t c a a f s c h "
or
- If I replace every vowel of "traffics" with my secret word "cash", I get " t r c f f a c s ". The "s" and the "h" are not used as "traffics" has only two vowels, but some words will use all four letters of "cash". Some words might have more than four vowels, in which case just start back at the beginning with "c" and "a" and so on?
You don't have to worry about making your rules overly complex. Even the best code-breakers would need to see several of your passwords before they could start to guess what you rules are.
As long as you keep your rules safe and sound, your password is secure. But the real beauty of this system, is that you don't have to remember the passwords you create. You ONLY have to remember the rules.
When you log into the program the next time, just apply your rules to the program name, and you can work out what password you generated. Once you have been using the rules for a while, you'll generate the password in your head, without even having to pause.
Don't worry if it seems a little complicated at first. Read this article through a couple more times and then try this technique with just a couple of programs. Once you are happy with it, all that's left to do is to start working your way through existing programs and update your passwords. It's time consuming, but for peace of mind you'll be glad you did.
David Congreave is owner of The Nettle Ezine, the newsletter for the home business -- online. David lives in Leeds, in the United Kingdom, with his wife Leanne.
![]() |
|
![]() |
|
![]() |
|
![]() |
If you have used a Windows machine for a while,... Read More
During the release of a new software product specialized to... Read More
With the Internet entering our lives in such an explosive... Read More
Many of us have run into an annoying and time-consuming... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Long gone are the days that we could feel secure... Read More
A little bit of time invested into learning about internet... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Credit card fraud is a growing problem for online businesses... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Phishing is the act of some individual sending an email... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Before you enter your name, address or any other data... Read More
Let us take the example of scrambling an egg. First,... Read More
Sooner or later everyone with an email account will receive... Read More
Identity theft is one of the most common criminal acts... Read More
There you are busily typing away on your PC or... Read More
The Internet is a vast International Network of people and... Read More
Only the top spyware removers are successful at detecting and... Read More
First the basic definition of Spyware: It is a type... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Have you ever had to call Symantec or McAfee to... Read More
As the number of people using the Internet as an... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Whether we like it or not, we are all living... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
A few nights ago I received an email from "2CO"... Read More
The Threat10 years ago you could probably have run no... Read More
A week or so ago, I received an inquiry from... Read More
As you know, this time the virus under the name... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
If you constantly deal with bank or electronic accounts, it... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
During the release of a new software product specialized to... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Millions of people make purchases online, but many people are... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Well, this is an article I never thought I would... Read More
Spyware is the most troublesome software to appear on the... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Spyware is software or hardware installed on a computer without... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
You can detect spyware online using free spyware cleaners and... Read More
While clicking from site to site on the internet you... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Do you really have to know how feeds work? Not... Read More
There are several basic concepts to keep in mind when... Read More
The first thing people think about when defending their computers... Read More
Can you protect your computer from all possible viruses and... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Did you know...? 1 in 5 children who use computer... Read More
Despite the current wave of identity theft and corporate security... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
With the Internet entering our lives in such an explosive... Read More
Have you ever had to call Symantec or McAfee to... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Internet Security |