How to come up with a hell of a password that's easy to remember. How to come up with a strong password? Tips and tricks


A strong password can protect you and your data from the machinations of intruders. On the Internet, any profile requires a “password” to log in. Only you should know it - and no one else. So you will have to try hard to come up with a decent secret combination that is not so easy to recognize. In some cases, you can use one trick, but it still will not be able to completely secure your profile on the Internet. What tips should you use to make your “password” difficult to guess?

Numbers, letters, symbols

Most strong password- this is a combination that is difficult to remember and guess. Therefore, users always think about what they should use as a “password” for authorization on various services.

The first advice that advanced “users” give is to use a combination of numbers, letters and symbols in their secret combinations. It is also recommended not to create short passwords - it would be better if they were long and difficult to remember. This way you can protect your data.

What specific combination should I use? You'll have to figure this out on your own. However, there are a few more tips to help you create a strong password.

Register

Please note that often forms for entering "passwords" are case sensitive. In other words, they distinguish between lowercase and capital letters. This is a great opportunity to diversify your secret combination.

When coming up with a strong password, try to combine not only numbers with letters and special characters, but also alternate between lowercase and uppercase. This approach helps make it more difficult for attackers. The main thing is, don’t forget which letter is in which case.

It is recommended to capitalize the very first letter, and then alternate according to the “every other” principle. This kind of technique will help you avoid getting confused in the password you created. So take note this advice. Which password is more secure? One that uses a variety of registers when writing. It is possible to do without this feature, but it is not advisable.

Changelings

They say you shouldn't use dates that are important to you in your passwords. But that's not true. It is enough to slightly diversify the approach to this issue. There is such a technique as “shifters”. It helps you use dates that are important to you in your “password”. At the same time, it will be very difficult to unravel your secrets.

What is it based on? this principle? At the very beginning of the password you choose, you should write a date. For example, your birthday. And at the end - the same date, but upside down. If 123 is written at the beginning, then 321 is written at the end. As you can see, there is nothing difficult about this. That's why this technique used by many users. Remember general principle constructing a “secret record” is simple. This means you won’t forget the “password” just like that.

Now it’s worth taking a closer look at strong passwords. Examples of these using “shifters” are what will help you figure out exactly how to create a good combination for authorization in an account on the Internet.

Let's assume that the "body" of our password will be the user's first and last name. Then we print: IvAnIvAnOv. Now you should use the “shifters”. To do this, let's take some date. For example, how often is the user's birthday selected? Let in our case it be May 4, 1988. And we dilute it all with symbolism. The final combination is: 4051988!~IvAnIvAnOv~!8891504. This is the complex password we have. In fact, it is easy for the user to remember, but it is extremely difficult for attackers to guess. In any case, practice shows exactly this situation.

Generating

If you can’t come up with a strong password yourself, you’ll have to use one a little trick. Just don’t think that it will completely protect you from hacking. There is nothing better than a personally invented “password”.

About what reception we're talking about? About using special password generators. They make up their own secret combinations"using symbols, letters and numbers. Of course, taking into account the registry. But "changers" are not used here.

You can download any password generator. Just launch the application and click on the "Generate" button (or something like that). You will receive a combination as a password. It can be supplemented or used in its original form.

Passwords are everywhere: on social networks, payment systems, on your computer and phone. It is unrealistic to keep so much information in your head, so many users follow the path of least resistance - they come up with one key that is easy to remember, and then enter it on all sites where they register.

This approach to security can end in disaster. If the access code for VKontakte or Odnoklassniki can be lost without serious financial consequences, and therefore there is no need to make it complicated, then come up with a password for registering in payment system or creation of Apple The ID must be such that no one except the owner can access the data.

Rules for creating passwords

Almost all sites have a list of password requirements when registering. However, usually these requirements are minimal: at least 8 characters, cannot consist only of numbers or letters, etc. To create a truly complex password, you need to keep a few more restrictions in mind.

  • Login and password must not be the same.
  • It is not recommended to use any personal information, especially if it can be learned from social networks or other sources.
  • It is not recommended to use words.

To understand the logic of these prohibitions, just look at how passwords are cracked. For example, a 5-digit key is only 100 thousand combinations. By simply searching through all the options, the hacking program will find a suitable combination in 2 minutes, if not less. A rare word will not work for an access code either. An attacker can analyze different dictionaries for different languages and find a match. The only question is how long it will take - a few minutes or a couple of hours.

Advanced program PDF Password Recovery for cracking passwords set on PDF document. Uses brute force and allows you to fine-tune the selection by noting the characters used in the password.

The combination of a rare word and numbers will also not work. Bruteforce technology allows you to search for combinations of numbers and words, so that such a key will fall if necessary. It will, of course, last a little longer than 123456789, but if you suffer losses due to hacking, then this time difference is unlikely to seem significant. To understand which password is reliable and which is not so good, let’s take a look specific examples. The approximate hacking time is calculated using password checking services, which are described below.

  • Date of birth (05041992) – will be hacked in 3 milliseconds.
  • A name with a small or capital letter (Segey, sergey) will last 300-500 milliseconds, that is, less than half a second.
  • Combinations of numbers and lowercase letters(1k2k3d4a9v) – approximately 1 day.
  • It will take about 6 years to crack a password like HDA5-MHJDa.
  • The combination AhRn&Mkbl363NYp will be deciphered in 16 million years.

The cracker will not work for 16 million years or even 6 years - this value only demonstrates that it is impossible to crack the password within an acceptable period of time.

Password generation

It's one thing to know the rules, another thing to follow them. Most users are aware that they cannot use an access code consisting of their date of birth or name to register, but this stops few. Two problems:

  • It's hard to come up with a complex password.
  • Even if you create a password containing random set characters, it is difficult (sometimes simply impossible) to remember it.

An online password generator will help you solve the first problem. On the Internet you can find a large number of services that offer to quickly create a complex password from letters, numbers, and special characters.

Working online generators according to one principle: you indicate which characters need to be used, select the required number of characters and click “Generate”. The services differ only in certain aspects.

For example, on Pasw.ru you can generate several dozen passwords at once (up to 99 combinations). PassGen allows you to set the option to automatically exclude duplicate characters from the security key, that is, all characters in it will be in the singular.

Key storage

If you can generate a password online, then you need to store the keys on your computer. Writing the password on a piece of paper, in a separate document on the computer, on a sticky note glued to the screen is the path to unauthorized access to data. So here comes the second problem: how to remember the created key.

You shouldn't rely on memory, but you can rely on a password manager. Many users choose KeePass. This program is free and works on Windows 7, Windows 10 and others. modern versions OS from Microsoft. In addition, KeePass has a built-in password generator, so you don't have to search for online services every time.

The only downside of a password manager is that it also requires an access code, which is called a master password. But remembering one master password is much easier than keeping dozens of complex combinations in your mind. In addition, when creating it, you can use a trick - take poetry, counting rhymes or any other memorable lines as a basis and turn them into a combination of letters, numbers and signs.

For example, you can take a quatrain, highlight the first letters and punctuation marks, and then write them in the Latin layout. Some letters can be replaced with numbers - “z” with “3”, “o” with “0”, “h” with “4”. As a result of such manipulation of four lines children's poem, which will never leave your head, you get the password U0d?D3ep.Gzc3hek, which will take 3 trillion years to crack.

Difficulty check

On many sites, when registering, the user is shown whether he has a good password. You can make sure that the generated code is complex and you won’t be able to hack it quickly, you can do it yourself using the ? In the “Enter Password” field, paste the generated password. In response, you will receive the approximate time it will take to crack the key on a regular computer. If it’s several million or at least thousands of years old, then the code is definitely reliable.

You can use other services to check reliability: for example, from Kaspersky Lab. It also shows the time required to crack a password, at the same time telling you what can be done within the specified period.

Another interesting way checks - the “Password Strength” service on the website 2ip.ru. Here the result is categorical: the key is either reliable or unreliable.

You need to understand that the hacking time shown by these services is very arbitrary and is calculated in case the hacker uses regular computer. A supercomputer with fantastic performance will do the job faster, as will dedicated password-cracking machines that can test up to 90 billion keys per second. But it is unlikely that people who own such equipment will need your password. Email, Skype or Wi-Fi.

Spanking in Rus' until the twentieth century was always the most common method of corporal punishment. Initially, representatives of almost all segments of the population, all genders and ages were subjected to it.

"Trade Execution"
Punishment by flogging was first enshrined in law in the Code of Laws of 1497. They were punished this way for a variety of crimes. For example, they could have been flogged for daringly speaking out against the authorities.

They hit mainly the back of the body - the back, thighs, buttocks. Most often, the person punished was completely undressed for this purpose.

Punishment with a whip required special art. To do this, the executioner had to move a few steps away from his victim, and then spin the whip over his head with both hands and, with a loud cry, quickly approach the condemned person, bringing the instrument of torture down on his back. It was impossible to hit the same place twice. After each blow, the executioner was required to wipe off the blood and skin particles adhering to the whip from the whip. According to researcher Katoshikhin, the execution usually lasted several hours, with 30-40 blows of the whip applied per hour.

One foreigner, who was an eyewitness to such a procedure, left the following testimony: “The executioner beats so brutally that with each blow the bones are exposed. Thus, he (the punished) is torn to pieces from the shoulders to the waist. The meat and skin hang in shreds.”

Many died from this. Everything depended on the individual characteristics of the body, as well as on the force of the blows. Some withstood 300 blows, and some fell like a sack after the first blow. If the executioner felt sorry for the person being punished, he could hit him weaker (sometimes for a bribe). Otherwise, he could have beaten him to death.

In the era of Peter the Great, punishment with a whip was called “trade execution.” She was often appointed for political crimes in combination with branding.

“Guilty!”
Punishment with batogs was considered much lighter. The latter were thick sticks or rods with cut ends. Batogi were often used - to extract taxes and arrears, to beat serfs and subordinates. Sometimes the court ordered beatings with batogs - for theft, perjury, disrespect for royal family... Thus, a clerk was punished with batogs, who, when drinking to the sovereign’s health, did not take off his headdress.

The execution took place like this. The person was placed face down on the floor or on the ground. One of the executioners sat on his legs, the other sat on his neck, clasping it with his knees. Then each of them took two batogs and beat them on the back and below the back of the victim until they decided to stop the punishment or until the bars broke. At the same time, it was forbidden to strike the stomach, thighs and calves. Also, during the execution, the person being punished had to shout the word: “Guilty!” If he did not scream, then the punishment continued until he screamed and admitted his guilt.

Through the gauntlet
More cruel was the punishment with spitzrutens - flexible rods about 2.1 meters in length and less than 4.5 centimeters in diameter. They were used mainly to punish soldiers. This was called “running the gauntlet.” The method of punishment was borrowed from the Swedes and was introduced by Peter I in the Russian army in 1701. The person punished for this or that offense was stripped to the waist, his hands were tied to a gun, which was turned towards him with a bayonet so that the unfortunate man could not evade reprisals, and he was escorted between two rows of his comrades lined up to his right and left. Each soldier had to hit the offender on the back with a spitzruten. The regimental doctor followed the beaten person, counting the blows so that the punished person would not be marked to death or maimed.

“Teachings” for children and women
Children's punishments were “blessed” by the famous “Domostroy”: “... but also to save through fear, punishing and teaching, and sometimes even beating.” Children in Rus' were usually flogged with rods. A rod was a bundle of rods that was used to strike the soft parts of the body. They could punish with rods for any offense, and this punishment was applied not only by parents or educators, but also by school teachers - say, for negligence in learning. Sometimes girls were also flogged.

This method of punishment was applied to children of any class: it was considered useful for the child. In large families, they sometimes held weekly floggings on Saturdays, and often the offspring were flogged not only for actually committed offenses, but also as a preventive measure, “so that it would be discouraging.”

Before carrying out the execution, bundles of rods were soaked in cold running water. Sometimes the soaking took place in a salty solution, and then the beating caused severe pain. However, scars after such punishment rarely remained. Less often, a rope with knots was used to beat the younger generation, which was used to whip them backhand.

Women were also flogged, most often with whips or rods. Domostroy prohibited the use of hard objects and methods of beating that could cause injury.

A peasant woman could be “taught” by her husband - for an impudent tongue, disobedience or suspicion of treason. Serf women and girls could be flogged by order of the landowner. The police flogged women who were illegally engaged in prostitution. But completely official corporal punishment also existed for representatives of the upper classes. Thus, two ladies-in-waiting of Catherine II were brutally flogged for the caricature they drew of Prince Potemkin.

Even in Catherine's era, an attempt was made to soften existing system corporal punishment. In 1785, representatives of the upper classes, merchants of the first and second guilds, were exempted from them. At the beginning of the 19th century, various restrictions were introduced - on the number of blows, punishments for the sick and elderly, and representatives of other categories. But in primary and secondary educational institutions rods remained a means of "discipline" until the 1860s.

Corporal punishment was completely abolished in the Russian Empire only in 1904. The Bolsheviks put a definitive end to this issue after the revolution, declaring flogging a “bourgeois relic.”

Irina Shlionskaya

The Internet today occupies important place in the life of any person. As a rule, for full-fledged work or simply to use resources, registration is required, which implies password usage. Passwords are also required to pay various bills, confirm actions, etc. The resource for which a password is created can be either important (Internet banking, for example) or not very important (if it gets hacked, no big deal). Simple password for sites with storage Money won't do. Let's look further at how to come up with a reliable correct password, which will not be hacked.

So, few people guess passwords today - as a rule, brute force is used. With the help of a special program they move various options combinations. The first combinations to be checked are sets like “111111”, “123456”, “qwerty”, etc. Next, a simple substitution is performed. Similar program maybe in as soon as possible sort through great amount various combinations.

If the password is your date of birth or just a set of numbers, for example "25061980", the program will decrypt it in 2 seconds. On personalized passwords, which begin with a small letter (olga, roman) are cracked in 4 seconds. It will take approximately 4 minutes to password decryption, which capitalizes names. A complex combination like “1d2d3s4a8c” will require 4 days to decrypt, a password like “HSU5-BHJDa” will take 12 years, but the program will recognize such a password “IkRn%Kmbl253NNp” only in a million years, that is, never.

In the way that come up with the correct password, you must adhere to the following basic rules:

1. Passwords should not be short. At least 8 characters, preferably 10 or more.

2. It is imperative to use both numbers and letters. Even better is to dilute the combination with symbols and punctuation marks.

3. Correct password must contain both uppercase and lowercase letters.

It is worth noting that password is hacked not just the program. This can be done manually if you know enough about the person. For example, butfors will be about 100 thousand years recognize password"ivanovkostya". But if you have knowledge about a person, you can select a password manually in an hour or two. Moreover, last name, first name, date of birth are usually checked first.

Another way find out the password- is to choose the answer to " Secret Question". Just click on the “Forgot your password?” button and in a few seconds (if you have information about the person) select a secret question. Usually they use primitive data that is really easy to find: mother’s maiden name, favorite dish, animal name, etc. .

Where do attackers get information? The answer is very logical and lies in an accessible plane: usually on social networks. If the attacker has set himself a goal crack password, he can freely use information from social networks. Therefore, Vanya Ivanov, who uses the password “ivanivanov” to log into the social network, should definitely change it immediately, otherwise his friends will very quickly see an incredible amount of spam on his behalf. Thus, password hacking- it's not as difficult as it might seem.

Now let's look at what needs to be done to correct password was selected as efficiently as possible (taking into account the previously specified requirements):

1. You should not use personal information in your password: date of birth, wedding, phone numbers, etc.

2. The answer to the “secret question” should not be simple and easy to guess. There is no need to use information that is easy to find out.

Password generation and methods of remembering.

To select the correct password quite usable password generation. This service is very affordable. You can effortlessly pick up a combination that is not easy to recognize. However, there is one pitfall here: a complex combination is difficult to remember. Rare combinations are difficult to remember. Let's look further at how to make sure you don't forget or lose your password.

In most cases, when password generation the same combination is used. Sometimes the password is updated and comes out something like "parol1", "parol2", etc. This is a tricky step, but you can be sure that the password will not be forgotten.

When using a password generator, the result is a meaningless and illogical set of characters. It needs to be stored somewhere. It’s interesting that many people have the habit of writing it down on a piece of paper and sticking it on the monitor. For example, in an office where there are many employees, clients and random people. With the same success, you can create a file on your desktop called “my passwords”. The effect will be the same.

So, here are some general tips for storing and remembering passwords:

1. It is better to create a new unique password for each resource.

2. There is no need to store password combinations on your computer desktop - hackers can easily break into your PC.

3. The password does not need to be kept in plain sight.

4. If the password is written down on a piece of paper, you need to create a copy of it.

5. No need to enter passwords in “strange” or suspicious sites or programs. Portal administrations never require you to provide them with a password - it is used only for login.

6. If a special program is used to store passwords, you need to create a copy of it.

And finally, about the correct password.

Finally, a few useful tips. In gaming clubs or internet cafes, enter passwords as rarely as possible. These are other people's computers, so so-called spyware can be used: they easily remember combinations that are entered from the keyboard.

If you still had to log in from someone else’s computer or use password not only at home, but also at work or in another place, always log out of the resource (don’t just close the tab, but click “Exit”) and do not click “Remember me”. Otherwise, anyone can come in even without password guessing. It’s unfortunate, but even serious electronic fund exchange portals are famous for this: they have a “Remember” function, although it shouldn’t exist, and the session should be limited.

Passwords sometimes need to be changed. True, the more reliable it is, the less often it needs to be changed. A password of 12 - 14 characters can be changed every few years.

Using all the recommendations in this article, you can easily create correct password, which no one can hack. As a rule, in the old fashioned way, passwords are written down in notebooks - in this case, notebooks should not be accessible to a wide range of people. Over time, you can remember even a large and complex combination - depending on how often you work with it.

The point in such fashionable today mobile gadgets partly because you can access them the right resource anywhere there is Internet. At the same time, there is no need to go to an Internet cafe or club, where they can easily scan password. But you should also log out of your account for security reasons. In general, these simple recommendations are able to completely protect against password hacking.

Hello, my dear readers!

Frightened by “horror stories” that evil hackers can crack the password of anything, the poor little user feverishly begins to go through all his passwords and wonder: will they crack it or not...

At one time I asked myself the question: how to create a strong password for all my services for which I am registered? Is this even possible?

How do burglars operate?

First, let's think about how the hacking process occurs. In general, there are several main ways for an attacker:

  • look at the paper, on which all passwords are written. Surprisingly, many users still keep a sticker glued to their monitor, on which is written the password so treasured by the attacker. As they say, no comments...
  • brute force. Simply put, the usual enumeration of all possible options. How often do we see in films: a special program selects with lightning speed (or not quite lightning speed) required password. In reality, this is practically impossible. If the password is crypto-resistant, that is, it consists of enough large quantity characters and contains capital letters and numbers, selecting it can take a lot of time;
  • receiving remote access to the user's machine and view all necessary information, including cookies and special files administration. Again, movie techniques don't work here.
    Get full access to a specific computer - not like that simple task and requires a certain approach to solving it. If your data is not particularly valuable, it is unlikely that a hacker will waste his precious time on your computer;
  • keyloggers– keyboard interceptors. They are especially often used to gain access to payment information. Fortunately, the famous Kaspersky antivirus has in its arsenal virtual keyboard. So it’s impossible to track keystrokes: there is simply no pressing;
  • viruses. The advice here is this: don’t go where you don’t need it, and don’t download what you don’t need. And if you download it, install it on your computer good antivirus and trust in his power;
  • regarding mobile platforms, then most often they use either the same brute force or the method of intercepting packets over encrypted network channels.

A few rules for creating a strong password

So it's not all that bad. Nevertheless, almost every one of us has probably encountered the fact that his account on VKontakte or on a forum was “hacked”, or even Odnoklassniki sounded the alarm... As a rule, this happens due to the simplicity of the password itself. There are special programs that already “know” standard sets passwords and generate their variations.

You can, of course, randomly run your fingers over the keys, “generating” a password. Alas, even in this case, the algorithms of hacker programs select everything possible options, albeit not very quickly.

I advise you to permanently abandon passwords that are a repetition of your login. Fortunately, many services do not allow the user to set such a password at all. And here social media use either a number as a login mobile phone, or mail address. This makes life much easier for the attacker.

And God forbid you from the names of animals, children, parents and dates of birth! Such passwords can be hacked by people even from close circles.

Some time ago I used a method that I personally invented. Only later did I find out that I was not the only one so smart. Its essence lies in the fact that some phrase in Russian is invented. For example, “This password is strong.” And then the keyboard switches to the Latin layout and the same is entered, but without spaces. It turns out: “”njngfhjkmyflt;ysq”. Is this method a good one? Not really. Smart hacker algorithms have long been aware of this method.

But in general there are only three requirements for passwords:

  1. more signs. 8 – good, 12 – even better, 16 – great;
  2. Be sure to use numbers. Moreover, both in the middle and at the end of the password;
  3. alternate between capital letters and regular letters. And exactly the same - in the middle and at the end.

Password generators

And I also tried special services– both online and individual applications. Last Pass, for example, or here’s another: RandStuff, Password Generator and a bunch of services with the simple name “Password Generator”.

At first glance, they are all really capable of generating a random set of characters and numbers. But this is only at first glance random. An experienced programmer knows what is truly random generator does not exist, they all work according to certain algorithms. I won’t lie that this is exactly the case, but I suspect two things:

  • knowing by what algorithm passwords are generated, hacker program it will not be difficult to trace this algorithm in the opposite direction;
  • Some of these programs and services, oddly enough, are used specifically for hacking. The generated password is saved somewhere in a cache or in a cookie. And, perhaps, it goes straight to the attacker’s car.

Therefore, it is necessary to use only proven programs with an excellent reputation!

Now the choice is yours: use special programs or invent it yourself complex passwords. But under no circumstances store them on paper. Better create a file and save it on the cloud. Excellent cloud storage By the way, they also provide other services.

Want to know all the computer secrets? How about learning to communicate with a computer on a first-name basis? In this case, you can order a multimedia training course “ Computer genius", everything will be explained there in the most accessible language and - most importantly - they will clearly show how to apply the acquired knowledge in practice.

Be sure to share the link to this material with your friends via social media. networks so that they do not become victims of attackers. Don't forget to subscribe to the blog update mailing list, which will notify you when a new article is edited. Be careful, see you soon!

Sincerely! Abdullin Ruslan







2024 gtavrl.ru.