How to start creating a new password. The most complex passwords in the world, checking the complexity of passwords

On the Internet, passwords are required everywhere: for email, online stores, social networks, payment systems and other services. For security reasons, it is recommended to come up with a complex combined password consisting of uppercase and uppercase letters, digits, special characters. Of course, this significantly reduces the risk of unauthorized third-party access. But often the user himself forgets what password he came up with. How can I remember my passwords?

   First, do not create the same password for all programs (although, of course, it's much easier and more convenient). There are a few simple ways, which will help you quickly remember your passwords. They do not even have to be recorded. First, how you can create a reliable and memorable password is to combine two words. Between them you can put a symbol, a digit. In addition, you can determine in advance that in any password the second (or any other) letter will be capitalized. For example, "rukka3krandash", "Lampa% table". At input it is necessary to establish English keyboard layout, and to enter symbols, being guided by Russian. Also an interesting way is to insert one word inside the other. You can choose different combinations for mail, e-wallet and shops. For example, take as a rule that first the first two letters of the first word will be written, then the symbol (digit), then the second word (the second letter capital) and the end of the first word. For example:
  • for webmoney - "maedEngishina";
  • for mail - "ma2tExts";
  • for soc. network - "madrugshina";
  • for the store - "ma% pokupkashina".


   A very simple and memorable way is to create a password from the first letters of each word of the proverb, verse, proverb, song. Large and small letters can be alternated, or the capital letters can be made every second (third, fourth). Somewhere among the letters, select the place for the symbol, for example, before the last one:
  • cis4m - strong will win one, knowing - one thousand;
  • nMkchach7m - not a place that colors a person, but a person a place;
  • dUchm5l - a fool to teach - that the dead be treated.


   In the previous method, you can replace the corresponding letters with numbers (o on 0, 3 on 3, 4 on 4). It is desirable to leave the punctuation, which is in the text. For example:
  • vlre, ovor - a tree was born in the forest, it grew in the forest;
  • umnp, 0ml, vrenb, p40x - dropped the bear on the floor, tore off the teddy bear, still I will not give it up, because it's good.


   You can take as a basis a complex, highly specialized term (for example, from medicine). From a word or phrase, you can throw out all the vowels and leave only the consonants. The capital letter to make any choice, and put the number penultimate:
  • dLtcnnkrdmp9t - dilated cardiomyopathy;
  • dScpktrtrnntfflp8t -discirculatory encephalopathy.


   If you want to set a date, you should do this. Take two any dates that you clearly remember (for example, the date of birth 13.09.1085 and the date of the wedding 06.03.2010). Change all the points by the letter (any), and change the zeros to the letter "o". Between the two dates, set the underscore. You will get 13a9alo85_o6aa3a2o.


   It is easy to remember and visual combinations. You just need to mentally draw any shape on the keyboard and remember the keys that outline it. For example, qwdrtgcxa. They can be diluted with numbers if desired.


Do not create passwords only from the date of birth, names of close people, nicknames of pets. Of course, they are fairly easy to remember, but such detractors can quickly crack open the password. Be creative - and you will come up with an interesting, reliable and clear only you password, which you will never forget.

To date, the issue of creating secure password. In doing so, you must adhere to certain rules of principles, as well as know how to correctly store passwords, which will reduce the likelihood of their theft and penetration into user accounts.

Creating passwords

  To date, when creating any account  on the Internet, you need to come up with a password, while the resource can prompt the reliability of the generated code. Typically, this indicator checks the length of the password and the presence in it of unique symbols such as numbers or capital letters.

Despite the fact that this is one of the main parameters of password strength, but how much it would not seem resistant to hacking, it can not always be so. For example, users rarely use unique passwords that have special characters and numbers. However, even unique passwords, but with a small number of characters can quickly cracked by selection, because they can be in scammers' databases.

In this case, the best option is to use the password generator. On the Internet, you can find both online services and password managers for installation on a computer. With these utilities you can get long passwords, in which there will be special symbols.

Often the password, which consists of more than ten characters, is not so attractive to the scammer, since it will take much longer to break it, which is not very profitable.

The disadvantage of this method is the fact that it is quite difficult to remember such passwords, and if there are not such ones, then this, in general, is unrealistic. If you need to remember the password, you can use one more method. It is worth noting that the password of 10 special characters and capital letters can be hacked much faster than the code consisting of 20 uppercase Latin letters. Even scammers know this.

It turns out that the password, which will contain a few simple English words arranged in random order, can be easily remembered, but it's unreal to crack it. In addition, if you write each word with a capital letter, then you can be sure that it will never be hacked.

It should be noted that when writing a password in the Latin layout, but Russian random words, you can not worry about cracking the password, because no methods can cope with it.

There is no definite approach to creating passwords. Each method has its own merits and demerits, but to adhere to the basic principles of building code is still worth it.

The password must be long enough. A minimum of eight characters must be included. But this is sometimes not enough, if you need to have enough strong password. In addition, the password must contain special characters, large letters and numbers.

It is not recommended to use personal data for the password, even if they are written in a tricky way. There should not be dates, names and surnames. For example, a password that includes a date, from creating a calendar to today, can be hacked for a short time.

If you need to check the reliability of your password, you can use special services. But here, too, there is one nuance. If the address of this service is not https in the beginning, then it's better not to contact it, because it can also be hacked by intruders. In this case, you can enter the same with the same number of characters, which will help to understand the reliability of the original.

When you enter a password on such resources, the entropy is calculated for the specified code and a reliability report is issued. If the value of entropy is greater than 60, it is almost impossible to hack it, even with a purposeful selection.

Using the same passwords for different accounts

If there is a fairly reliable password, but it is used on all accounts on the Internet, the level of its reliability falls many times. In this case, when hackers attack one of the sites where this password is used, scammers will get access to it and immediately try it on other popular public services or even online banking.

For many users it is not very convenient and difficult to have unique passwords, however, it is extremely necessary to do this if the accounts contain important information. But if the account does not contain important data and is not particularly valuable, then you can use simpler passwords.

Two-factor authentication

It is worth noting that even reliable passwords can not guarantee complete security, and the fact that no one can log into your account. The password can be trivial stolen or unobtrusively know from the user. Almost all powerful online services have recently provided the opportunity to use two-factor authentication in accounts. If you need to protect your account, it is highly recommended to use it.

The principle of operation of such authentication is not very different on different services, so everything happens in almost the same way. When you visit an account from an unknown device, by entering correct password, it is necessary to undergo an additional check.

To do this, you can use the code from the SMS or a special application on your mobile device. In addition, pre-printed codes, electronics or hardware keys can be used. This means that when a password is cracked, the scammer does not get into the account, if he does not have a user's smartphone, his electronic or something else at his disposal.

If you need to learn more about two-factor authentication, you can search the Internet for articles on this topic. Also, you can read the instructions for use on the services themselves, where it is already used.

Password storage

It is very right to have a separate unique password for each account, but here there are inconveniences in their storage. Remembering a large number of unique passwords is quite difficult. It is not recommended to store passwords in a web browser, as they can easily be exploited by intruders, and they can be lost if the operating system crashes unexpectedly or when synchronization is disabled.

The most suitable option in this case is the use of the password manager.
  These applications are designed to store secret passwords in an encrypted storage. Access to such a repository is performed using a single password. You can also use 2-step verification. In addition, most of these applications have a password generator and are able to assess the reliability of passwords.

Many users actively use without access to the Internet, which are designed to store passwords on the PC. Another part of users works with applications with many functions, among which there is synchronization.

Popular programs provide a fairly safe and safe storage  passwords. But in the process of using them you need to take into account some of the nuances. To enter the program, you must use one master password. In addition, when hacking the store, you will immediately need to change all your passwords.

In addition, you can store passwords in a notebook by locking it in a safe, which only one person can access, however, with their constant use it is not very convenient. In addition, you can use an offline database that you need to store on a third-party drive  and in addition to their duplicate in case of loss.

The most appropriate option in this case from all of the above is this approach. All important passwords must be stored in the head or written on a sheet and placed in a secure place. Those passwords that are not particularly important can be stored in password managers.

Additional Information

Having familiarized with this article, it is possible to allocate those moments on which it is necessary to pay special attention. If you follow simple logic and understand the principles of building passwords, you can independently decide on the security of a password. But still it is better to follow certain rules.

You can not use the same password for different accounts. In addition, passwords should not be easy. You can raise the difficulty level by increasing the password length. The most
  The best option is a password with a number of characters from 10 to 20.

In addition, it is not recommended to use personal data in passwords. Also, do not use personal information in the tips to it and control questions. It is recommended to use 2-step verification, in cases, if possible.
  In addition, you must choose the appropriate option for securely storing passwords.

You also need to protect yourself from phishing. This requires checking resource addresses and encryption. In addition, when prompting for a password, you need to make sure that the input is done on the right site. You also need to clean your computer of malware.

In addition, it is not recommended to use passwords on third-party PCs, public networks in the absence of encrypted connections. If you have to use someone else's computer, then it's worth using anonymous mode or typing passwords from the keyboard on the screen.

In addition, passwords that are of particular importance are best not stored on a computer or on the network. Some that are applied daily, it is desirable to remember, others to write down and store in a secure place.

Computer security experts from Cambridge University have analyzed the structure of more than 70 million passwords. And found out that the most complex passwords  in the world are users from Germany and Korea. And they do it naturally and naturally, without special training. And the secret of the stability of combinations lies in the specificity of their language. They apply the same Latin symbols, the same numbers, but take as their basis their native "difficult" words - names, place names, terms, etc. For example, Annaberg-Buchholz # 122. To think up, remember these options is easy, but to pick up an order of magnitude more difficult compared to the vocabulary words of other languages.

If you, the dear reader, do not know Korean or German, this of course does not mean that you should ignore complex passwords. They are the guarantee of the security of your data on the Internet (in online payment systems, on sites, forums). This article will tell you how to meet the requirements for the key to access the account (what it should be) and how to create it.

Definition of complexity

The complexity of the key is a measure of resistance to selection at the symbolic level through manual and automated methods (logical computation, dictionary selection). It is determined by the number of cracker attempts, that is, how much time it takes to compute the user-generated combination.

The complexity of the password is influenced by the following factors:

  • The number of characters in the key. The more characters in the sequence, the better. A combination of 5 characters has a high probability of rapid hacking. But the selection of a sequence of 20 characters can take years, decades and even centuries.
  • Alternation of uppercase and lowercase letters.  Examples: the dfS123UYt key using the capitalization register is an order of magnitude more complex than the same combination, but only with small letters - dfs123uyt.
  • Character sets.  A variety of types of characters enhances stability. If you make a key of small and large letters, numbers and special characters of 15-20 characters in length, there is practically no chance to find it.


How to make stable combinations?

The following methods will help you come up with a very complex character key that is easy to remember.

1. Create visually contours of a geometric figure or an object on the keyboard of your computer. And then type the symbols on which the lines pass.


Attention! Avoid simple "designs" - lines, squares or diagonals. They are easy to predict.

2. Compose a complex sentence that does not lend itself to logic. In other words, some pun:

For example: Cat Vaska on Jupiter caught a pike.

Then take the first 2-3 letters of each word from the proposed sentence:
Cat + Ba + Na + Yup + ul + pike

Type syllables in Latin letters:
Rjn + Df + Yf +\u003e g + ek + oer

After transliteration, insert between the syllables some familiar numbers: date of birth, height, weight, age, last or first digit of the phone number.
Rjn066Df 45Yf 178\u003e g 115ek1202oer

That's all! As you can see, it turned out to be a fairly "strong" combination. To remember it quickly, you only need the key (sentence-pun) and the numbers used.

3. Take as a basis 2 memorable dates. For example, two birthdays (yours and your loved one).
12.08.1983 05.01.1977

Divide the number, month and year by any special characters:
12|08/1983|05\01|1977

Now replace the zeros in the dates with a small letter "o".
  12 | o8 / 1983 | o5 | o1 | 1977

It turns out quite an intricate key.

4. Make a special table: vertically and horizontally, place the letters and numbers in the matrix, and in the rows and columns - the symbols in a chaotic order.


To generate the key, take a few simple words written in English letters, for example, my password very strong

Take the first pair of letters. In our case this is "my". In the vertical list, find "m", in the horizontal "y". At the intersection of the lines you get the first character of the password.

In the same way, through the following pairs, find the rest of the key symbols.

If you forget the password, use a simple keyword and a table to restore it.

How can I check the password strength?

The stability of the symbolic combination to selection can be learned on special web-services. Consider the most popular:

Online service from the Kaspersky Lab anti-virus lab. Defines by the character set and the length of the key, how much time it takes to hack it on different computers. After analyzing the sequence, statistics are displayed for search time on the ZX-Spectrum (the legendary 8-bit 80s machine), the Mac Book Pro (2012 models), the Tianhe-2 supercomputer and the Conficker botnet network.


Online utility on the huge service portal 2IP.ru. After sending the key to the server, it gives out its status (reliable, unreliable) and the time it takes to break it.


Parolemanager.com/russian/password-tester.html

Gives a detailed description of the key:

  • the quality of the sequence, expressed numerically in special units;
  • the number of operations required to select;
  • time required to compute the combination (locally and remotely).


Successful keying and safe use of the Internet!

Instructions

First, we'll look at the process of hacking passwords. Most people use very simple passwords, such as a set of numbers. Such passwords have the lowest degree of protection against hacking. For cracking passwords, special programs are used. Modern hacking programs run at a speed of 500,000 passwords per second. For example, if your password consists of six digits, then such a password will be cracked in two seconds. How to protect against this type of attack, when all sorts of passwords are being moved at such huge speeds. In fact, it's easy.

First, you need to use long passwords. They must contain at least 15 characters. Such a password will be hacked for tens of years, given the state of the art. This is quite acceptable for us.

Secondly, the password should contain not only numbers, but also letters, spaces, different signs. Take the word "attraction" as an example. This word contains 21 letters. The hacking program will work on such a password for trillions of years.

However, crackers have special dictionaries containing all the words of the Russian language. Let's say 200000 words in the Russian dictionary. The hacking program runs at a speed of 500,000 words per second. It's not hard to count, after how many seconds your password is cracked, it's less than a second. Therefore, do not use the words of the Russian language, and not only Russian, as a password.

The quality of the password depends on two values, this is the length of the password and the variety of characters. Under the symbols understand, capital and capital letters, numbers, spaces or special signs. The richer the variety of characters in the password, the harder it is to crack. But such passwords are harder to remember. Therefore, it is better to create easily remembered passwords. For example, take a word or better a few words and intentionally make a few mistakes. Such a password will have a greater degree of protection.

Hacking your password is very difficult for a number of reasons, such as speed limits, limiting the number of acceptable errors when entering a password, and a number of others. But if an intruder gets access directly to your computer and downloads his programs for hacking, then you will need the password, which we mentioned above.

The procedure for setting a password is very simple. When the computer boots, press and hold the Delete button, this is the BIOS input. In the menu, find Password and enter the password, then press F10, and in the opened window, Yes. The password is set. Be sure to memorize it or write it down, since when you lose it, you do not start the computer. This is the most reliable protection of your computer to date.

Everyone who actively works on the Internet, is constantly forced to register on various services, in in social networks, on some sites. Everywhere you need to enter passwords, so you need to create them as reliable as possible. That's just how it should be? How to create such a password , which will be long.

Rules for creating a strong password

The best option is to use a special random password generator program. To this software can be attributed and Keepass. The disadvantage of this program is that it is very difficult to remember the generated password, it must be constantly recorded. And many users just do not want to mess with it. So, you need to create passwords that are easy to remember, but very difficult to crack. Software products that store passwords will definitely not save everything, some will have to be remembered.

What you need to remember when creating a password

  • Use classical combinations of words can not. First of all, the program will check the dictionary and digital combinations
  • Any personal information, such as a birthday, car license plates, names of relatives or friends, is strictly prohibited.
  • Do not use standard phrases, words, or their combinations to create a password.
  • When creating a password, you must use at least 10 characters, optimally 18 or 24.
  • When creating a password, you need to use big and small letters, numbers, special characters, for example: u # kcG8Z4 * s when using a combination of Latin and Russian layouts
  • When creating a password, you should include fantasy. Never a computer will not pick up a password that is created simply from nowhere. Such passwords are very difficult to crack even for special programs, and password selection can last for months.

How to come up with a strong password

The first step in creating any password is to create a key phrase. The best option is to use fantasy and create a completely meaningless phrase. After you need this phrase, while creating a very strong password. There are many methods that are worth exploring in more detail:

  • Using a combination of Latin and Russian layouts at the same time or writing a phrase in Russian using a Latin layout
  • Twist the phrase by writing it the other way round. It's pretty hard to do, but hacking such a password is much more difficult
  • Replace letters with their similar symbols: a - @, o - ()
  • In the password, insert a few letters from each phrase, and do it better in trivial form
  • It is possible with a phrase to delete specific symbols, consonants or pairs, there are a lot of options
  • Use special characters.

You can simultaneously use several of these combinations at once, completely changing the phrase into a meaningless set of letters. I recommend every person who often uses passwords to come up with their own encryption, which can be used in different services.

If there is a desire, you can create your own password, which is created from various encryption models. For example, cosmic ants - kosmtara - rjcvnfhf - Rjcvnfhf @ 955. And now the attentive user will notice the feature of this password: the first 4 characters of each word are selected, written together and on the English keyboard. We add special characters and any number. And as a result we get a fairly reliable and original password , which is easy to remember and restore.

To check the reliability of the password, you can use the service passwordmeter.com, through which you can check the reliability of the password.

When creating a password, you absolutely must abandon the standard thinking, work in an original way and not standard. This is the only way to create such a password, for breaking it you will have to sweat a special software for a long time.

Do you like the article? Share with friends: