Ten military rules to build strong passwords

Source: Internet
Author: User

We are always dealing with passwords when using computers. If the password you set is guessed or decrypted by others, important information and personal privacy will be leaked. Therefore, setting a secure password is a major event related to everyone. Next we will introduce the ten military rules that must be followed in the password setting process.

I. Try to be as long as possible

Generally, the password must be at least six characters in length. It can be seen that passwords with less than 6 digits are cracked. From the perspective of password cracking, the most common method is brute-force cracking. One of the most typical features of brute-force cracking is to arrange and combine the characters that may be used in mathematics and conduct experiments one by one, find the correct password. If we increase the number of digits, the friends who know the mathematical permutation and combination will know how many chance of permutation and combination will be generated every time one more digit is added. Therefore, the password should be as long as possible as the first military rule we must comply. Even if more than six characters are used repeatedly, the difficulty of deciphering is increased.

2. Try to be as unfamiliar as possible

Many users prefer to use their names, nicknames, dates of birth, phone numbers, or other frequently used words as their passwords. As we all know, contradictions are often generated internally, and such information is often well known within the company. In this way, when you enter the password, others can guess the content of the password with a little attention. Therefore, if you are worried that the password you set is not easy to remember, you can add some characters that only you know before and after the password, so as to be confused.

Iii. as complex as possible

A single number, letter, or even one character is used repeatedly. Although the number of digits in the password is long, it seems difficult to crack the password. Otherwise, numbers and characters are easily deciphered. Therefore, the password should contain letters, numbers, and symbols. If the password is case-sensitive, it should be case-insensitive, so that the password will be much safer.

4. Order from the back to the front

When setting passwords, the common habits start from a, B, c, d, or 1, 2, and 3, which just satisfies the brute-force cracking order, because they are calculated in the natural order of letters and numbers. Therefore, if we set the password first to z and so on, the chances of cracking will be much lower.

5. Easy to forget passwords

The password must be long enough and complex enough to prevent hackers, but it also brings a lot of trouble to your input. If the time is longer, it is easy to forget and inconvenient to use. In fact, you don't have to worry about it. You can use the content you are familiar with when setting the password, and then add a character at the beginning and end of the password you set. At the same time, you can use multiple familiar content for superposition, such as your nickname plus the last three digits of the phone number and mobile phone number, such as the name of your primary school and the last letter of the name, this type of password is not only familiar to you, but also serves to paralyze others.

6. Do not use the same password

In actual use, it is impossible to use a password in only one place. Email, QQ, MSN, Forum ...... It is extremely dangerous to use the same password in all places. Therefore, as long as one of the amendments is deciphered, all the defenses will be ineffective. You can increase the flexibility when setting different passwords. For example, if longzhong is used normally, it can be set as qqlongzhong when used as a QQ password, you can use longzhongsina when setting it as a Sina Mail Password.

7. Frequent password changes

This is equally important. No matter how complicated the password you set, there is a possibility of cracking as long as there is enough time. Therefore, it is very important to develop the habit of regular password change. In the specific operation process, you can follow your own rules to change. The password we used for the first time is qqlongzhong. Second, I can put qq in the middle and change it to longqqzhong. For the third time, I can put qq In The Back Of longzhongqq.

8. Do not save the password

Complicated passwords are set, which makes it difficult to enter. Therefore, many people simply set the password to save the password when entering the password. In this way, you do not need to enter each entry. This is a very dangerous method. You can download a * number to view the software on the Internet, and the password content immediately shows its original shape. No matter how complicated your password is, it is useless; there are even some specialized tools and software on the Internet, which can be used to separate the various passwords entered from the cache. Therefore, not only should they be set to save passwords, but also cache and temporary files should be cleared in time when necessary.

9. Enter the correct password

Password Input is also very exquisite. Correct passwords are used to prevent trojans on your computer, so that all the entered passwords will be forgotten. In this regard, on the one hand, we should always check whether the computer is infected with Trojans and viruses, and on the other hand, we should also add some skills when entering the password. For example, when you enter the user name and password, you can enter other characters at will after entering the user name, and then enter the password, so that others think that the random character is the password; first enter the password, then, enter the user name. If you enter an eight-digit password, you can first enter the last five digits, and then keep

Go to the left and enter the first three places.

Another common method is to use the mouse input. Switch to any input method and click the mouse button on the input method status bar. a simulated keyboard is displayed on the screen, and the corresponding characters are clicked with the mouse to implement the input.

10. Self-security awareness is the most important

There is no absolutely secure password in the world, and no matter how we set it, we cannot ensure that everything is safe. Therefore, while enhancing the complexity of passwords, we need to enhance our security awareness so that we can avoid security incidents as much as possible.

Html ">

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.