"Out of School" computer password best choice

Source: Internet
Author: User

Have you ever found any strange problem with your mailbox? Has your QQ number been stolen for some reason? Why? The main cause may be your password selection and storage problems.

I. Password and its importance

What is a password? The Password is also a commonly used Password. The English name is Password. In the computer field, especially in the network, passwords are your keys. Specifically, the password is a simple method for the computer to confirm you. In daily life, we can recognize a person based on appearance, sound, and handwriting, but the computer cannot see us or hear us. At least most computers are like this, so we need a password to help us, A password is a common secret between a computer and you. The computer knows your username, but it cannot be sure it is you. You must provide a password to prove to the computer that this is you. If your password is obtained by someone else, it is as if you have given all the keys to that person. The consequences are unimaginable. However, don't worry. Let's look at it and you will tell you how to do it.

2. Inappropriate passwords

I don't know what form your password is. Here are some of the common types of unsuitable passwords:

(1) Use the user name itself, for example, whether the user name is Lizhigang, password or lizhigang;

(2) various combinations of user names, for example, the user name is Li zhi gang, the combination is Li_zhgang, Lzhg, lzg, and so on, or the common numbers and dates of birth are appended, such as lzg80, lzg1980, and lzg888;

(3) commonly used numbers, generally 0, 1, 123, 12345, 888, and 168;

(4) commonly used English words, especially commonly used words in computers or their simple changes (such as "qwerty" or "abcdef") can be found in the dictionary;

(5) password indicating personal information (such as birthday, name, spouse name, child name, phone number, ID number, work permit number, car number, vehicle license number, and street name of residence );

(6) A new password similar to the password to be replaced;

(7) The password published as a password example.

In addition, I have also seen brands that use their computers as passwords, sometimes display brands. These passwords are widely used. In fact, these passwords are very insecure. Do not think that no one will want them. These passwords can even be guessed several times. For the slightly complex passwords, you can use the brute force method to crack them. Specifically, the dictionary of passwords contains possible passwords, put your name, phone number, and words in the English dictionary, and then experiment one by one.

3. bypass the password dictionary

If your password is included in the password dictionary and someone really wants to crack it, it is only a matter of time. Generally, the password dictionary consists of the following four types of content:

(1) telephone number

Including Office phones and mobile phones or pagers, and select the number width or add area numbers based on the location;

(2) Date of birth

You can select a two-or four-digit year. The birth year of online users is now concentrated in 1960-1980, and the user's year range is smaller, generally 1960-1975. In this way, the dictionary will be smaller and the cracking time will be shortened;

(3) Name and letter

It can be divided into a combination of name and consonants (2-3 digits), a Chinese or English name, a Chinese surname + a name, a Chinese surname + A Chinese consonant, and a Chinese surname + an English name. It can be combined according to the usage frequency:

Chinese surname:

Li, (Li) wang, Zhang, Liu, Chen, Yang, Zhao, Huang, Zhou, Wu, Xu, sun, Hu, Zhu, Gao, He, Lin, Guo, Ma, Luo, and Liang song, Zheng, Xie, Han, Tang, Feng, Yu, Dong, Xiao, Cheng, CaO, Yuan, Deng, Xu, Fu, Shen, and so on.

English Name:

Andy, alan, bobcharles, david, frank, george, henry, john, king, lewis, louis, lee, mark, michael, paul, peter, catty, richard, steve, helen, robert, jack, sam, tom, etc.

In addition, you may also add fixed prefixes, common numbers, and dates of birth. The names may be changed, or you may insert "-", "_", or ". "Three Common delimiters (4) English and numbers

It contains more than English dictionary files, as well as commonly used numbers. You can also set the number range to generate a new digital dictionary.

In the generated dictionary file, the case format and dictionary width range of the term are set. The common user name is 3-6 Characters and the common password is 3-8 characters. It can be seen that almost all commonly used unsuitable passwords are included in this dictionary.

In addition, the current password dictionary is getting bigger and bigger, and the computation speed of the computer is quite fast now. If your password is unfortunately very simple, it will soon be available.

4. Select an insurance Password

After reading the above content, do you feel that you have learned how to choose a password? How can we find a suitable password? Theoretically, the safest password is a combination of letters (including uppercase and lowercase letters), numbers, punctuation marks, and special characters. The password should not contain some of your easy-to-obtain information, nor be too common words, and the length should not be too short. The password must be no less than five characters in most cases.

A good password should have the following features:

(1) it must contain at least 6 characters;

(2) it is best to include non-letter characters, including numbers and special characters, such ~ ! @ $ % ^ & * () _-+ = []:; <> ,.? /And space;

(3) It must be easy to remember and not written down;

(4) The hacker can quickly type without reading the keyboard, so that the hacker cannot recognize the characters he typed.

5. How to keep passwords

You must keep the password safe after you have selected the password. Some people put their keys on the door frame or window sill and thought they only knew them. In fact, many thieves will go to these places to find the keys. The same is true for password keeping. The best way is to keep it in your mind rather than in a specific position. As a general rule, passwords should not be written down. Passwords written in notebooks and message lines may be discovered by others.

Because suitable passwords must not be too short and are not common word names. Confidentiality is good, and the problem that comes with it is hard to remember. If you cannot remember it, you can write it down, but pay attention to the following points:

(1) do not write the username and password together;

(2) Change the password in a memorable manner, add additional characters, and change the character sequence or truncation;

(3) If you must record the password, never give it a glance at the computer, especially on the monitor;

(4) The password-writing notes should be folded and put in a safe or safer place;

Conclusion

Now, you should have a new understanding of how to choose a password and how to keep it. I hope this article will solve some of your questions and help you use computers in the future. If you find a problem with your password, modify it now. This is the last rule added in this article.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.