The great god-level password setting method is easy to remember and have no solution!

Source: Internet
Author: User

The great god-level password setting method is easy to remember and have no solution!

Today, I will share with you a simple and secure password setting method. I believe many people like to use their birthdays as their passwords, for example, 19900523. There is only one reason for doing so-note. After all, there are too many websites today, and you do not know how many registered accounts you have. The passwords are mostly self-recorded, so one or two passwords are too many to remember.

To put it bluntly, we will share with you the method of encrypting the original password, or even secondary encryption. For example, @ ww00jad. This seems messy, but it is only an encrypted password (19900523. We only need to know the password that we can remember most easily, and the encryption method can understand this seemingly irregular password in seconds. How to implement it?

Basic usage

This is the nine (12) gongge ing method or the T9 ing method (the name I wrote by myself was accidentally inspired to use it for many years, this method is easy to remember and greatly improves security. Okay. Now let's take a look at how @ ww00jad is set up above.

▲My friends opened the jiugongge input method (or 12gongge). I believe many eye-catching friends have discovered xuanjicang? Yes, you are not mistaken. This is the basic encryption rule. Now you can use the corresponding keyboard to convert 19900523 to get: @ ww00jad.

You may ask, 1/0. What should I do? (on some keyboards, 1 corresponds to some punctuation marks )? 1/0 is the essence of the entire encryption rule. People usually like to use a combination of their own things as passwords. Such passwords are objective and can be easily cracked or exploited. For example, if you have a birthday, someone with ulterior motives can earn your birthday in various ways. This is really Easy for the digital age.

The above password setting method aims to add subjectivity to the password. The birthday is objective, and the basic rule is also objective in some sense. It is justified by evidence. But 1/0 can adopt a completely rule-free ing method. In this example, [ing 1 to @, 0 does not move], so that a relatively complex but memorable password is complete. Of course, you can also set it to % ww .. jad.

Advanced usage

The password set in the simple ing principle above is already very secure. Adding 1/0 as insurance, the overall password is no longer regular. If you are not at ease, we can continue to make it more complex. That is, the password is encrypted twice to further increase its subjectivity. After all, human thoughts are the most difficult to guess.

1. Reverse ing and multi- ing

The example above uses your commonly used birthday, mobile phone number, student number, and employee number to map numbers into letters and symbols. Here we can also turn this back, for example, bianji @ 19900523, after ing is 2426541 @ ww00jad, so that a meaningful pair of objective passwords will become a bunch of irregular garbled characters, here is the inverse ing of letters to numbers. We can find that each number corresponds to 3-4 letters. Simply knowing this ing method, even if the password is 2453, it will have 192 letter combinations, doubling the security.

This can also be done, but it is completely used and relatively complex. In the same bianji @ 19900523, we can find on the keyboard that (some keyboards) Press 2 twice. You can enter B, B ing 22, I ing 444... The last 99 is also mapped to x. The result is as follows: 2244426654441 @ x00jad changes the password's number of digits.

2. Partial ing

For example, the password bianji @ 19900523 is still used. We can map only some of them, and write them in a mix of false and false. For example, if you map bianji @ 19900523, only the second half of the ing will get bianji @ 19w00jad. You can also map the First Half of bianji @ 1 to 900523 @ 2426541. There are multiple methods not listed here.

You can map as you like. The output characters are messy, but we know that it is just a name and a birthday. Just remember your desired ing method. Such a simple password generates n different combinations of passwords, greatly increasing security. The most important thing is that you can remember it, but "they" are not easy to crack.

Each of the above methods can get a good password. When you are familiar with this method, you can create a very safe password for compound applications.

For example: 224442665ji1 @ x00jad (19 BITs), bianji @ 19900523 (15 bits), and check whether your password is completely beyond your control. Hurry up and try changing it!

Conclusion

Many friends may see a bit dizzy here, how to input such lengthy characters. It is really inconvenient to input the 12 gongge Pinyin input method because pinyin has the Lenovo function. Switch to the English 12angge. For some passwords, you only need to enter @ ww00jad according to the key position you originally wanted, as long as you enter 19900523 in order, as for 222, which corresponds to aaa, c, AB, and ba, It is the subjectivity of passwords. It has a good memory and can be easily mastered by logical friends.

I have been using this method for a long time. At present, My QQ password is also a terrible 21-bit, which contains some ing, inverse ing, and multiple ing. After you try the password several times, you can remember the character password after the ing. In addition, the 21 digits increase by 8 digits, and the final original password part belongs to the objective password. Even if you forget it, you can quickly calculate it, as long as you remember how to map it. In fact, it is the password creation method, or the character joint memory method, or auxiliary memory. A non-Rule password containing digits and letters is naturally more secure.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.