Advertising

How to Make a Killer Password That Can’t be Hacked

Advertising
How to Make a Killer Password That Can’t be Hacked

Twitter was recently hit with a security problem when the website was hacked, leaving a quarter of a million accounts in limbo. Weeks earlier, Zappos suffered the same issue. These are examples of how even the strongest passwords can be at risk. However, being the Internet users we are, we aren’t just going to pack up our digital lives and forgo the Internet altogether.

We must improve our current password practices and ensure that the day-to-day scammers and hackers don’t find the key to our online lives. Today, I present you with the comprehensive guide to everything about passwords. From how to choose a strong password to what to do afterwards.

Password Boot Camp

ultimatepasswordguide_intro

    What better way to start a guide to passwords than by helping you create the ultimate password? To start, have your computer near by along with a writing utensil and a notepad- they’ll come in handy during this process, and are all that you’ll need. No need for dictionaries or a second individual—your password doesn’t have to be, and shouldn’t be, complicated and highly complex. Below are a couple of tips on how to get started:

    Advertising

    ultimatepasswordguide_howstrongisyours

      1. Make Personal Passwords Non-Personal – One key tip is to ensure that your password is related in some way to you that will be easy for you to remember, while not including easily identifiable information. What does that all mean? Yes, you can work in your favorite color or television show into your password. However, don’t include your address or birthday in there.

      2. No Random Generators – Password generators are always considered recommended for choosing strong passwords, but I always advise staying away from them for two reasons. First, some generators heavily reuse password suggestions. Secondly, they are much harder to remember and will require to resorting to password recovery frequently.

      3. Break the Molds – I advise not making use of real words or phrases in your password. For example, if you are going to include the word “soccer” in your password, use “$0kr” instead. This also means, don’t make use of dictionaries in consulting your next password—that’s just asking for hackers to come to you like fresh bait.

      Advertising

      4. The NAC Philosophy – The philisophy I just created while making this article is the NAC philisophy. This means ensuring that your password includes “Numbers A Characters” along with text. One common mistake with passwords is only including letters, but also including characters and numbers strengthens your password. Simply changing “LuvToPlaySoccer” into “!Luv2ply$okr!” turns a weak password into a strong one.

      5. Utilize the Strength Test – Finally, making use of a strength test can ensure that your password is top performing. Several online resources, including How Secure Is My Password, allows you to instantly see how strong (or common) your password truly is.

      Divide and Conquer

      It’s important to have a different password for each service that you use. It seems a bit difficult in the beginning, but when you begin to continually use the separate passwords for the separate services, you will find yourself associating one password with the service that matches it.

      Advertising

      ultimatepasswordguide_divideandconquer

        When you use a separate password for each website, make sure that you don’t simply leave out a letter or include an extra number—that’s not considered a true variation, and truthfully, it helps narrow down the hacker’s choices even more. So how do yourself to remember all of these passwords? Making use of applications for your desktop or mobile device is a huge help.

        I highly recommend Passwords Plus or KeePassX. Both services are cross platform, have high encryption protection, as well as support for saving the passwords and codes of various services that you use. LastPass is another well rounded password manager that I recommend for users to make use of.

        Secrets In the Details

        You have a great password, wonderful. Now what happens when you forget your password? No problem, just go to password recovery and answer a few questions and you’re done, correct? Well this “convenience” is more of a convenience for hackers than yourself. Many times, when asked to create a recovery answer to a question, we always pick the easiest ones to answer to quickly get through the process.

        However, if your hacker already has the password to your email and is looking to extend its reach, they will make use of your easy-to-answer recovery questions to increase their control over your personal life. How do you protect yourself from hackers passing the recovery test?

        Advertising

        ultimatepasswordguide_secretindetails

          Answer questions truthfully but in a way that isn’t technically the norm. In other words, look to your recovery answers as passwords of their own. For example, if your question is “In which city were you born?” and your answer is Los Angeles, consider going a step further and including the state as well (even when asking for just a city), or spell the city in a different way, like *Lo$$ Angele$* instead of Los Angeles.

          A friend I consulted while creating this article mentioned a final tip: create an email address specifically for recovery. It may seem like a hotbed of all of your passwords, in one place, but if you ensure that you use the recovery only when you need it and emptying out your trash each time you make use of the password, an individual who hacks that email will be presented with an empty inbox—forcing them to target their prey elsewhere.

          Special iOS Consideration

          Finally, what’s the deal with iOS passwords? It seems that your FBI, secret spy, creative password production ends at this point. Most iPhone, and mobile users in general, seem to resort to simple passwords for their phones. This is worse than doing so for your social network, for example, because there is a greater likelihood of someone going into your phone than hackers in your website or services.

          Advertising

          ultimatepasswordguide_mobilepassword

            This could be because our idea of hackers is a bit distorted: from the teenager in a dark room trying to crack password codes, to your nosy friend who’s trying to go into your phone to take a peak at your text messages, both individuals are considered hackers. Chances are you’ll encounter the friend situation much more often. Below are a couple of quick tips on creating the ideal mobile password for iPhone users and how to increase your security even further:

            • Avoid Patterns: With only 10 numbers to your disposal for only four spots, it’s important to not have corresponding numbers used in your code. This means that 1234 is out, 0987, is out, and the like.
            • Match Numbers with Letters: You may not have noticed, but the keypad on your iPhone also has letters associated with the numbers, also known as T9. This makes it easier to associate a mini phrase to numbers. For example, RAYS = 7297 or WANT = 9268.
            • Look into Longer Passwords: iOS also allows you to make use of text passwords as well. Going into Settings > General > Passcode Lock > turning off “Simple Passcode” makes this happen. Make sure you abide by the tips mentioned in this article when going by this route.
            • Limit Access from Lock Screen: In the same settings area, you can also change what you allow access to when locked. You can prevent Siri, Passbook, and Reply with Message to be accessible from the lock screen. You can also erase iPhone data after 10 failed passcode attempts from here as well. However, I recommend against using that unless I’m traveling or in a compromising venue (a concert, for example).

            More by this author

            9 Meal Planning Apps That Will Help You Eat Healthier The 50 Best Desktop Wallpapers for 2013 23 Awesome Travel Hacks That Add Fun To Your Trip How to Stay in Good Shape During Black Friday 9 Apps Unrelated to Black Friday That Are Helpful

            Trending in Technology

            1 Can Technology have Biases Like Humans? 2 15 Great Macbook Accessories To Improve Productivity 3 7 Best Outdoor Security Cameras For Better Home Security 4 10 Best VPNs to Browse the Internet More Securely 5 10 Best Monitors for Your PC Under $100

            Read Next

            Advertising
            Advertising

            Last Updated on December 18, 2020

            Can Technology have Biases Like Humans?

            Advertising
            Can Technology have Biases Like Humans?

            Technology has taken a vantage leap in providing solutions for man. Before now, technology used to appear complex and would require a great deal of expertise to handle solutions available. Today, we have technology applicable in the simplest human activities as smart products with intelligent algorithms powering them as they make error-free judgments and provide intelligent and analytic solutions.

            Does technology have all the answers?

            This article from Credit Suisse, tells us that technology does not have all the answers because it has been found to exhibit “similar biases,” as humans. No one can discredit the impact of technology, but it is not totally free of human input and this is the reason we experience these biases in many areas we have technology holding foot.

            Advertising

            Creating technological solutions transparently

            This article suggests that the process of creating technological solutions be made transparent and subject to contribution from many people who would end up as users of the product – male, female, young, old, learned, unlearned and all other preferences as we have them. It also underscores the importance of having women on product development teams. This approach is not sure to eliminate all forms of bias, but it is a good way to start in order to appraise the full benefits of technology.

            Advertising

            Technology as the connecting tool

            Technology so far has been a major connecting tool amongst us humans. It is used and appreciated by all regardless of race, language and sex. In order to keep it less subjective to these arguments about human biases. I believe we should gather opinions on products and solutions before making them available to the public. This could be done by gathering input from intended target users and receiving feedback across the stages of production.

            Advertising

            “Recognizing the problem is a start…success will depend on inclusive technologies that meet this vast untapped market.” This cannot be more apt especially at a time when we look up to technology for solutions. We should not muzzle our progress with technology by battling algorithm bias. The first way to avoid this battle is by reading this article here.

            Advertising

            Advertising

            Read Next