My username and password - what they are, how to create them correctly and store them safely. What is login and password? Why do you need a login, how to come up with one? Letters, numbers and symbols

Hello, dear readers of the blog site. It seems like a simple question, but it still often arises for novice Internet users when they need a login and password.

It would be better if I immediately warn you and try to explain the importance of your usernames and passwords, because on the Internet they break everything, and not just where something is located.

What is “my login” and how does it differ from a username?

So, login is your individual identifier (must be unique for the service where you register). Now many services allow you to use names or nicknames written in Russian letters as your logins, but previously everyone was required to use exclusively Latin characters and numbers when writing them.

This is apparently due to the fact that the data received during user registration (login and password) is stored in the database. Therefore, when entering my login, I use the same rule that is acceptable to use in - ,,,[_],[-]. This spelling is suitable when registering for any service.

You still have to figure it out what is login, and what is a username. Very often one is different from the other. This confusion is growing from the same above-mentioned rule of using only Latin characters when registering, while on the forum, website, blog and social network where you register, it would be appropriate to use usernames (real or nicknames) written in Russian language.

That’s why you often have to fill out two fields in the registration form: login (only in Latin) and name (possibly in Russian). True, there is now a general trend on the Internet towards simplification, and there are fewer and fewer sites where you are confused by incomprehensible fields with two similar concepts.

Now often use as their login just your mailbox address or the mobile phone number specified during registration. Moreover, you can use any of these identifiers (login, phone or E-mail). It is clear that I am not talking about forums, but about sites like or.

It’s also worth coming up with your login wisely, because your personal data (full name) indicated in it can help attackers apply social engineering methods to you if you inadvertently become an object of interest for such individuals (this is how wallets in electronic payment systems, postal And social accounts, and much more).

In our digital age, we need to learn to be vigilant and overcome our innate gullibility. Don't think that no one needs you. They are needed, but not you specifically, but together with thousands more careless users like you. Accounts are stolen online, and then sold in bulk to spammers and other bad people.

In addition, please note that on most services, the the login cannot be changed later, except perhaps only by registering a new account. Therefore, try to think through in advance all the awkward moments that may arise in this regard (for example, by registering in Miralinks under the nickname of one famous character in the world of SEO, I have received questions several times from the administration about my ownership of certain sites added to this system).

A complex password is what will allow you to sleep peacefully

Well, now let’s talk about the second part of personal data, which you will need so much when logging into any service on the Internet. I'm talking about password. What it is? Ideally, this is a very difficult to select and difficult to predict set of characters, which are not always letters or numbers.

The more complex my password is, the more difficult it will be for attackers to crack my Mailbox, an account on a forum, website or social network by simply searching through dictionaries. An example of bad options would be your name typed in the Latin layout, qwerty options, 123456 and thousands of others, lists of which are available to any hacker lying around.

It is clear that you are insured in case you forget the password you came up with or lose the piece of paper on which you wrote it down. But anything that helps you recover it will help the attacker figure it out. The good old saying still applies: if you put it further away, you will take it closer.

Personally, I realized the need using a secure manager to store my passwords and logins only after the theft of funds from my WebMoney wallet and after almost all of my sites were infected with viruses. In both cases, there was a banal theft of passwords (in the first case, it seems that my mailbox with a password equal to qwertyqwerty was hacked by brute force, and in the second case, they pulled out the ones stored in open form in the file are my passwords for accessing sites via FTP).

Carelessness is always punishable, especially on the Internet, where the situation is similar to the dashing nineties in Russia. When choosing a password manager, I was guided by reviews on the Internet, and also by the fact that it was free and open source code (any understanding programmer will be able to identify developer loopholes if they exist).

The latter is important, because trusting all your data to one single program is quite fraught. But if there are no “bookmarks” in the code, then open the database without entering the master password or specifying key file It will be almost impossible, because cracking a complex encryption key for a database of passwords using brute force methods can take years even on a supercomputer.

The program is again free and open source - time-tested reliability. In general, be vigilant and do not trust even yourself in matters of security.

Good luck to you! See you soon on the pages of the blog site

You can watch more videos by going to
");">

You might be interested

How to register on the social network Twitter? Yandex Account - registration and how to use the service Account - what is it, how to create or delete it
How to restore a page in Contact (if access is lost, deleted or blocked) How to delete your page on Odnoklassniki
How to put a password on a folder (archive or otherwise password protect it in Windows)

- (French military). A conditional word and army, given at dawn for a day to the sentry to hail and interrogate those passing beyond the line. Dictionary of foreign words included in the Russian language. Chudinov A.N., 1910. PASSWORD is a certain word that in ... ... Dictionary of foreign words of the Russian language

- (foreign language) conditional phrase, word, direction. Wed. He is one of those who love the people... The treasury is the treasury, but there is no need to offend the peasant: that is his password... Boborykin. Walker. 1, 31. Wed. These smart, heartless people who don’t want to do anything have such a lush... ... Michelson's Large Explanatory and Phraseological Dictionary (original spelling)

Secret string of characters supplied by the user computer system to gain access to data and programs. A password is a means of protecting data from unauthorized access. In English: Password See also: Access to... ... Financial Dictionary

- “Hotel Regina” Genre historical adventure film Director Yuldash Agzamov, Zinovy ​​Roizman Scriptwriter Arthur Makarov, Mikhail Melkumov ... Wikipedia

Slogan, review. See slogan... Dictionary of Russian synonyms and similar expressions. under. ed. N. Abramova, M.: Russian dictionaries, 1999. password slogan, review, sign, phrase, pass, word Dictionary of Russian synonyms ... Synonym dictionary

- (French parole) secret word. In the armed forces of many states it is used for guard duty, as well as in reconnaissance and security. The password is used in secret organizations to identify their own (sometimes the password can... ... Big Encyclopedic Dictionary

Male, French, military a word transmitted at dawn for a day to the sentry, for calling out and interrogating those passing beyond the line; are only skipped those who know the password. see review and slogan. Dictionary Dalia. IN AND. Dahl. 1863 1866 … Dahl's Explanatory Dictionary

password!- * password!

parole d honneur. Honestly! If Marya Mondratyevna had a look at our flower, I’ll tell you the password! imposing, with tone, trained in French, sorts out bones on the piano. V. I. Savinov Canary. // Pantheon 1854 1 5.… … password d"oner - * parole d honneur. Honestly. Okay, answered Evgeny; I give you the parole d honneur to obey you in everything. 1799. A. Izmailov Evgeniy 1 44. Avek plaisir will tell their biographies. This rogue in a stroller was once in Krasnoye Selo in the camps... ...

Historical Dictionary of Gallicisms of the Russian Language password - The assigned sign of the access subject, which is his (the subject’s) secret. [RD 25.03.001 2002] password [Intent] Topics of the security and safety system of objects EN configured passwordpassword ...

Technical Translator's Guide

  • Books
  • Password - Nadezhda, Zoya Voskresenskaya. "Password - Nadezhda" is a story about the childhood and adolescence of Nadezhda Konstantinovna Krupskaya. The author talks about the traditions of Nadezhda Konstantinovna’s family, how her character was formed...

Password: Love. Forum materials on books by Klaus J. Joule (set of 2 books), . The set includes 2 books from the “Life Full of Love” series: “Password: Love. Forum materials on books by Klaus J. Joel. Part 1” and “Password: Love. Forum materials on books by Klaus J. Joel.… The Internet today occupies in the life of any person. As a rule, for full-fledged work or simply to use resources, registration is required, which implies password usage. Passwords are also required to pay various bills, confirm actions, etc. The resource for which a password is created can be either important (Internet banking, for example) or not very important (if it gets hacked, no big deal). Simple password for sites with storage Money won't do. Let's look further at how to come up with a reliable correct password, which will not be hacked.

So, few people guess passwords today - as a rule, brute force is used. With the help of a special program they move various options combinations. The first combinations to be checked are sets like “111111”, “123456”, “qwerty”, etc. Next, a simple substitution is made. Such a program can as soon as possible go through a huge number of different combinations.

If the password is your date of birth or just a set of numbers, for example "25061980", the program will decrypt it in 2 seconds. On personalized passwords, which begin with a small letter (olga, roman) are cracked in 4 seconds. It will take approximately 4 minutes to password decryption, which capitalizes names. A complex combination like “1d2d3s4a8c” will require 4 days to decrypt, a password like “HSU5-BHJDa” will take 12 years, but the program will recognize such a password “IkRn%Kmbl253NNp” only in a million years, that is, never.

In the way that come up with the correct password, you must adhere to the following basic rules:

1. Passwords should not be short. At least 8 characters, preferably 10 or more.

2. It is imperative to use both numbers and letters. Even better is to dilute the combination with symbols and punctuation marks.

3. Correct password must contain both uppercase and lowercase letters.

It is worth noting that password is hacked not just the program. This can be done manually if you know enough about the person. For example, butfors will be about 100 thousand years recognize password"ivanovkostya". But if you have knowledge about a person, you can select a password manually in an hour or two. Moreover, last name, first name, date of birth are usually checked first.

Another way find out the password- is to choose the answer to the “secret question”. Just click on the "Forgot your password?" button. and in a few seconds (if you have information about the person) select a security question. Usually they use primitive data that is really easy to find: mother’s maiden name, favorite dish, animal name, etc.

Where do attackers get information? The answer is very logical and lies in an accessible plane: usually on social networks. If the attacker has set himself a goal crack password, he can freely use information from social networks. Therefore, Vanya Ivanov, who uses the password “ivanivanov” to log into the social network, should definitely change it immediately, otherwise his friends will very quickly see an incredible amount of spam on his behalf. Thus, password hacking- it's not as difficult as it might seem.

Now let's look at what needs to be done to correct password was selected as efficiently as possible (taking into account the previously specified requirements):

1. You should not use personal information in your password: date of birth, wedding, phone numbers, etc.

2. The answer to the “secret question” should not be simple and easy to guess. There is no need to use information that is easy to find out.

Password generation and methods of remembering.

To select the correct password quite usable password generation. This service is very affordable. Possible without special effort choose a combination that will not be easy to recognize. However, there is one pitfall here: a complex combination is difficult to remember. Rare combinations are difficult to remember. Let's look further at how to make sure you don't forget or lose your password.

In most cases, when password generation the same combination is used. Sometimes the password is updated and comes out something like "parol1", "parol2", etc. This is a tricky step, but you can be sure that the password will not be forgotten.

When using a password generator, the result is a meaningless and illogical set of characters. It needs to be stored somewhere. It’s interesting that many people have the habit of writing it down on a piece of paper and sticking it on the monitor. For example, in an office where there are many employees, clients and random people. With the same success, you can create a file on your desktop called “my passwords”. The effect will be the same.

So here you go general tips on storing and remembering passwords:

1. It is better to create a new unique password for each resource.

2. There is no need to store password combinations on your computer desktop - hackers can easily break into your PC.

3. The password does not need to be kept in plain sight.

4. If the password is written down on a piece of paper, you need to create a copy of it.

5. No need to enter passwords in “strange” or suspicious sites or programs. Portal administrations never require you to provide them with a password - it is used only for login.

6. If a special program is used to store passwords, you need to create a copy of it.

And finally, about the correct password.

Finally, a few useful tips. In gaming clubs or internet cafes, enter passwords as rarely as possible. These are other people's computers, so so-called spyware can be used: they easily remember combinations that are entered from the keyboard.

If you still had to log in from someone else’s computer or use password not only at home, but also at work or in another place, always log out of the resource (don’t just close the tab, but click “Exit”) and do not click “Remember me”. Otherwise, anyone can come in even without password guessing. It’s unfortunate, but even serious portals are famous for this electronic exchange means: they have a “Remember” function, although it should not be there, and the session should be limited.

Passwords sometimes need to be changed. True, the more reliable it is, the less often it needs to be changed. A password of 12 - 14 characters can be changed every few years.

Using all the recommendations in this article, you can easily create correct password, which no one can hack. As a rule, in the old fashioned way, passwords are written down in notebooks - in this case, notebooks should not be accessible to a wide range of people. Over time, you can remember even a large and complex combination - depending on how often you work with it.

The point in such fashionable today mobile gadgets partly because they can be used to access the required resource anywhere there is Internet access. At the same time, there is no need to go to an Internet cafe or club, where they can easily scan password. But you should also log out of your account for security reasons. In general, these simple recommendations are able to completely protect against password hacking.

Most attackers don't bother with sophisticated methods of stealing passwords. They take combinations that are easy to guess. About 1% of all existing this moment Passwords can be guessed in four attempts.

How is this possible? Very simple. You try the four most common combinations in the world: password, 123456, 12345678, qwerty. After such a passage, on average, 1% of all “caskets” are opened.

Let's say you are one of those 99% of users whose password is not so simple. Even in this case, it is necessary to take into account the productivity of modern software for hacking.

John the Ripper is a free program located in free access, allows you to check millions of passwords per second. Some samples of specialized commercial software claim a capacity of 2.8 billion passwords per second.

Initially, hacking programs run through a list of the statistically most common combinations, and then turn to the full dictionary. User password trends may change slightly over time, and these changes are taken into account when updating these lists.

Over time, all sorts of web services and applications decided to forcefully complicate passwords, user-generated. Requirements have been added, according to which the password must have a certain minimum length, contain numbers, uppercase and Special symbols. Some services take this so seriously that coming up with a password that the system would accept takes a really long and tedious time.

The key problem is that almost any user does not generate a password that is truly resistant to guessing, but only tries to meet the minimum requirements of the system for the composition of the password.

The result is passwords in the style password1, password123, Password, PaSsWoRd, password! and the incredibly unpredictable p@ssword.

Imagine you need to change spiderman's password. Most likely he will look like $pider_Man1. Original? Thousands of people will change it using the same or very similar algorithm.

If the burglar knows these minimum requirements, then the situation only gets worse. It is for this reason that the imposed requirement to make passwords more complex does not always provide better passwords, and often creates a false sense of increased security.

The easier the password is to remember, the more likely it is to end up in the dictionaries of cracking programs. In the end it turns out that indeed strong password It’s simply impossible to remember, which means it needs to be somewhere.

According to experts, even in our era digital technologies people can still rely on a piece of paper with passwords written on it. It is convenient to keep such a sheet hidden from prying eyes place, such as a purse or wallet.

However, a sheet of passwords does not solve the problem. Long passwords are not only difficult to remember, but also difficult to enter. The situation is getting worse virtual keyboards mobile devices.

Interacting with dozens of services and sites, many users leave behind a string of identical passwords. They try to use the same password for every site, completely ignoring the risks.

IN in this case Some sites act as a nanny, forcing you to complicate the combination. As a result, the user simply cannot figure out how he had to modify his standard single password for this site.

The scale of the problem became fully realized in 2009. Then, due to a security hole, a hacker managed to steal the database of logins and passwords for RockYou.com, a company that publishes games on Facebook. The attacker placed the database in open access. In total, it contained 32.5 million records with usernames and passwords for accounts. Leaks have happened before, but the scale of this particular event showed the whole picture.

The most popular password on RockYou.com was 123456, used by almost 291,000 people. Men under 30 more often preferred sexual themes and vulgarity. Older people of both sexes often turned to one or another cultural area when choosing a password. For example, Epsilon793 doesn't seem like such a bad option, except this combination was in Star Trek. The seven-digit 8675309 has been seen many times because it was featured in one of Tommy Tutone's songs.

In fact, creating a strong password is a simple task; all you need to do is create a combination of random characters.

You won't be able to create a perfectly random mathematical combination in your head, but you don't have to. Exist special services, generating truly random combinations. For example, random.org can create passwords like this:

  • mvAWzbvf;
  • 83cpzBgA;
  • tn6kDB4T;
  • 2T9UPPd4;
  • BLJbsf6r.

This is a simple and elegant solution, especially for those who use password storage.

Unfortunately, most users continue to use simple weak passwords, while ignoring even the rule “ different passwords for each site." For them, convenience is more important than safety.

Situations in which a password may be at risk can be divided into 3 broad categories:

  • Random, in which a person you know tries to find out your password, based on information about you known to him. Often, such a burglar just wants to play a joke, find out something about you, or play dirty tricks on you.
  • Mass attacks, when absolutely any user of certain services can become a victim. In this case, specialized software is used. The least secure sites are selected for the attack, allowing multiple password variations to be entered in a short period of time.
  • Targeted, combining the receipt of suggestive tips (as in the first case) and the use of specialized software (as in a mass attack). Here we are talking about trying to get truly valuable information. Only a sufficiently long random password will help you protect yourself, the selection of which will take time comparable to the duration of your password.

As you can see, absolutely anyone can become a victim. Statements like “they won’t steal my password because no one needs me” are not relevant, because you can get into a similar situation completely by accident, by coincidence, without any apparent reason.

Those who have access to passwords should take password protection even more seriously. valuable information, is associated with business or is in conflict with someone on financial grounds (for example, division of property during a divorce, competition in business).

In 2009 year Twitter(in the understanding of the entire service) was hacked only because the administrator used the word happiness as a password. A hacker picked it up and posted it on the Digital Gangster website, which led to the hijacking of Obama, Britney Spears, Facebook and Fox News accounts.

Acronyms

As in any other aspect of life, we always have to make a compromise between maximum security and maximum convenience. How to find golden mean? What password generation strategy will allow you to create strong combinations that you can easily remember?

At the moment, the best combination of reliability and convenience is to convert a phrase or phrase into a password.

A set of words is selected that you always remember, and the password is a combination of the first letters of each word. For example, May the force be with you turns into Mtfbwy.

However, since the most famous ones will be used as initial ones, programs will eventually receive these acronyms in their lists. In fact, an acronym contains only letters, and therefore is objectively less reliable than a random combination of symbols.

It will help you get rid of the first problem right choice phrases. Why turn a world-famous expression into an acronym password? You probably remember some sayings that are relevant only among your close circle. Let's say you heard a very memorable phrase from a bartender at a local establishment. Use it.

And it’s still unlikely that the acronym password you generate will be unique. The problem with acronyms is that different phrases can consist of words that start with the same letters and are arranged in the same sequence. Statistically in various languages There is an increased frequency of certain letters appearing as word starters. The programs will take these factors into account, and the effectiveness of acronyms in original version will go down.

Reverse method

The solution may be the reverse generation method. You create a completely random password in random.org, and then turn its characters into a meaningful, memorable phrase.

Often services and sites give users temporary passwords, which are those perfectly random combinations. You'll want to change them because you won't be able to remember them, but if you look a little closer, it becomes obvious that you don't need to remember the password. For example, let's take another option from random.org - RPM8t4ka.

Although it seems meaningless, our brain is capable of finding certain patterns and correspondences even in such chaos. To begin with, you can notice that the first three letters in it are uppercase, and the next three are lowercase. 8 is twice (in English twice - t) 4. Look a little at this password, and you will definitely find your own associations with the proposed set of letters and numbers.

If you can memorize meaningless strings of words, then use it. Let the password turn into revolutions per minute 8 track 4 katty. Any conversion that your brain is better suited for will do.

A random password is the gold standard in information technology. It is by definition better than any human-created password.

The disadvantage of acronyms is that over time, the spread of such a technique will reduce its effectiveness, and the reverse method will remain just as reliable, even if all people on earth use it for a thousand years.

A random password will not be included in the list of popular combinations, and an attacker using a mass attack method will only find such a password using brute force.

Let's take a simple random password that takes into account upper case and numbers - that's 62 possible characters for each position. If we make the password just 8 digits, we get 62^8 = 218 trillion options.

Even if the number of attempts within a certain time period is unlimited, the most commercial specialized software with a capacity of 2.8 billion passwords per second will spend an average of 22 hours trying to find the right combination. To be sure, add only 1 to this password additional character- and it will take many years to crack it.

A random password is not invulnerable, as it can be stolen. There are many options, ranging from reading input from a keyboard to a camera over your shoulder.

A hacker can attack the service itself and obtain data directly from its servers. In this situation, nothing depends on the user.

Single reliable basis

So, we got to the main point. What tactics to use using a random password in real life? From the point of view of balance and convenience, the “one strong password philosophy” will work well.

The principle is that you use the same basis - a super-secure password (its variations) on the services and sites that are most important to you.

Anyone can remember one long and complex combination.

Nick Berry, Issues Consultant information security, allows the use of this principle, provided that the password is very well protected.

The presence of malware on the computer from which you enter the password is not allowed. It is not allowed to use the same password for less important and entertainment sites - more than that will suffice for them. simple passwords, since hacking an account here will not entail any fatal consequences.

It is clear that a reliable foundation needs to be modified somehow for each site. As a simple option, you can add one letter at the beginning to end the name of the site or service. If we go back to that random password RPM8t4ka, then for authorization on Facebook it will turn into kRPM8t4ka.

An attacker who sees such a password will not be able to understand how the password to your account is generated. Problems will start if someone gets access to two or more of your passwords generated this way.

Secret Question

Some hijackers ignore passwords altogether. They act on behalf of the account owner and simulate a situation where you forgot your password and want it for a security question. In this scenario, he can change the password at his own request, and the true owner will lose access to his account.

In 2008, someone gained access to e-mail Sarah Palin, governor of Alaska, and at that time also a candidate for US president. The burglar answered the secret question, which sounded like this: “Where did you meet your husband?”

After 4 years, Mitt Romney, who was also a US presidential candidate at the time, lost several of his accounts on various services. Someone answered the security question about the name of Mitt Romney's pet.

You've already guessed the point.

You cannot use public and easily guessable data as a secret question and answer.

The question is not even that this information can be carefully extracted from the Internet or from close associates. Answers to questions in the style of “animal name”, “favorite hockey team” and so on are perfectly selected from the corresponding dictionaries of popular options.

As a temporary option, you can use the tactic of an absurd response. Simply put, the answer should have nothing to do with secret question. Mother's Maiden Name? Diphenhydramine. Pet name? 1991.

However, such a technique, if it becomes widespread, will be taken into account in the relevant programs. Absurd answers are often stereotypical, that is, some phrases will appear much more often than others.

In fact, there is nothing wrong with using real answers, you just need to choose the question wisely. If the question is non-standard, and the answer to it is known only to you and cannot be guessed after three attempts, then everything is in order. The benefit of a truthful answer is that you won't forget it over time.

PIN

Personal Identification Number (PIN) is a cheap lock that our . No one bothers to create a more reliable combination of at least these four digits.

Now stop. Right now. Right now, without reading the next paragraph, try to guess the most popular PIN code. Ready?

Nick Berry estimates that 11% of the US population uses the combination 1234 as a PIN code (where it is possible to change it yourself).

Hackers do not pay attention to PIN codes because without the physical presence of the card the code is useless (this can partly justify the short length of the code).

Berry took lists of passwords that appeared after leaks on the network, which were combinations of four numbers. Most likely, the person using the password 1967 chose it for a reason. The second most popular PIN is 1111, with 6% of people preferring this code. In third place is 0000 (2%).

Let's assume that the person who knows this information has someone else's information in their hands. Three attempts before the card is blocked. Simple math allows you to calculate that this person has a 19% chance of guessing the PIN if he enters 1234, 1111 and 0000 in sequence.

This is probably why the vast majority of banks set PIN codes for issued plastic cards yourself.

However, many protect smartphones with a PIN code, and here the following popularity rating applies: 1234, 1111, 0000, 1212, 7777, 1004, 2000, 4444, 2222, 6969, 9999, 3333, 5555, 6666, 1313, 8888, 4321, 2001, 1010.

Often the PIN represents a year (year of birth or historical date).

Many people like to make PINs in the form of repeating pairs of numbers (and pairs where the first and second digits differ by one are especially popular).

Numeric keyboards of mobile devices display combinations like 2580 at the top - to type it, just make a straight pass from top to bottom in the center.

In Korea, the number 1004 is consonant with the word "angel", which makes this combination quite popular there.

Bottom line

  1. Go to random.org and create 5-10 candidate passwords.
  2. Choose a password that you can turn into a memorable phrase.
  3. Use this phrase to remember your password.

The Internet is a wide network that unites hundreds of thousands of resources, sites, services and forums.

Every day many users come there, each of whom needs to be identified and designated for ease of interaction.

Even at the time of its inception World Wide Web For this purpose, special questionnaires were used - profiles.

For them, each user, in addition to his personal data, selected a login and password.

Thanks to this information, he made his page unique and thus identified himself with it.

What it is?

Relatively speaking, Login is yours unique identificator, by which the system and users recognize you.

In most forums, your login is also your nickname - a nickname that is displayed as a display of the author of the message or post. This part of the profile should be unique for each visitor.

A password is a code phrase that, if entered correctly, the system will recognize you and transfer you to your forum or website profile.

Everyone has their own password, but they can be the same or similar to each other.

What is it for?

This data gives you full access to a profile - a page on a website or forum where information about you is listed and with which you can comfortably conduct a dialogue.

Having a login and password ensures that no one other than the account owner will be able to access and use it.

This is especially true for payment systems whose profiles store personal information. important information by wallets and cards.

In them, a login and password are simply required - otherwise this data will in fact be freely available.

In other words, account login information is needed to prevent its use by attackers.

How to create a login and password correctly

Since the capabilities of many sites have now increased significantly, users have to leave more and more more information About Me.

In order to prevent it from falling into third hands, it is very important to correctly set the data - come up with unique name and, more importantly, create complex password, which cannot be picked up.

All this happens during the registration process, where in the special Login and Password columns you will be required to write the necessary information.

The last thing you need to think about is the username - set what you want.

The most important thing is that it does not overlap with other users - in which case the system itself will say that the name is taken.

With a password, things are a little more complicated.

Here are some tips that can help you create code words:

  1. In addition to the obvious Latin alphabet, try to use letters of different case, as well as numbers. This will significantly complicate the password, making the spread of characters wider and more difficult to crack.
  2. Even better if in the code word different symbols will not go in a row. Try to use as few identical letters and symbols as possible to make the password more difficult to guess.
  3. Try to keep the number of characters from 6-8. This optimal quantity, which cannot be hacked or picked up without using special programs.
  4. Do not use standard combinations of letters and numbers - type qwerty1234 or 1234qwerty. Despite the fact that these are complex combinations in appearance, they are among the first to be tested. Ideally, the password should be a phrase or word without repeated letters, several capitals, and several numbers.
  5. For better memorization, you can use the names of your favorite books, groups or authors as keywords. If you also add numbers, it will be very difficult to hack.

It is worth saying that most modern sites are equipped with a password complexity diagnostic function.

What does it mean? In a special window they will show you its complexity and give recommendations if keyword turned out to be too simple.

Most often, registration simply will not complete if it does not have a sufficient level of complexity - and therefore you will have to add capital letters and numbers.

How to protect yourself from data theft

Of course, it is not enough just to invent complex login and password. There are a lot of ways to steal data from your computer - so it’s worth thinking about some kind of security precautions.

These rules are simple and must be followed, especially if you are dealing with social networks and accounts from virtual wallets and mobile banks:

  1. Never give your information to anyone. Even if the person who asks for them introduces himself as the forum administrator. To solve most problems, the administrator does not require any data, so there is a high probability that you are dealing with a scammer.
  2. By analogy with the previous point, do not enter data anywhere other than the forum to which it belongs.
  3. Keep a close eye on what gets into and runs on your computer. Download files only from trusted places, and if the antivirus shows the presence malware in an archive or distribution - it is better to delete it. Since passwords are most often stolen through hidden programs– install licensed games and software purchased or downloaded from reliable sources.
  4. Try not to enter your data on other computers, and if this happens, be sure to exit from there as soon as you finish the session. This way you will protect not only your social media from the humor of friends, but also the theft of data from . Try not to log into important profiles anywhere other than your own home.
  5. Enable the additional authentication feature. On many forums, to log into your profile from a new device you now need to enter a code that comes to mobile phone. If you enable this function, your account will always be safe, since to enter it, attackers will have to steal your mobile phone and enter a code.

Examples of complex and simple passwords

Below are code words, and small explanations - why they are considered complex or simple:

A codeword Simple/complex
Qwerty1234 Even though it has everything you need for complex code is a simple password. It consists of the first letters on the keyboard and the first four numbers. It is very common, and the first thing they check when hacking accounts is this combination.
TheCure12 This is a complex combination because it does not have identical symbols, and also has enough letters and numbers to make the hack take a long time.
123454321 A simple password that is easy to guess even without using special programs. Most likely, the system inside the forum will not even let it through.
Swallow22 Oddly enough, this is also a simple cipher. It has many repeating symbols, which makes it easy for a special program to match.
ForAllMankind Despite the fact that in this version passphrase there are no numbers, this is - difficult option. The password is a whole phrase with only two repeated letters. It will be very difficult and time consuming to find; the only way to find it out is to use programs that read keystrokes or the browser cache.
helping This is a simple password because it has only one case of letters, a simple word, and there are no numbers. Most likely, it will not even be missed during registration. We need to make it more complex.

We hope that with these examples and tips, you have a better understanding of how important it is to come up with a good username and strong password.

The most important thing to remember is that the security of personal data on the Internet comes first!