Open
Close

Complex spankings. How to come up with a complex password that is easy to remember? How to come up with a strong password

Only at first glance, impenetrable passwords do not contain a logical structure and look like gobbledygook. Complex passwords are such only for those who do not know the recipe for creating them. You don't have to remember letter cases, numbers, special characters and their order. All you have to do is choose a memorable one and follow simple tips for creating strong passwords.

Nursery rhymes

We take any children's rhyme or counting rhyme as the basis for the password. It is advisable that it be found only in your area and not be generally known. And better than your own composition! Although any children's rhymes will do, the main thing is that the lines are firmly stuck in your head from a young age.

The password will consist of the first letters of each word. Moreover, the letter will be written in uppercase if it is the first in the sentence. We replace some letters with numbers similar in spelling (for example, “h” with “4”, “o” with “0”, “z” with “3”). If you don’t want to get too confused with replacing letters with numbers, look for a counting rhyme that already contains numbers. Don't forget about punctuation marks that separate words and sentences - they will come in handy.

Example:

The turtle has its tail between its legs

And she ran after the hare.

Got ahead

Who doesn't believe it - come out!

We replace the letters “h”, “z” and “o” with similar numbers. The second, third and fourth lines begin with capital letters and are therefore written in uppercase. Include four punctuation marks. Of course, we write in Russian letters, but on the English keyboard layout.

The 17-character password is ready! It may not be perfect because it contains repeated characters and consecutive lowercase letters and numbers. But it would certainly be hard to call it simple.

Favorite sayings

The scheme is similar to children's counting rhymes. Only as a basis you take your favorite and very memorable phrases of thinkers, celebrities or movie characters. You can complicate your life somewhat by replacing the letter “h” not with “4”, but with “5”, for example. There are never too many confusing maneuvers!

Example:

I found out that I have

There is a huge family:

River, field and forest,

In the field - every spikelet...

Replace the letter “h” with “8”, do not forget about upper case and punctuation marks.

Ze,8evTjc^H,g,bk,Dg-rr…

Jargon and terminology

This implies the use of professional jargon that is understandable to an extremely narrow number of people. These words are much more distant from the average person than the criminal sayings that are widely covered on television and the streets of any city.

For example, you can use a hospital discharge or a tricky medical definition.

Example:

Cyclopentaneperhydrophenanthrene is a 28-letter term. It turns out to be a bit long, so I propose to throw out the vowels and dilute the remaining consonants with upper case.

Memorable dates

Of course, your birthday or the day you start your married life is not the best basis for a password. The event should be of exceptional importance, and only you should know about it. For example, this could be the day you ate gum for the first time, ran away from class, or broke your heel. Since the password will be based on numbers, it would be a good idea to mix them with letters.

Example:

10/22/1983 and 06/16/2011

Replace the dots separating the day, month and year with any letter, for example the small English “l”, which is very similar to the quite often used separator “/”. Between dates we will put an underscore character “_”. Let's replace the zeros with the letters "o".

Visual Key

Use the smartphone unlocking technique on your keyboard as well. Think of any shape and “slide” your finger along its contours.

Don't forget to go through the numbers, change the horizontal and vertical direction of movement. And, unlike me, be imaginative!

Conclusion

The proposed methods for creating a password that is memorable, but at the same time quite difficult to understand, can be changed and combined at your discretion. It is enough to think about your super password once, and you can use it in the presence of a stranger without fear.

How do you choose your password?

Hello my dear readers!

Frightened by “horror stories” that evil hackers can crack the password of anything, the poor little user feverishly begins to go through all his passwords and wonder: will they crack it or not...

At one time I asked myself the question: how to create a strong password for all my services for which I am registered? Is this even possible?

How do burglars operate?

First, let's think about how the hacking process occurs. In general, there are several main ways for an attacker:

  • look at the paper, on which all passwords are written. Surprisingly, many users still keep a sticker glued to their monitor, on which is written the password so treasured by the attacker. As they say, no comments...
  • brute force. Simply put, the usual enumeration of all possible options. As we often see in films: a special program finds the required password with lightning speed (or not quite lightning speed). In reality, this is practically impossible. If the password is crypto-resistant, that is, it consists of a sufficiently large number of characters and contains capital letters and numbers, selecting it can take a lot of time;
  • obtaining remote access to the user's machine and viewing all the necessary information on it, including cookies and special administration files. Again, movie techniques don't work here.
    Gaining full access to a specific computer is not such an easy task and requires a certain approach to solving it. If your data is not particularly valuable, it is unlikely that a hacker will waste his precious time on your computer;
  • keyloggers– keyboard interceptors. They are especially often used to gain access to payment information. Fortunately, the famous Kaspersky antivirus has a virtual keyboard in its arsenal. So it’s impossible to track keystrokes: there is simply no pressing;
  • viruses. The advice here is this: don’t go where you don’t need it, and don’t download what you don’t need. And if you do download, then install a good antivirus on your computer and trust in its power;
  • regarding mobile platforms, then most often they use either the same brute force or the method of intercepting packets over encrypted network channels.

A few rules for creating a strong password

So it's not all that bad. Nevertheless, almost every one of us has probably encountered the fact that his account on VKontakte or on a forum was “hacked”, or even Odnoklassniki sounded the alarm... As a rule, this happens due to the simplicity of the password itself. There are special programs that already “know” standard sets of passwords and generate their variations.

You can, of course, randomly run your fingers over the keys, “generating” a password. Alas, even in this case, the algorithms of hacker programs select all possible options, albeit not very quickly.

I advise you to permanently abandon passwords that are a repetition of your login. Fortunately, many services do not allow the user to set such a password at all. But social networks use either a mobile phone number or an email address as a login. This makes life much easier for the attacker.

And God forbid you from the names of animals, children, parents and dates of birth! Such passwords can be hacked by people even from close circles.

Some time ago I used a method I personally invented. Only later did I find out that I was not the only one so smart. Its essence lies in the fact that some phrase in Russian is invented. For example, “This password is strong.” And then the keyboard switches to the Latin layout and the same is entered, but without spaces. It turns out: “”njngfhjkmyflt;ysq”. Is this method a good one? Not really. Smart hacker algorithms have long been aware of this method.

But in general there are only three requirements for passwords:

  1. more signs. 8 – good, 12 – even better, 16 – great;
  2. Be sure to use numbers. Moreover, both in the middle and at the end of the password;
  3. alternate between capital letters and regular letters. And exactly the same - in the middle and at the end.

Password generators

I also tried special services - both online and separate applications. Last Pass, for example, or here’s another: RandStuff, Password Generator and a bunch of services with the simple name “Password Generator”.

At first glance, they are all really capable of generating a random set of characters and numbers. But this is only at first glance random. An experienced programmer knows that there is no truly random generator; they all work according to certain algorithms. I won’t lie that this is exactly the case, but I suspect two things:

  • knowing the algorithm by which passwords are generated, it will not be difficult for a hacker program to trace this algorithm in the opposite direction;
  • Some of these programs and services, oddly enough, are used specifically for hacking. The generated password is saved somewhere in a cache or in a cookie. And, perhaps, it goes straight to the attacker’s car.

Therefore, it is necessary to use only proven programs with an excellent reputation!

Now the choice is yours: use special programs or come up with complex passwords yourself. But under no circumstances store them on paper. Better create a file and save it on the cloud. By the way, other services also provide excellent cloud storage.

Want to know all the computer secrets? How about learning to communicate with a computer on a first-name basis? In this case, you can order a multimedia training course “ Computer genius“, everything will be explained there in the most accessible language and - most importantly - they will clearly show how to apply the acquired knowledge in practice.

Be sure to share the link to this material with your friends via social media. networks so that they do not become victims of attackers. Don't forget to subscribe to the blog update mailing list, which will notify you when a new article is edited. Be careful, see you soon!

Sincerely! Abdullin Ruslan

The Internet is a wide network that unites hundreds of thousands of resources, sites, services and forums.

Every day many users come there, each of whom needs to be identified and designated for ease of interaction.

Even at the time of the birth of the World Wide Web, special questionnaires were used for this - profiles.

For them, each user, in addition to his personal data, selected a login and password.

Thanks to this information, he made his page unique and thus identified himself with it.

What it is?

Relatively speaking, Login is your unique identifier by which the system and users recognize you.

In most forums, your login is also your nickname - a nickname that is displayed as a display of the author of the message or post. This part of the profile should be unique for each visitor.

A password is a code phrase that, if entered correctly, the system will recognize you and transfer you to your forum or website profile.

Everyone has their own password, but they can be the same or similar to each other.

What is it for?

This data gives you full access to your profile - a page on a website or forum where information about you is listed and with which you can comfortably conduct a dialogue.

Having a login and password ensures that no one other than the account owner will be able to access and use it.

This is especially true for payment systems whose profiles store personal important information on wallets and cards.

In them, a login and password are simply required - otherwise this data will in fact be freely available.

In other words, account login information is needed to prevent its use by attackers.

How to create a login and password correctly

Since the capabilities of many sites have now increased significantly, users have to leave more and more information about themselves.

To prevent it from falling into third hands, it is very important to set the data correctly - come up with a unique name and, what is much more important, create a complex password that cannot be guessed.

All this happens during the registration process, where in the special Login and Password columns you will be required to write the necessary information.

The last thing you need to think about is the username - set what you want.

The most important thing is that it does not overlap with other users - in which case the system itself will say that the name is taken.

With a password, things are a little more complicated.

Here are some tips that can help you create code words:

  1. In addition to the obvious Latin alphabet, try to use letters of different case, as well as numbers. This will significantly complicate the password, making the spread of characters wider and more difficult to crack.
  2. It is even better if different characters in the code word do not appear in a row. Try to use as few identical letters and symbols as possible to make the password more difficult to guess.
  3. Try to keep the number of characters from 6-8. This is the optimal amount that cannot be hacked or picked up without using special programs.
  4. Do not use standard combinations of letters and numbers - type qwerty1234 or 1234qwerty. Despite the fact that these are complex combinations in appearance, they are among the first to be tested. Ideally, the password should be a phrase or word without repeated letters, several capitals, and several numbers.
  5. For better memorization, you can use the names of your favorite books, groups or authors as keywords. If you also add numbers, it will be very difficult to hack.

It is worth saying that most modern sites are equipped with a password complexity diagnostic function.

What does it mean? In a special window you will be shown its complexity and given recommendations if the keyword turns out to be too simple.

Most often, registration will simply not complete if it is not of sufficient complexity - and therefore you will have to add capital letters and numbers.

How to protect yourself from data theft

Of course, it’s not enough to just come up with a complex username and password. There are a lot of ways to steal data from your computer - so it’s worth thinking about some kind of security precautions.

These rules are simple and must be followed, especially if you are dealing with social networks and accounts from virtual wallets and mobile banks:

  1. Never give your information to anyone. Even if the person who asks for them introduces himself as the forum administrator. To solve most problems, the administrator does not require any data, so it is highly likely that you are dealing with a scammer.
  2. By analogy with the previous point, do not enter data anywhere other than the forum to which it belongs.
  3. Keep a close eye on what gets into and runs on your computer. Download files only from trusted places, and if the antivirus shows the presence of malware in the archive or distribution, it is better to delete it. Since passwords are most often stolen through hidden programs, install licensed games and software purchased or downloaded from reliable sources.
  4. Try not to enter your data on other computers, and if this happens, be sure to exit from there as soon as you finish the session. In this way, you will protect not only your social networks from the humor of your friends, but also the theft of data from . Try not to log into important profiles anywhere other than your own home.
  5. Enable the additional authentication feature. On many forums, to log into your profile from a new device you now need to enter a code that is sent to your mobile phone. If you enable this function, your account will always be safe, since to enter it, attackers will have to steal your mobile phone and enter a code.

Examples of complex and simple passwords

Below are the code words, and a little explanation of why they are considered complex or simple:

A codeword Simple/complex
Qwerty1234 Even though it has everything you need for a complex code - it's a simple password. It consists of the first letters on the keyboard and the first four numbers. It is very common, and the first thing they check when hacking accounts is this combination.
TheCure12 This is a complex combination because it does not have identical symbols, and also has enough letters and numbers to make the hack take a long time.
123454321 A simple password that is easy to guess even without using special programs. Most likely, the system inside the forum will not even let it through.
Swallow22 Oddly enough, this is also a simple cipher. It has many repeating symbols, which makes it easy for a special program to match.
ForAllMankind Even though this version of the passphrase does not have numbers, it is a complex option. The password is a whole phrase with only two repeated letters. It will be very difficult and time consuming to find; the only way to find it out is to use programs that read keystrokes or the browser cache.
helping This is a simple password because it has only one case of letters, a simple word, and there are no numbers. Most likely, it will not even be missed during registration. We need to make it more complex.

We hope that with these examples and tips, you have a better understanding of how important it is to come up with a good username and strong password.

The most important thing to remember is that the security of personal data on the Internet comes first!

Computer security experts from the University of Cambridge analyzed the structure of more than 70 million passwords. And they found out that the most complex passwords in the world are made by users from Germany and Korea. Moreover, they do it naturally and naturally, without special training. And the secret of the stability of combinations lies in the specifics of their language. They use the same Latin symbols, the same numbers, but take as a basis their native “difficult” words - names, toponyms, terms, etc. For example, Annaberg-Buchholz#122. It’s easy to come up with and remember these options, but choosing them is much more difficult compared to vocabulary words in other languages.

If you, dear reader, do not know Korean or German, this, of course, does not mean that you should ignore complex passwords. They are the key to the security of your data on the Internet (in online payment systems, on websites, forums). This article will tell you what the key requirements for accessing your account must be (what it should be) and how to create it.

Definition of Difficulty

Key complexity is a measure of resistance to selection at the symbolic level using manual and automated methods (logical calculation, dictionary selection). It is determined by the number of attempts the cracker makes, that is, how much time it will take him to calculate the combination compiled by the user.

The following factors affect password complexity:

  • The number of characters in the key. The more characters in the sequence, the better. A combination of 5 characters has a high probability of being hacked quickly. But selecting a sequence of 20 characters can take years, decades and even centuries.
  • Alternating uppercase and lowercase letters. Examples: the dfS123UYt key using capital letters is an order of magnitude more complex than the same combination, but only with small letters - dfs123uyt.
  • Character sets. A variety of symbol types enhances stability. If you make a key from small and large letters, numbers and special characters 15-20 characters long, there is practically no chance of finding it.

How to make stable combinations?

The following methods will help you come up with a very complex symbolic key that is easy to remember.

1. Visually create the contours of a geometric figure or any object on your computer keyboard. And then type the characters along which the lines go.

Attention! Avoid simple “designs” - lines, squares or diagonals. They are easy to predict.

2. Make up a complex sentence that defies logic. In other words, some pun:

For example: Vaska the cat caught a pike on Jupiter.

Then take the first 2-3 letters of each word from the made-up sentence:
Cat + Va + Na + Yup + st + pike

Type the syllables in Latin letters:
Rjn + Df + Yf + >g + ek + oer

After transliteration, insert between the syllables some numbers that are familiar to you: date of birth, height, weight, age, last or first digits of a telephone number.
Rjn066Df 45Yf 178>g 115ek1202oer

That's all! As you can see, it turned out to be a rather “strong” combination. To remember it quickly, you only need the key (pun sentence) and the numbers used.

3. Take 2 memorable dates as a basis. For example, two birthdays (yours and your loved one).
12.08.1983 05.01.1977

Separate the date, month and year with some special characters:
12|08/1983|05\01|1977

Now replace the zeros in the dates with a small letter “o”.
12|o8/1983|o5\o1|1977

It turns out to be a rather intricate key.

4. Make a special table: place Latin letters and numbers vertically and horizontally of the matrix, and symbols in the rows and columns in a chaotic order.

To generate a key, take a few simple words written in English letters, for example, my password very strong

Take the first pair of letters. In our case it is “my”. Find “m” in the vertical list and “y” in the horizontal list. At the intersection of the lines you will receive the first character of the password.

In the same way, using the following pairs, find the remaining symbols of the key.

If you forget your password, use a simple keyword and table to recover it.

How to check password strength?

The resistance of a symbol combination to selection can be found out on special web services. Let's consider the most popular:

Online service from Kaspersky antivirus laboratory. Determines, based on the character set and length of the key, how long it will take to crack it on different computers. After analyzing the sequence, the statistics display the time for searching on the ZX-Spectrum (the legendary 8-bit machine of the 80s), Mac Book Pro (2012 models), the Tianhe-2 supercomputer and the Conficker botnet network.

An online utility on the huge service portal 2IP.ru. After sending the key to the server, it displays its status (trusted, unreliable) and the time spent on cracking it.

Any person who uses the Internet has probably more than once encountered the need to come up with and set passwords: for logging into mail, for an account on a forum, for online banking. And in almost every registration form you are advised to come up with a strong password. After all, the confidentiality of your correspondence, the safety of your funds, and the security of your computer as a whole depend on how complex your secret word or phrase is. The question arises: how to come up with a complex password?

How to come up with a strong password

Length. The recommended minimum length for a strong password is 8 characters. It is believed that cracking passwords of 8 or more characters by guessing is a too long process and the chances of an attacker finding such a combination are too small.

Register. A good password should contain both lowercase and uppercase letters.

Special characters. An extremely secure password, along with letters and numbers, also contains special characters. For example #, ~,+, _

In total, the ideal option would be a combination of upper and lower case Latin letters, numbers and special characters with a total length of at least 8 characters. For example:

uE_xm932
9203Jb#1
29Rtaq!2

Which should never be used as a password

Never use: as a password or secret word:

  • dates of birth
    The biggest stupidity is to set your own date of birth in the format 12071992 as a password for your VKontakte page, where the same date is indicated in the information :)
  • phone numbers
    A password consisting of your phone number will not be cracked only by the lazy. And here it doesn’t matter how many numbers there are :)
  • names, surnames, animal names
    It's funny when people consider a mother's maiden name to be a magically reliable protection. ...which the whole yard has known for 50 years :)
  • and of course, all sorts of nonsense like “qwerty123”, “password”, “password”, “********”, “123”, “12345678”, “fyva”, “asdf”, etc. By the way, the leader among secretaries’ passwords is “one”, i.e. one single digit “1” :)

Conclusion

In conclusion, I want to say - do not neglect your safety. Do not use the same secret words for authorization on different sites and services, no matter how complex and reliable they may be. If you have one password for everything, everywhere, then by hacking one site, attackers can gain access to all your online accounts, which means they can see information on yours, use saved credentials in the browser and other information. And remember: there is nothing more permanent than temporary. Therefore, do not be lazy to come up with strong combinations and set complex passwords straightaway- don’t put this matter off for later. Let your information be available only to you! Good luck!