Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Can I Guess Your Password? > NetSparsh - Viral Content you Love & Share

Can I Guess Your Password?

We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?

But of course remembering all the different passwords can be a headache. And writing them down somewhere isn't a great deal safer than using the same password again and again.

You can buy software that stores the passwords for you, but do you really want to pay money for another piece of software that performs a solitary function?

Try this simple, two-step, technique that lets you generate an infinite number of passwords, without having to remember any of them.

Step One: Choose a 4-6 letter word or number sequence that you can remember easily. Needless to say, don't reveal this to anyone. For the purpose of this demonstration, I'll choose the word "cash"

Step Two: Apply this secret word or number sequence to the name of the program you are setting up the password for.

To accomplish this, invent a couple of easy to remember rules.

Rule 1: Decide which part of the program name you are going to use. It could be the whole name, the first 6 letters of the name, the last 8 letters of the name. It's totally up to you, be as creative as you like.

eg ? For the program TrafficSwarm, I might choose the first 8 letters of the name. This give me: "traffics"

Rule 2: Take the portion of the program name you have selected and merge it with your secret word or number sequence to create a unique password. Again, be as creative as you can with this rule. You could replace every second letter, every third letter, every vowel or every consonant.

eg ? If I replace every second letter of "traffics" with my secret word "cash", I get " t c a a f s c h "

or

- If I replace every vowel of "traffics" with my secret word "cash", I get " t r c f f a c s ". The "s" and the "h" are not used as "traffics" has only two vowels, but some words will use all four letters of "cash". Some words might have more than four vowels, in which case just start back at the beginning with "c" and "a" and so on?

You don't have to worry about making your rules overly complex. Even the best code-breakers would need to see several of your passwords before they could start to guess what you rules are.

As long as you keep your rules safe and sound, your password is secure. But the real beauty of this system, is that you don't have to remember the passwords you create. You ONLY have to remember the rules.

When you log into the program the next time, just apply your rules to the program name, and you can work out what password you generated. Once you have been using the rules for a while, you'll generate the password in your head, without even having to pause.

Don't worry if it seems a little complicated at first. Read this article through a couple more times and then try this technique with just a couple of programs. Once you are happy with it, all that's left to do is to start working your way through existing programs and update your passwords. It's time consuming, but for peace of mind you'll be glad you did.

David Congreave is owner of The Nettle Ezine, the newsletter for the home business -- online. David lives in Leeds, in the United Kingdom, with his wife Leanne.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

NPR

Week Of Trump Reversals Puts 2018 Election Security In The Spotlight
NPR
With less than four months to go, how much are this year's midterm elections at risk for the kind of interference sowed by Russia in 2016? It's a question that's coming up again because of President Trump's seemingly shifting positions this week about ...
As the national security elite gather in Aspen, the subject is, of course, TrumpWashington Post
DHS chief won't denounce white supremacist charged with Charlottesville killingNew York Post
Kirstjen Nielsen, head of Homeland Security, says she doesn't think Vlad's hackers tried to make Trump winNew York Daily News
VICE News -Office of the Director of National Intelligence
all 134 news articles »

TechCrunch

UK government panel issues inconclusive Huawei security report
TechCrunch
Huawei's had a rough go of it here in the States, after concerns around ties to the Chinese government have left the company scrambling to gain a commercial toehold. Over the past several years, top U.K. security officials have also put the company ...
UK cybersecurity agency finds new low-risk concerns with Huawei's security centreZDNet
UK security officials warn of 'new risks' from HuaweiCNNMoney
UK oversight board discloses potential Huawei security issuesEngadget
TechRadar -Reuters -Caixin Global -Gov.uk
all 77 news articles »

The Fundamental Flaw in Security Awareness Programs
Dark Reading
Most security awareness programs are at best gimmicks that will statistically fail at their goal. They intend to educate people so that they can make better decisions regarding how to behave or whether they are being conned. The programs intend to get ...


The Verge

Wyze's $20 connected security camera now supports Amazon Alexa
The Verge
The $20 Wyze Cam security camera may not be the best option out there for a connected home security device, but it's certainly the cheapest. And now it's getting even more useful with an update that adds support for Amazon's Alexa voice assistant, via ...


Newsweek

White Owner of Detroit Clothing Store Spits in Black Security Guard's Face
Newsweek
The co-founder of a store in Detroit has issued an apology for spitting in a black security guard's face during an event. Ibrahim Mission told The Detroit Free Press that he was working security for a meeting of community and social justice leaders on ...
'Made in Detroit' brand co-founder recorded spitting in face of ...New York Daily News
White Detroit Business Owner Spits on Black Man Working Security ...The Root
White Detroit Mercantile owner under fire for spitting on young black man over parking disputeDetroit Metro Times

all 10 news articles »

Forbes

Financialize Everything: Security Tokens And Network Effects
Forbes
The age of the Security Token has arrived. The rebranding effort has recently been in full force - Swarm announced its intention to tokenize private shares of companies like Coinbase and Robinhood, the Security Token Summit in New York declared ...


TechCrunch

Cloudflare recruits state and local governments for free election site ...
TechCrunch
After launching a free program to protect election systems last December, Cloudflare has an update on how things are going. The program, known as the ...

and more »

Roadside bomb targeting security convoy wounds 6 in Pakistan
Tampabay.com
QUETTA, Pakistan (AP) — Pakistani police say a roadside bomb has exploded near a security convoy in the country's southwest, wounding at least six people. Local police official Mohammad Hakim says Friday's bombing also damaged 10 shops in the busy ...

and more »

Tampabay.com

Activists camp out in protest at Tampa's Homeland Security, ICE offices
Tampabay.com
Approximately 25 local activists gathered next to Cypress Drive in front of the local Department of Homeland Security and ICE office with cardboard signs, tents and determination to stay until their demands are met, organizers say. "We are here because ...

and more »

Wall Street Journal

Wilbur Ross: 'Too Early to Say' Whether National Security Probe Will Bring Auto Tariffs
Wall Street Journal
The Commerce Department hearings are part of an investigation launched in May into whether the Trump administration can use a 1962 national-security law to impose duties on foreign-sourced cars and car parts. The Trump administration's hard line has ...
Automakers push back on proposed tariffs, saying there is no evidence imports affect national securityCNBC

all 243 news articles »
Google News

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More