Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Can I Guess Your Password? > NetSparsh - Viral Content you Love & Share

Can I Guess Your Password?

We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?

But of course remembering all the different passwords can be a headache. And writing them down somewhere isn't a great deal safer than using the same password again and again.

You can buy software that stores the passwords for you, but do you really want to pay money for another piece of software that performs a solitary function?

Try this simple, two-step, technique that lets you generate an infinite number of passwords, without having to remember any of them.

Step One: Choose a 4-6 letter word or number sequence that you can remember easily. Needless to say, don't reveal this to anyone. For the purpose of this demonstration, I'll choose the word "cash"

Step Two: Apply this secret word or number sequence to the name of the program you are setting up the password for.

To accomplish this, invent a couple of easy to remember rules.

Rule 1: Decide which part of the program name you are going to use. It could be the whole name, the first 6 letters of the name, the last 8 letters of the name. It's totally up to you, be as creative as you like.

eg ? For the program TrafficSwarm, I might choose the first 8 letters of the name. This give me: "traffics"

Rule 2: Take the portion of the program name you have selected and merge it with your secret word or number sequence to create a unique password. Again, be as creative as you can with this rule. You could replace every second letter, every third letter, every vowel or every consonant.

eg ? If I replace every second letter of "traffics" with my secret word "cash", I get " t c a a f s c h "


- If I replace every vowel of "traffics" with my secret word "cash", I get " t r c f f a c s ". The "s" and the "h" are not used as "traffics" has only two vowels, but some words will use all four letters of "cash". Some words might have more than four vowels, in which case just start back at the beginning with "c" and "a" and so on?

You don't have to worry about making your rules overly complex. Even the best code-breakers would need to see several of your passwords before they could start to guess what you rules are.

As long as you keep your rules safe and sound, your password is secure. But the real beauty of this system, is that you don't have to remember the passwords you create. You ONLY have to remember the rules.

When you log into the program the next time, just apply your rules to the program name, and you can work out what password you generated. Once you have been using the rules for a while, you'll generate the password in your head, without even having to pause.

Don't worry if it seems a little complicated at first. Read this article through a couple more times and then try this technique with just a couple of programs. Once you are happy with it, all that's left to do is to start working your way through existing programs and update your passwords. It's time consuming, but for peace of mind you'll be glad you did.

David Congreave is owner of The Nettle Ezine, the newsletter for the home business -- online. David lives in Leeds, in the United Kingdom, with his wife Leanne.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

Yahoo Finance

Facebook scandal puts spotlight on top security officers
Yahoo Finance
For chief security officers, the paycheck may be huge, but when a company runs into a security scandal, they can be one of the first to go. The issue came to the foreground after reports surfaced earlier this week that Facebook Chief Information ...

and more »


The Best Security Camera for Most People - Gizmodo
Now that the world is so full of uncertainty, you might consider buying a wireless security camera. They're cheaper and easier-to-use than ever, and some even have mind-bending features like facial recognition. There are also about a million options to ...

and more »

New York Times

Does Facebook's Green 'BFF' Prove Your Account is Secure?
A Facebook status update meme claims that a green "BFF" in typed comments is an indicator of account security; it isn't. Ink Drop / 1K. CLAIM. You can determine whether your Facebook account is secure by typing "BFF" to see if it ...
The End for Facebook's Security EvangelistNew York Times
Security alert over at Cambridge Analytica's London HQReuters
Facebook chief security officer reportedly resigns amid data controversyMarketing Land
WIRED -The Verge -New York Times -The Guardian
all 7,873 news articles »


Lawmakers gather behind election security bill — at last
Senior Republicans and Democrats will come together on Thursday to stump for a revised version of a stalled election security proposal that has gained new momentum in recent days. The measure has now gathered enough backing from high-level lawmakers ...


Congress Set To Approve Nearly $700 Million For Election Security, Source Says
Updated at 5:57 p.m. ET. Swing states, and even individual precincts within those states, present a significant point of vulnerability when it comes to the threat of election interference because of their potential to impact the result in a ...
Efforts to Secure Elections Moving Too Slowly, Senators Tell ...New York Times

all 2 news articles »

Bill would let schools use technology funds for security
Under current law, the fund can be used for repairs and deferred maintenance, classroom instructional support, insuring facilities, transportation and education technology and equipment. Rep. Bill Poole, D-Tuscaloosa, the House education budget ...

and more »


Facebook's Data Security Meltdown Could Bolster Blockchain: Analyst
The social media giant shouldn't mistake the forest for the trees. While Facebook continues to reel from a security breach involving the personal data of tens of millions of users, they may just have demonstrated the value of an unalterable public ...
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin - Financial Cryptography 2018Financial Cryptography 2018

all 327 news articles »

Trump names Bolton national security adviser, replacing McMaster
President Donald Trump's national security adviser Lt. Gen. H.R. McMaster will resign and be replaced by John Bolton, the New York Times first reported late Thursday. Sources told the Times that McMaster will retire from the military and that his ...

The Verge

Twitter's chief information security officer is leaving the company ...
The Verge
Twitter's chief information security officer is leaving the company, sources familiar with the matter have told The Verge. Michael Coates, who joined the company in January 2015, is quitting to start his own company, sources said. Coates announced the ...
Twitter's Chief Information Security Officer DepartsBloomberg
Twitter security chief Michael Coates is leaving to launch a startupBusiness Insider
Twitter's chief information security officer is leavingAxios

all 23 news articles »
Google News

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More


P C. owners are constantly at risk from attacks by... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More