Already no one is surprised at the requests of many Internet resources to come up with a user and visitor password and login. Moreover, the requirements for this data are constantly being tightened.
In other words, what was previously acceptable now is completely unacceptable. In this article, weโll talk about what kind of password you can think of. Surprisingly, this task is often too complex for many novice users. In addition, if you ask someone who is unfamiliar with the rules of
network security to come up with a password for your account, you will end up with something extremely simple.
General rules
A network password is a certain combination of letters and / or numbers, known only to the user and the resource on which registration is performed. It can be compared with a pin code for a bank card, with which a person can withdraw funds from his account. Accordingly, it is logical to assume that the answer to the question of which password to come up with is simple - it should be as difficult as possible. However, not everything is so simple. After all, remembering a long series of numbers is much more problematic than a couple of characters.
Therefore, if the question arises once again about what kind of password can be invented, then you can use the rule according to which for the secondary resources (for example, chats) the simplest character set is enough, but for access to Internet banking and other resources related to financial activities, you need to come up with something more complex. However, what exactly can be considered complex and what is a simple password?
Currently, specialized programs are used to select (crack) combinations. Their function is extremely simple - guess using substitution. And since computer performance is getting higher, less time is spent on hacking. It is easy to understand that simple rows of numbers like โ123456 ...โ, โ111222333 ...โ and the like will be guessed in literally a few minutes. Alphabetic combinations like โvasyaโ will require more time, and with the change of register (Vasya) the selection task will become almost ten times more complicated. This also includes an indication of the name and / or date of birth, for example, Ira1978. However, these are simple combinations. They, as we have already indicated, are quite acceptable for non-essential resources. The advantage is obvious - they are all extremely easy to remember.
Complex combinations
If the question arises as to how you can think of a password for critical tasks, you must adhere to a number of the following recommendations:
- the total length should be at least eight characters, and with each additional reliability increases by several tens of times;
- Avoid the use of numbers or letters alone - they must be mixed, for example, โasr917ermyโ. In addition, it should be borne in mind that case changes (uppercase / lowercase) additionally increase reliability;
- although punctuation marks are often forbidden to use, a password with their inclusion will be more secure.
Thus, there should not be a problem with the question of which password can be invented.
Some recommendations
If the combination invented is important and should be completely safe, then there should not be various references to it in social networks and other public resources. This is necessary in order to avoid a situation where, for example, the user has learned what password can be invented, made it difficult, and used the name of his beloved dog listed on the Internet as a reminder.