We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?
But of course remembering all the different passwords can be a headache. And writing them down somewhere isn't a great deal safer than using the same password again and again.
You can buy software that stores the passwords for you, but do you really want to pay money for another piece of software that performs a solitary function?
Try this simple, two-step, technique that lets you generate an infinite number of passwords, without having to remember any of them.
Step One: Choose a 4-6 letter word or number sequence that you can remember easily. Needless to say, don't reveal this to anyone. For the purpose of this demonstration, I'll choose the word "cash"
Step Two: Apply this secret word or number sequence to the name of the program you are setting up the password for.
To accomplish this, invent a couple of easy to remember rules.
Rule 1: Decide which part of the program name you are going to use. It could be the whole name, the first 6 letters of the name, the last 8 letters of the name. It's totally up to you, be as creative as you like.
eg ? For the program TrafficSwarm, I might choose the first 8 letters of the name. This give me: "traffics"
Rule 2: Take the portion of the program name you have selected and merge it with your secret word or number sequence to create a unique password. Again, be as creative as you can with this rule. You could replace every second letter, every third letter, every vowel or every consonant.
eg ? If I replace every second letter of "traffics" with my secret word "cash", I get " t c a a f s c h "
or
- If I replace every vowel of "traffics" with my secret word "cash", I get " t r c f f a c s ". The "s" and the "h" are not used as "traffics" has only two vowels, but some words will use all four letters of "cash". Some words might have more than four vowels, in which case just start back at the beginning with "c" and "a" and so on?
You don't have to worry about making your rules overly complex. Even the best code-breakers would need to see several of your passwords before they could start to guess what you rules are.
As long as you keep your rules safe and sound, your password is secure. But the real beauty of this system, is that you don't have to remember the passwords you create. You ONLY have to remember the rules.
When you log into the program the next time, just apply your rules to the program name, and you can work out what password you generated. Once you have been using the rules for a while, you'll generate the password in your head, without even having to pause.
Don't worry if it seems a little complicated at first. Read this article through a couple more times and then try this technique with just a couple of programs. Once you are happy with it, all that's left to do is to start working your way through existing programs and update your passwords. It's time consuming, but for peace of mind you'll be glad you did.
David Congreave is owner of The Nettle Ezine, the newsletter for the home business -- online. David lives in Leeds, in the United Kingdom, with his wife Leanne.
Recently I have received email from my bank/credit Card Company,... Read More
Computer infections can be broken up into 4 main categories... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
In 1997, I decided after 15 years as a practicing... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Is your data secure? Think again. Securing data is unlike... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
So called phishers try to catch the information about the... Read More
Despite the current wave of identity theft and corporate security... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
The top five online scams on the Internet hit nearly... Read More
Identity theft is one of the most common criminal acts... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
The average computer is packed with hidden software that can... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
These six ways to prevent identity theft offer you valuable... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
If you are wondering how to fight spyware for safe... Read More
This is the second in a series of articles highlighting... Read More
Every day millions of people go online to find information,... Read More
You've seen it in the news - 40 million credit... Read More
There you are busily typing away on your PC or... Read More
There has not been a time in the history of... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
The trash folder in my main inbox hit 4000 today.... Read More
If you use emails actively in your communication, you must... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Someone recently told me, "You would have to be a... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Since its birth, the Internet has grown and expanded to... Read More
Have been an Internet user for more than 9 years,... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Nobody wants to pay to remove spyware. At the very... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
This really chapped my lips...I recently bought a new computer.... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Fishing on the Internet has come a long way. However,... Read More
I am the victim of an internet scam. It is... Read More
If you use emails actively in your communication, you must... Read More
Working from home has its advantages, including no commute, a... Read More
Ok, you've got a computer, and you get online. You... Read More
The words Corporate Security may conjure up images of a... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
With the Internet entering our lives in such an explosive... Read More
Many of us have run into an annoying and time-consuming... Read More
Computer infections can be broken up into 4 main categories... Read More
If you use the internet, you have probably been infected... Read More
These six ways to prevent identity theft offer you valuable... Read More
Identity Theft is one of the most serious problems facing... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
If you constantly deal with bank or electronic accounts, it... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Huge number of spyware software applications are available in the... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Today the internet is a mine field of malicious code... Read More
In the past I've never really paid much attention to... Read More
Internet Security |