We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?
But of course remembering all the different passwords can be a headache. And writing them down somewhere isn't a great deal safer than using the same password again and again.
You can buy software that stores the passwords for you, but do you really want to pay money for another piece of software that performs a solitary function?
Try this simple, two-step, technique that lets you generate an infinite number of passwords, without having to remember any of them.
Step One: Choose a 4-6 letter word or number sequence that you can remember easily. Needless to say, don't reveal this to anyone. For the purpose of this demonstration, I'll choose the word "cash"
Step Two: Apply this secret word or number sequence to the name of the program you are setting up the password for.
To accomplish this, invent a couple of easy to remember rules.
Rule 1: Decide which part of the program name you are going to use. It could be the whole name, the first 6 letters of the name, the last 8 letters of the name. It's totally up to you, be as creative as you like.
eg ? For the program TrafficSwarm, I might choose the first 8 letters of the name. This give me: "traffics"
Rule 2: Take the portion of the program name you have selected and merge it with your secret word or number sequence to create a unique password. Again, be as creative as you can with this rule. You could replace every second letter, every third letter, every vowel or every consonant.
eg ? If I replace every second letter of "traffics" with my secret word "cash", I get " t c a a f s c h "
or
- If I replace every vowel of "traffics" with my secret word "cash", I get " t r c f f a c s ". The "s" and the "h" are not used as "traffics" has only two vowels, but some words will use all four letters of "cash". Some words might have more than four vowels, in which case just start back at the beginning with "c" and "a" and so on?
You don't have to worry about making your rules overly complex. Even the best code-breakers would need to see several of your passwords before they could start to guess what you rules are.
As long as you keep your rules safe and sound, your password is secure. But the real beauty of this system, is that you don't have to remember the passwords you create. You ONLY have to remember the rules.
When you log into the program the next time, just apply your rules to the program name, and you can work out what password you generated. Once you have been using the rules for a while, you'll generate the password in your head, without even having to pause.
Don't worry if it seems a little complicated at first. Read this article through a couple more times and then try this technique with just a couple of programs. Once you are happy with it, all that's left to do is to start working your way through existing programs and update your passwords. It's time consuming, but for peace of mind you'll be glad you did.
David Congreave is owner of The Nettle Ezine, the newsletter for the home business -- online. David lives in Leeds, in the United Kingdom, with his wife Leanne.
![]() |
|
![]() |
|
![]() |
|
![]() |
This is not some new fangled techno-speak, it is a... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
History and BackgroundThe virus was one of the first ever... Read More
There has not been a time in the history of... Read More
Huge number of spyware software applications are available in the... Read More
In today's times spyware is a very serious issue and... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
It's late. You've been scouring the web for that perfect... Read More
Be careful of sites that promise to send you "instant... Read More
Have been an Internet user for more than 9 years,... Read More
If spyware were a person and he set himself up... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Computer security for most can be described in 2 words,... Read More
Watching how the traditional media covers the latest virus or... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Today the internet is a mine field of malicious code... Read More
The Threat10 years ago you could probably have run no... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
The average computer is packed with hidden software that can... Read More
With the Internet entering our lives in such an explosive... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Despite the current wave of identity theft and corporate security... Read More
Much has been said on the theory of password protection... Read More
Computer infections can be broken up into 4 main categories... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
The most frustrating part of having Spyware on your computer... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
No longer are viruses the only threat on the internet.... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
With the advent of the World Wide Web, a whole... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Imagine this ? you open up your email box and... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Watching how the traditional media covers the latest virus or... Read More
Over £5 billion pounds was spent on online shopping in... Read More
A couple of days ago, I was searching for a... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Much has been said on the theory of password protection... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
There has not been a time in the history of... Read More
Ok, ok, I know you've seen them. All those pop... Read More
If you use the internet, you have probably been infected... Read More
If you are a parent, as am I, I think... Read More
Have you ever had to call Symantec or McAfee to... Read More
In 1997, I decided after 15 years as a practicing... Read More
Pharming is one of the latest online scams and rapidly... Read More
You've seen it in the news - 40 million credit... Read More
The 1998 Data Protection Act was not an extension to,... Read More
There is no doubt that "how-to articles" have become a... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
The words Corporate Security may conjure up images of a... Read More
A week or so ago, I received an inquiry from... Read More
Fishing on the Internet has come a long way. However,... Read More
A couple of years back, I paid my dues the... Read More
So you want to know who your kids are chatting... Read More
Computer security for most can be described in 2 words,... Read More
Shopping for horse gifts or other gift items on the... Read More
First I would like to stress I am condoning the... Read More
Nowadays more and more people are using a computer. A... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
If spyware were a person and he set himself up... Read More
Internet Security |