What password can you come up with for your accounts? The most complex passwords: examples. How to come up with a password

A strong password can protect you and your data from the machinations of intruders. On the Internet, any profile requires a “password” to log in. Only you should know it - and no one else. So you will have to try hard to come up with a decent secret combination that is not so easy to recognize. In some cases, you can use one trick, but it still will not be able to completely secure your profile on the Internet. What tips should you use to make your “password” difficult to guess?

Numbers, letters, symbols

The most secure password is a combination that is difficult to remember and guess. Therefore, users always think about what they should use as a “password” for authorization on various services.

The first advice that advanced “users” give is to use a combination of numbers, letters and symbols in their secret combinations. It is also recommended not to create short passwords - it would be better if they were long and difficult to remember. This way you can protect your data.

What specific combination should I use? You'll have to figure this out on your own. However, there are a few more tips to help you create a strong password.

Register

Please note that often forms for entering "passwords" are case sensitive. In other words, they distinguish between lowercase and uppercase letters. This is a great opportunity to diversify your secret combination.

When coming up with a strong password, try to combine not only numbers with letters and special characters, but also alternate between lowercase and uppercase ones. This approach helps make it more difficult for attackers. The main thing is, don’t forget which letter is in which case.

It is recommended to capitalize the very first letter, and then alternate according to the “every other” principle. This kind of technique will help you avoid getting confused in the password you created. So take this advice into account. Which password is more secure? One that uses a variety of registers when writing. It is possible to do without this feature, but it is not advisable.

Changelings

They say you shouldn't use dates that are important to you in your passwords. But that's not true. It is enough to slightly diversify the approach to this issue. There is such a technique as “shifters”. It helps you use dates that are important to you in your “password”. At the same time, it will be very difficult to unravel your secrets.

What is this principle based on? At the very beginning of the password you choose, you should write a date. For example, your birthday. And at the end - the same date, but upside down. If 123 is written at the beginning, then 321 is written at the end. As you can see, there is nothing difficult about this. Therefore, this technique is used by many users. It’s easy to remember the general principle of constructing a “secret record”. This means you won’t forget the “password” just like that.

Now it’s worth taking a closer look at strong passwords. Examples of these using “shifters” are what will help you figure out exactly how to create a good combination for authorization in an account on the Internet.

Let's assume that the "body" of our password will be the user's first and last name. Then we print: IvAnIvAnOv. Now you should use the “shifters”. To do this, let's take some date. For example, how often is the user's birthday selected. Let in our case it be May 4, 1988. And we dilute it all with symbolism. The final combination is: 4051988!~IvAnIvAnOv~!8891504. This is the complex password we have. In fact, it is easy for the user to remember, but it is extremely difficult for attackers to guess. In any case, practice shows exactly this situation.

Generating

If you can’t come up with a strong password yourself, you’ll have to use one little trick. Just don’t think that it will completely protect you from hacking. There is nothing better than a personally invented “password”.

What technique are we talking about? About using special password generators. They themselves make up “secret combinations” using symbols, letters and numbers. Of course, taking into account the registry. But “shifters” are not used here.

You can download any password generator. Just launch the application and click on the "Generate" button (or something like that). You will receive a combination as a password. It can be supplemented or used in its original form.

Registration password. Login and password. Forgot password. This is something everyone faces. What password should I set to make it secure? Hackers will give you the best answer.

The problem of setting passwords has two aspects. First, it must be reliable. Second, you must not forget it. While we can give advice on the first point, we cannot give advice on the second. Everything depends on you. Get yourself a paper book and write down all your passwords there. You can write it to a rarely used flash drive.

Cracking a password is quite simple if someone sets out to do this. It's just a matter of time and tools. But many obstacles can be placed in the way of attackers, including choosing the right password. In principle, every password you enter is encrypted, ranging from MD5 encryption to 3-step reverse encryption. However, anyone who intends to crack already knows how it is encrypted, and if you give a direct hint by choosing the wrong password, you will make his task a thousand times easier.

If you simply lose control of registering on the site, then this is not a problem. Now, if you lose control of your mailbox or social network account, then this is a big problem. In a mild case, you will be spammed and you will lose trust with many of your contacts. In the worst case, you will lose money and compromise yourself. It is usually possible to recover and update your password, but you will still get problems.

It's like the height of a fence. The higher it is, the more difficult it is for attackers to overcome it. It is possible to climb over, but it is much more difficult.

Don't neglect advice.

  1. The longer the password, the better. !!! Even by simple brute force it is much more difficult to hack it. Purely “brutal” attacks on your password are more difficult in time. Now the norm is 8 acquaintances.
  2. LOGIN should never be the same as the password.
  3. Use a unique password that you have not previously specified. Those. no need to use a password that you have already used somewhere. At a minimum, if you hack, you will lose the rest. Get into the habit of writing them down on paper or putting them on a flash drive that you rarely use.
  4. The password must be diluted. Letters, numbers, and symbols. Necessarily. After all, it’s not difficult to install, but hacking is another time problem.
  5. It’s better if the password is meaningless Vi3%drsowtz5, and not ordinary words in Russian or English.
  6. Characters of different registers are more than welcome.
  7. Never use your name or the people close to you, dogs and cats, and especially your birth dates. Believe it or not, this is the first thing that is checked before manually cracking a password.
  8. Phone number and any bank cards under no circumstances.
  9. Regular keyboard passwords are also not allowed - such as qwerty and 12345678

And now the most easily hacked ones that were introduced on the Internet at the end of 2013. At least don't use them.

Last year the most popular number was 123456.

The choice of password is yours, but the advice is based on basic hacking algorithms.

Passwords are everywhere: on social networks, payment systems, on your computer and phone. It is unrealistic to keep so much information in your head, so many users follow the path of least resistance - they come up with one key that is easy to remember, and then enter it on all sites where they register.

This approach to security can end in disaster. If the access code for VKontakte or Odnoklassniki can be lost without serious financial consequences, and therefore there is no need to make it complex, then you need to come up with a password for registering in the payment system or creating an Apple ID so that no one except the owner has access to the data.

Rules for creating passwords

Almost all sites have a list of password requirements when registering. However, usually these requirements are minimal: at least 8 characters, cannot consist only of numbers or letters, etc. To create a truly complex password, you need to keep a few more restrictions in mind.

  • Login and password must not be the same.
  • It is not recommended to use any personal information, especially if it can be obtained from social networks or other sources.
  • It is not recommended to use words.

To understand the logic of these prohibitions, just look at how passwords are cracked. For example, a 5-digit key is only 100 thousand combinations. By simply searching through all the options, the hacking program will find a suitable combination in 2 minutes, if not less. A rare word will not work for an access code either. An attacker can analyze different dictionaries in different languages ​​and find a match. The only question is how long it will take - a few minutes or a couple of hours.

Advanced PDF Password Recovery program for cracking passwords set on PDF documents. Uses brute force and allows you to fine-tune the selection by noting the characters used in the password.

The combination of a rare word and numbers will also not work. Bruteforce technology allows you to search for combinations of numbers and words, so that such a key will fall if necessary. It will, of course, last a little longer than 123456789, but if you suffer losses due to hacking, then this time difference is unlikely to seem significant. To understand which password is strong and which is not, let’s look at specific examples. The approximate hacking time is calculated using password checking services, which are described below.

  • Date of birth (05041992) – will be hacked in 3 milliseconds.
  • A name with a small or capital letter (Segey, sergey) will last 300-500 milliseconds, that is, less than half a second.
  • Combinations of numbers and lowercase letters (1k2k3d4a9v) – approximately 1 day.
  • It will take about 6 years to crack a password like HDA5-MHJDa.
  • The combination AhRn&Mkbl363NYp will be deciphered in 16 million years.

The cracker will not work for 16 million years or even 6 years - this value only demonstrates that it is impossible to crack the password within an acceptable period of time.

Password generation

It’s one thing to know the rules, another thing to follow them. Most users are aware that they cannot use an access code consisting of their date of birth or name to register, but this stops few people. Two problems:

  • It's hard to come up with a complex password.
  • Even if you create a password containing a random set of characters, it is difficult (sometimes simply impossible) to remember.

An online password generator will help you solve the first problem. On the Internet you can find a large number of services that offer to quickly create a complex password from letters, numbers, and special characters.

Online generators work on the same principle: you indicate which characters you need to use, select the required number of characters and click “Generate”. The services differ only in certain aspects.

For example, on Pasw.ru you can generate several dozen passwords at once (up to 99 combinations). PassGen allows you to set the option to automatically exclude duplicate characters from the security key, that is, all characters in it will be in the singular.

Key storage

If you can generate a password online, then you need to store the keys on your computer. Writing the password on a piece of paper, in a separate document on the computer, on a sticky note glued to the screen is the path to unauthorized access to data. So here comes the second problem: how to remember the created key.

You shouldn't rely on memory, but you can rely on a password manager. Many users choose KeePass. This program is distributed free of charge and works on Windows 7, Windows 10 and other modern versions of Microsoft OS. In addition, KeePass has a built-in password generator, so you don't have to search for online services every time.

The only downside of a password manager is that it also requires an access code, which is called a master password. But remembering one master password is much easier than keeping dozens of complex combinations in your mind. In addition, when creating it, you can use a trick - take poetry, counting rhymes or any other memorable lines as a basis and turn them into a combination of letters, numbers and signs.

For example, you can take a quatrain, highlight the first letters and punctuation marks, and then write them in the Latin layout. Some letters can be replaced with numbers - “z” with “3”, “o” with “0”, “h” with “4”. As a result of such manipulation, from four lines of a children's poem that will never leave your head, you will get the password U0d?D3ep.Gzc3hek, which will take 3 trillion years to crack.

Difficulty check

On many sites, when registering, the user is shown whether he has a good password. You can make sure that the generated code is complex and you won’t be able to hack it quickly, you can do it yourself using the ? In the “Enter Password” field, paste the generated password. In response, you will receive the approximate time it will take to crack the key on a regular computer. If it’s several million or at least thousands of years old, then the code is definitely reliable.

You can also use other services to check reliability: for example, from Kaspersky Lab. It also shows the time required to crack a password, at the same time telling you what can be done within the specified period.

Another interesting way to check is the “Password Strength” service on the website 2ip.ru. Here the result is categorical: the key is either reliable or unreliable.

You need to understand that the hacking time shown by these services is very arbitrary and is designed for the case if the hacker uses a regular computer. A supercomputer with fantastic performance will do the job faster, as will dedicated password-cracking machines that can test up to 90 billion keys per second. But it is unlikely that people who own such equipment will need your email, Skype or Wi-Fi password.

Welcome to the blog site! I have long wanted to write an article about what the password for an account should be so that it would be very difficult to hack it. This article will teach you how to create a complex password. We will look at techniques that will help not only make your password secure, but also not difficult for you to remember.

Now we can no longer imagine our life without the Internet. Almost every site requests registration. The most popular resources are social networks. Every day, millions of users log into their accounts. We risk making a lot of mistakes by sending important data in messages. It’s good to have a complex password for VK or another popular social network, this helps protect yourself from intruders.

Several password complication methods

What should the password be? This question is asked by hundreds of Internet users. The following types of passwords are distinguished:

  • alphabetic;
  • symbolic;
  • digital;
  • combined (combination of previous options);
  • register usage.

The first three types do not inspire confidence. These are too simple ways to create a password. Due to inexperience, we make mistakes and set them up. Okay, this will be a “password” for an account on a forum or other similar place. And, if this is the entrance to a bank office, all your money will be lost. The only thing that saves you is that the security service of such sites has developed a system for rejecting easy passwords.

Letters, numbers and symbols

A combination of letters, symbols and numbers is the most secure type of password. You have to seriously rack your brain to guess it.

Experienced “users” advise beginners to use this particular combination. Also, don't make it too short. A long combination will allow you to keep your data and correspondence safe from third parties.

The main thing is not to use the banal phrases below:

  • "123";
  • "123456";
  • "321";
  • "qwerty";
  • "asdfg".

These and other similar sets of characters from the keyboard guarantee hacking. It’s not just you who come to mind first, but hundreds of people. They will be calculated not even by a special program, but usually by an ill-wisher.

How to choose a password for mail or other type of authorization? This issue is worth tackling on your own. Several more password complication options will help.

Register

Before entering your username and password, you should pay attention to the case sensitivity of some forms. Combining uppercase and lowercase letters will make the password more secure.

When writing a secret word, think about its variety. Alternate capital and small letters one or more at a time. This method will seriously upset online villains.

The most annoying thing is if you forget the order yourself. According to the recommendation of experienced users, it is worth making the first character uppercase, the second lowercase, and then alternate one at a time. It is better to take note of this advice so as not to rack your brains later.

You can do without introducing case features into the “password”, but this is still another method to increase the complexity of the password.

Changelings

The date of birth that any user will remember is the most banal and simplest way. If you play it correctly, it can turn out to be a good option. Using the “reversal”, many have managed to create a winning password that is unlikely to be solved.

The method is based on writing characters in reverse order. Choose any date, for example, when you were born and type the text backwards. If you have the phrase “081978” in mind, then turning it over, we get “879180”. It is quite easy to remember how to write such a password.

Let's consider other more complex ideas. Let's assume that the password is based on your first and last name. We type, already knowing the technique using the register - “PeTrPeTrOv”. Now let’s use the “shifter” tactics. We use the date, for example, when the user was born - February 21, 1982. Plus we’ll add symbols to everything. At the end we get the following example password - “PeTrPeTrOv!28912012”. The result was stunning, because for the “user” it is simple and easy, but not for attackers.

Check the strength and security of your password using online services:

  • https://password.kaspersky.com/ru/
  • https://howsecureismypassword.net/

Encryption

What should the password be? Let's find out another great way. Let's look at the principle of encryption. In fact, all the previously discussed methods have something in common with this. Here we will show what passwords are by encrypting phrases.

We take the most meaningless and unique phrase that will easily be remembered. Let there be “space cockroaches”. You can use any lines from songs and poems, preferably not very well known.

Then we apply a code to our phrase. Let's look at a few surefire ways:

  • rewriting a Russian word on an English layout;
  • "shifter";
  • replacing letters with symbols that are similar in appearance (for example, “o” - “()”, “i” - “!”, “a” - “@”);
  • removing paired or unpaired characters;
  • dropping consonants or vowels;
  • addition of special characters and numbers.

So, let's think of a few words with meaning - “space cockroaches”. We take 4 letters from each, we get “komtara”. Switch to English and retype – “rjcvnfhf”. We complicate it by starting the cipher with a capital letter and adding symbols.

This is what the password should be, using the example of the originally conceived phrase - “Rjcvnfhf@955”.

A reliable combination with a large number of symbols has been invented. The strength of the password is checked using special services, for example, passwodmetr.com. The combination was not easy for the scammers to guess, since the user’s personal data is not involved. But for the “user” such a “password” is a godsend, since remembering such a reliable password will not be difficult.

Generator

For those who do not want to spend extra time thinking, developers have long invented complex password generators. This method provides some degree of reliability. The best ones are still considered to be “passwords” invented by one’s own mind.

What is a generator and how to use it? This is a smart program that displays random passwords - completely random combinations. He uses many of the methods discussed, but does not take “turnovers” into account.

The complex password generator is downloaded from the Internet. For example, let's take "keepass". Like any other generator, it is not difficult to operate. The application and the generation itself are launched by pressing a special button. After the operation is completed, the PC issues a password option. The only thing left to do is to enter the resulting combination in unchanged form or with additions.

Difficult passwords created by the iron friend are very difficult to remember. Rarely does anyone keep them in their mind; more often they have to be written down. There are usually a lot of passwords, because we don’t sit on one site and constantly register again and again on other resources. Therefore, storing a bunch of such information is not convenient for everyone. You can completely lose all the papers with notes.

There is one way out with storage - print them in a computer file. This is one of the most reliable cases. You just have to remember that the PC system does not last forever and also becomes unusable.

All methods for creating complex passwords have already been discussed above, and you can create an email password that will reliably protect your data from third parties.

Here are some useful tips for creating passwords:

  • do not mention personal information about the user (names of relatives, names of pets, phone numbers, addresses, dates of birth, etc.);
  • You cannot use the Cyrillic alphabet in your password;
  • do not use phrases that can be easily calculated using a dictionary of popular passwords (yaster, love, alfa, samsung, cat, mercedes and other similar ones, as well as their other derivatives and combinations);
  • take into account the length of characters - preferably at least 10;
  • complicate the password using a combination of various methods - upper and lowercase letters, numbers, symbols;
  • do not use the most common passwords - templates, think original (a robot that calculates your password cannot be as smart as a person).

Here you are, dear reader, you probably don’t close your house or apartment with a latch or a hook. Choose a more reliable, stronger lock and key for your home so that no one can get inside without your knowledge. And that’s right, and that’s how it should be! Otherwise, at some point in time, or rather, day or night, you can lose everything that was acquired by back-breaking labor.

It is noteworthy that this everyday truth is also true for accounts in online services. They also need to be locked, and well locked with a key - a password - from strangers. After all, there are more than enough people who want to covet profiles, accounts in payment systems, online games, social networks, and anywhere (the Internet is big!). And you don’t need to reassure yourself during the registration process on the next web resource with thoughts like “Who knows me here...”, “Who needs my profile...”, etc. The fragile hope of “maybe” in this case can turn into trouble. And large ones if, for example, we are talking about funds in an online banking account.

In this article, you will learn how to come up with a strong password, how to remember it, and how to store it safely on your computer.

Complex password - guarantee of confidentiality

Why do you need to come up with a good password? Yes, because it is the very first and most important level of protection for your personal data. Computer attackers “open” many user profiles by guessing the password using special programs. Lightweight symbolic keys are a godsend for them. Once - and you're done! You don't need to work hard at hacking.

To further clarify this situation with statistical arguments, we will use a special web service https://howsecureismypassword.net/. It tells you how long it might take to crack a user-specified password. That is, it evaluates the degree of its resistance to hacking.

So, let's assume that we decided to come up with a password using the arrangement of letters on the keyboard - qwerty (well, a very trivial combination). We ask the service.

Now let's try to test a key 6 characters long, consisting of small English letters and numbers - ty23ds.

The result is also disappointing: 54 milliseconds. Of course, in such a period of time the sequence can only be “solved” using an automated method. However, in most cases, hackers use exactly this technology.

Let's complicate the combination: add capital letters to the set and increase the key length to 11 characters. Enter - eYtou349i93.

This is much better: the villain-burglar will have to pore over finding the key for 41 years (in theory, of course!).

But you can come up with a more complicated password: increase the length even further, for example, to 18 characters, and use special characters along with letters and numbers. Something like - ew$yu*ow)RweQ23&tT.

The result is simply “cosmic” (by the way, to the delight of the user): the estimated time required for selection is 7 quadrillion years. And in 1 quadrillion, as you know, there are 15 zeros. In general, no comments.

Vigilant readers will, of course, immediately ask the question: “Recruitment, but what about the Trojans? Are they stealing passwords? Yes, the attackers’ toolkit is extensive: they include viruses, social engineering, and special software. And a complex password is certainly not a perfect panacea for account hacking. But it can safely be called a powerful protective obstacle on the way of hackers to confidential data.

Password rules

When creating a symbol combination to enter the site, regardless of its functionality and purpose, be sure to consider the following points:

1. Avoid simple combinations. In particular:

  • logical sequences - abcde, 1234;
  • keyboard layout vertically, horizontally, diagonally, etc. - asdfg, qscwdv.

2. Do not use dictionary words in “pure form” (without adding other symbols, numbers). Especially such as “parol”, “password”, “admin”, “my_parol”.

3. Do not use personal data that is publicly available as a key, for example, on a personal page on a social network or in a profile on a forum. Even with added numbers! Including phone number, date of birth, mailbox address, first name, last name, patronymic, names of pets.

5. Do not enter Russian words in the English layout (example: input - d)