Category Archives: Passwords

Passwords and computer security are constantly being tested. We try to guide you in our tutorials to give you the best possible protection.

Are the passwords forming patterns on his keyboard secure?

Used as a means of protecting or limiting access to its resource or service, the password has been a reliable security feature for many people for several years. However, can a logical password still guarantee this security if the patterns that form it appear on the keyboard?

Patterned passwords

You are unable to memorize multiple passwords that you use to ensure the security of your resources when you don't want to leave them lying around on a note block. To solve this problem, you can choose a password forming a pattern on your keyboard. You have a choice of patterns but the most common are geometric patterns in the shape of a round, square, triangle, trapeze, ripple or other. But you can also use your imagination and create the pattern you want.

Patterned passwords are easy to remember

You have several possibilities on the starting point of your pattern but the important thing is that you make sure that this starting point and the shape of the pattern are easy to remember.

Patterned passwords are secure

Did you know that 7-character passwords are decrypted in one day by a hacker, eight characters decryptable in 70 days and 9-character passwords that can be decrypted in 13 years? Patterned passwords are, therefore, more secure if you choose a larger form that can contain multiple characters. The more the password contains several inconsistent characters, the more difficult it is to decipher it when you who know your pattern very well needs to remember the chosen shape and your starting point.

Patterned passwords are reliable

A password forming a pattern on your keyboard is like an expression known to you alone, unlikely to guess and difficult to decipher.

Find out more

Now access an unlimited number of passwords:
Download Password

Are passwords in a specific order secure?

When it comes to choosing a logical password, you always ask yourself the question of remembering it. The first idea that comes to you is to use a series of numbers or letters positioned in a precise order and easy to remember. Unfortunately we will disappoint you. The layout in a specific order will make it easier to crack your password.

Understand how to crack a password?

In addition to the various "espionage" techniques (social engineering, wiretapping, keylogger, etc.), there are two methods of breaking passwords.

  • Brute force, which consists of trying all possible combinations (several billion possibilities). Of course this is done by robot software, which is unfortunately very easy to get on the web. On the other hand it is a method that can be long, especially if the hacker has standard hardware. It is usually used when the attacker does not have access to his target and is not able to have information about it. By analogy with fishing you could compare it to trawling
  • The "smart" method goes to it, try to get straight to the point to save time. It is similar to underwater hunting and consists of guessing the password using a logical procedure, which in turn seeks to discover a precise order of layout, characters or numbers. It requires having as much information as possible about the person to put yourself in their place (in their head) in order to imagine how they chose their password. So you understand that if you followed a logic, which is to use combinations that make sense to you, the hacker will be able to deduce it based on the information he has collected.

How do I choose a secure password and remember it?

We often see it as advice on the internet, to use a mnemotechnical phrase that is your own so as to easily remember it. This technique is not recommended because it is based on information related to your psychology, which can be known or deduced. Ideally you should choose a succession of numbers, a capital and lower letter and totally random punctuation marks. It's the passwords that have the best resistance. On the other hand, these are the most difficult to remember.
If you work under Mac OS there is an internal program in the system, which is called OS X X 10.8 (Mountain Lion) access kit. It retains for you all the passwords you use and all you have to do is remember the only admin password. For Windows there are similar external programs to install on his computer.

Find out more

Now access an unlimited number of passwords:
Download Password

How do I create a logic-based password?

The rules for a reliable password

A good password combines length and complexity. Use at least 8 characters. Put numbers, symbols, and feel free to vary between capital letters and tiny ones.
Change your password often to make your security more secure.

Strong but not practical

The problem with a password being too long and too complex is that you'll have a hard time remembering it. Once selected, you have to use it very often or you may forget it, which is not practical when you have to juggle several passwords or you have to change them often (company login for example). Thus, it is necessary to create a robust password but easy to remember.

Creative logic

You need to follow a logic when creating your password. Indeed, it is easier for a human to memorize "0m1ot-paYsZs" if he created it following a logic. Here, you'll find a mix between "motpass," "01," "YZ" and "–." 01 are two digits that follow each other, YZ the last letter of the alphabet and a special binding character. By mixing these elements logically, the resulting password becomes much easier to remember. This is just one example among an infinite number of possibilities.
When you have to change your password often, or adopt several, changed by character type. In the example of "1m4ot-paYsZs," 01 was changed to 14 (the year in court) and to 'union' (union-link).
By making your imagination and keyboard knowledge work, you can customize great passwords and even enjoy them.

Not to take the lead

Start by writing two sentences: "Good security."
Remove the spaces: "a good security."
Use steno or deliberately misspelling the words. You can also draw inspiration from sms language: "unnebonesécuryT ".

You can finally add numbers or/and special characters (logically chosen) after (not necessarily) your password: "unnebonesécuryT."

Passwords on the keyboard

These so special passwords are they secure, that's what we're trying to determine in this article on the subject.

Passwords in a specific order

Often to build a password, we follow a specific order to create it. Is it really secure?

Other ideas

Now access an unlimited number of passwords:
Download Password

Should the password indicator be trusted?

When registering on a site, the ability to verify the reliability of your password with an indicator is considered a way to be sure to take the necessary measures for its security. However, a Canadian study by Concordia University shows that the reliability of these measurement tools can be questioned. It will therefore be preferable to use other measures to find the best security code for each online account.

An indicator based on different criteria

The results of the study show that the most used sites do not show the same security rate for the same password (depending on the password policy). While some may appear insufficient, it is very satisfying for others. This problem can be confusing by making the user believe that their choice protects them when they are simply considered to be performing well against the criteria set up by each site. While some have good knowledge in the field, others are limited to basic settings, which explains such a large difference between them.

While some access code management methods apply the necessary precautions by indicating when the choice is too simple, that it contains whole words in the dictionary, so it is easily hackable, others are limited to offering an alphanumeric combination. For a user, it will be very difficult to know what the real potential of their way of entering a personal account is. This disparity will even lead some users to underestimate the problem and indicate a combination that is far too simple and puts them at risk.

End of color rankings?

This study showed that offering a degree of reliability using red, yellow and green did not really help the user. If red makes it clear that you have to think another way, the other two colors can be misinterpreted. A user may think that yellow is enough to ensure its safety or trust a green without knowing its true reliability.

The results were communicated to the various sites that did not meet the criteria in the field and many were surprised. Even if changes or deletions have been made, there is no guarantee that the new means put in place in this framework to participate in data protection are more effective than those that have been tested.

The Internet user faces his own responsibility

The conclusion of this Canadian study is particularly interesting because it refers to the fact that it is not possible to trust only a computer program set up to test its password. A forward reflection must be undertaken in order to propose the best possible combination according to its own confidence scale. When entering, the password should not only be a happy or easy-to-memorize set, but should act as a real shield.

Even if new features or advice are provided to combat hacking, it is always important to keep in mind that the methods of web pirates are evolving at the same time as protection techniques. If they appear to be inviolable at first, there is no guarantee that they will remain inviolable in the long term. Changing combinations often can be a way to guard against this type of risk because it will be much more difficult to access that user's content. Repeated attempts will be less likely to succeed.

Illustration source: Flickr.

Now access an unlimited number of passwords:
Download Password

Why not use the same password everywhere?

Use the same identifiers on all the sites you visit, why not? After all, it's simpler, recorded once and for all, and you don't waste time. except that…

The main risk

Let's imagine for a moment that a hacker discovers, for X reasons, a password from one of the sites we frequent. The first thing it will do is try it on all sites, including merchant sites.

It's even simpler. The passwords we enter are stored on servers. Not to mention hackers who manage to crack these servers, a simple manager of a single site, unscrupulous, will then have virtually access to all the services we frequent.

And yet, he has no hacking skills…

The secret in multiplicity

To minimize the risks, it is therefore necessary to multiply the passwords. The whole thing then remains to remember.

At this level, everyone has their own method, the followers of the work on memory will not notice them anywhere, others will write them on a sheet, well hidden in the home, others will still store them on a file itself protected by a password. So in the end, this one password is to remember.

Problems with piracy

The biggest risk is to think that there is nothing to steal from our PC, or that it cannot happen to us.
An Ebay account, PayPal, or even Facebook, once hacked, can cause big problems. It's equivalent to identity theft on the internet. And the consequences can sometimes be paid for for a long time.

We stayed on the blue card code model, which is used everywhere, for all services, in the same way. But encryption methods have no common measure when it comes to financial and banking institutions. When we enter our password, no electronic chip comes to protect us.

So, to avoid being hacked, it's better to multiply the passwords. The ideal is a different password per site requiring authentication. This seems to some to go against the comfort of use. But it is precisely to maintain this long-term comfort that it is important to be creative in authentication.

Because once the password is hacked, the loss of comfort in the use of internet services is huge. And then, an effort to memorize, it exercises the brain, the only part of the body that wears out only by inactivity.

Now access an unlimited number of passwords:
Download Password