{"id":534,"date":"2015-08-24T13:07:56","date_gmt":"2015-08-24T21:07:56","guid":{"rendered":"http:\/\/www.checkworks.com\/blog\/?p=534"},"modified":"2015-10-16T13:10:19","modified_gmt":"2015-10-16T21:10:19","slug":"internet-security-creating-hack-proof-passwords","status":"publish","type":"post","link":"https:\/\/blog.checkworks.com\/index.php\/internet-security-creating-hack-proof-passwords\/","title":{"rendered":"Internet Security : Creating Secure Passwords"},"content":{"rendered":"<p><a href=\"https:\/\/www.checkworks.com\/blog\/wp-content\/uploads\/2015\/08\/bigstock-security-concept-in-computer-75957206.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-535 size-large\" src=\"https:\/\/www.checkworks.com\/blog\/wp-content\/uploads\/2015\/08\/bigstock-security-concept-in-computer-75957206-1024x683.jpg\" alt=\"metal security lock with password on computer keyboard\" width=\"625\" height=\"417\" srcset=\"https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/08\/bigstock-security-concept-in-computer-75957206-1024x683.jpg 1024w, https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/08\/bigstock-security-concept-in-computer-75957206-300x200.jpg 300w, https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/08\/bigstock-security-concept-in-computer-75957206-624x416.jpg 624w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/a><\/p>\n<p>By Jurissa Ayala<\/p>\n<p>In our day and age, we have the amazing ability\u00a0to be hooked up to the Internet and perform our business, our banking, schooling\u00a0and communication from anywhere we want. However, our security online depends greatly on our ability to protect our personal accounts from unauthorized access, as malicious users try to break into other people&#8217;s accounts thousands of times every day. Passwords are the linchpin in our security, and it is vital that we create strong passwords to protect our accounts and our identities.<\/p>\n<p><!--more--><\/p>\n<p>You don&#8217;t have to look far to find out how easily passwords are cracked today\u00a0&#8212; just Google &#8220;is it easy to crack a password?&#8221;\u00a0 It can be confusing as we continually hear security advice about password length:\u00a0It must be eight\u00a0characters, it must be 10, 12, 14. And we hear that we should use indecipherable combinations, use random words, but make it long. Password researchers like <span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"Jeremi\">Jeremi<\/span> <span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"Gosney\">Gosney<\/span> have been able to crack even a 20-character password (<span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"savethecheerleaderssavetheworld\">savethecheerleaderssavetheworld<\/span>).<sup>1<\/sup> Sometimes using numerical or symbolic substitutes won&#8217;t help because it takes only a fraction of a second for a password-cracking program to swap them in and try them (4 for A, 3 for E, 0 for O, $ for S, etc.). It seems that length alone is not a perfect solution to password security, though neither is complexity alone.<\/p>\n<p>Sometimes it feels as though\u00a0there is no way we are going to remember every bit of password advice. But here is a simple formula to create extremely powerful passwords that are still easy to remember:<\/p>\n<p>It is true that length compounds the difficulty of cracking a password almost exponentially, so the longer the better &#8212; always. However, plain words that can be found on Twitter, Wikipedia\u00a0or in a dictionary are now part of password-cracking databases that any amateur hacker can use to crack passwords. So we must combine length with complexity. And we don&#8217;t mean just swap the E for a 3.<\/p>\n<p><strong>Step 1. <\/strong><\/p>\n<p>Pick a line from a movie you have seen a hundred times or a line from a song you love. It must contain at least 12 words, but try to make it at least 14.<\/p>\n<p>All of the fighters are attacking I wonder what those Star Destroyers are waiting for&#8230;<\/p>\n<p>or<\/p>\n<p>Shot through the heart and you&#8217;re to blame darling you give love a bad name<\/p>\n<p><strong>Step 2.<\/strong><\/p>\n<p>Take out all the letters except the first of every word:<\/p>\n<p><span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"aotfaaiwwtsdawf\">aotfaaiwwtsdawf<\/span><\/p>\n<p><span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"stthaytbdyglabn\">stthaytbdyglabn<\/span><\/p>\n<p><strong>Step 3.<\/strong><\/p>\n<p><span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"Complexify\">Complexify<\/span>. Now we use the number substitutions and change up the capitalization of the letters. To make it easy to remember, try to capitalize logical parts of the phrase. Also, add special characters whenever possible.<\/p>\n<p><strong><span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"aotfaaiwwtsdawf\">aotfaaiwwtsdawf<\/span><\/strong> &#8212; becomes: <span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"40tfaaIwwtSDawf\">40tfaaIwwtSDawf<\/span> or\u00a0<span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"40tf4aIwwtSD4w4\">40tf4aIwwtSD4w4<\/span> or, best,\u00a0<span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"40tf4a\">40tf4a<\/span>,<span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"lwwtSD4\">lwwtSD4<\/span>?<\/p>\n<p><strong><span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"stthaytbdyglabn\">stthaytbdyglabn<\/span><\/strong> &#8212; becomes: <span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"STTH4ytbdygl4bn\">STTH4ytbdygl4bn<\/span>! or,\u00a0best,\u00a0$TTH,<span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"4ytbdyg\">4ytbdyg<\/span>&lt;<span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"34bn\">34bn<\/span>! (I substituted the <span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"emoticon\">emoticon<\/span> heart for love, You could also put the <span class=\"scayt-misspell-word\" data-scayt-lang=\"en_US\" data-scayt-word=\"emoticon\">emoticon<\/span> heart for the word heart. The idea is the same.)<\/p>\n<p><em>Note: sometimes commas or other special characters are illegal for certain programs or websites, so you could just remove it or substitute it for another special symbol.<\/em><br \/>\nThese passwords are extremely difficult to crack, but still very easy to remember if you can remember the line you used. Really, the only tricky part is remembering where you put the numbers or capital letters, but that&#8217;s nothing compared with\u00a0trying to remember a completely random combination of numbers and symbols &#8212; which, to anyone else, is exactly what your password looks like.<\/p>\n<p>The length of these passwords makes it much more difficult for\u00a0password-cracking tools to crack them quickly. Each additional letter radically increases the brute force difficulty. There are also no dictionary words to try. Even with powerful servers trying every combination to crack your password, it\u00a0would take them decades at best, and by then hopefully you either don&#8217;t need that account, you changed the password by then, or they found someone else with an easier password to crack and left you alone.<\/p>\n<p>In the final analysis,\u00a0this formula helps to create some of the longest and most secure passwords possible while still being easy enough to remember. Use it to help protect yourself from exploitation of the worst kind. Keep your bank account, your emails, your Facebook, and your identity safe by using\u00a0strong passwords.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Jurissa Ayala In our day and age, we have the amazing ability\u00a0to be hooked up to the Internet and perform our business, our banking, schooling\u00a0and communication from anywhere we want. However, our security online depends greatly on our ability to protect our personal accounts from unauthorized access, as malicious users try to break into [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/534"}],"collection":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/comments?post=534"}],"version-history":[{"count":4,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/534\/revisions"}],"predecessor-version":[{"id":699,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/534\/revisions\/699"}],"wp:attachment":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/media?parent=534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/categories?post=534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/tags?post=534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}