Meet the Guide Editor
Strong Passwords Contributors

A Guide to Creating Strong Passwords

Strong passwords are not those easily remembered, but those that are safe. A password cracker will face an exponentially difficult task to crack passwords which comprise of lower case and uppercase letters, numbers and special characters, if we choose a reasonable length, e.g. RlboE*3NAH8R, without any logic sequences.

Find below tools and techniques for generating strong passwords, along with reviews and recommendations for password manager software which helps you maintain your lists as you only need to remember one master password. Please note that you can come up with computationally difficult passwords on your own, but it’s usually best to use a password generating software, and that the security of your credentials can be further improved by a hard-to-guess login name.

Images

Most Popular Articles on Strong Passwords
  •  
    Map System Configs with PsInfo

    PsInfo is a free, downloadable utiliy which enables both local and remote Windows platform configuration retrieval....

  •  
    Recovering Your PayPal Password

    The world of online banking can be quite frustrating. You want to make a very tough password for your account, but it's nice to have one that you can actually remember. When you forget your PayPal...

  •  
    Best Applications for the BB Bold

    BlackBerry Bold apps make the device even more fun to use. Here are some of the must-have options for your phone....

  •  
    How to Secure Your Wireless Network

    Wireless networks are becoming increasingly commonplace, but a surprising large number of them are insecure. This article explains the steps you need to take in securing your wireless network....

  •  
    Logical/Technical Security Controls - Part 1

    Logical controls, also called technical controls, are used to provide access to your organization’s data in a manner that conforms to management policies. This includes the enforcement of the principles...

More About Strong Passwords
How to Protect Your Home Network From Hackers

This article will walk you through the high level steps you need to take to protect your computer (and home network) from hackers....

Debunking The Top 10 Security Myths: 6-10

This article is second in a two-part series examining and debunking the top 10 information and network security myths. This article debunks myths six through ten of the top 10. I hope...