Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / NewStats: 3,192,352 members, 7,947,561 topics. Date: Thursday, 12 September 2024 at 11:30 PM |
Nairaland Forum / Nairaland / General / Business / The Significance Of Using Strong Passwords (185 Views)
How Do I Retrieve My Saved Passwords On UC Browser. Please I Need Help / Emefiele Accuses Nigerian Business Moguls Of Using Illegal Markets (Video) / Stop Using Easy Passwords For Your ATM Cards, Mobile banki. A Nairalander Warns. (2) (3) (4)
(1) (Reply)
The Significance Of Using Strong Passwords by ezineexpert(m): 11:56am On Mar 25, 2019 |
The password you use for your business transaction online will establish how easy it will be for hackers or attackers to gain access to your account. That is why making use of strong passwords is significant. How Attackers Detect Passwords Using strong passwords can reduce or frequently beat the different attack techniques of compromising the safety or a particular website or an individual. Quite a lot of users log into their computers with the combination of their usernames and passwords cleverly typed with their keyboards, despite the fact that a several options are available for user authentication today. Users use similar or nearly the same passwords on every computer or system, so that they can easily remember their passwords; and given a choice, a good number of users will choose an extremely easy and simple-to-remember password including the maiden name of their mothers, their year of birth or birthday, or even the name of a relative. The truth is that simple and short passwords are comparatively easy for hackers and attackers to establish. Methods Used by Hackers to Detect Passwords Discussed here are a number of common ways used by attackers to find out the passwords of their victims: 1. Automated Program Online Dictionary Attack The hackers make use of an automated program or online dictionary attack that comprises of a text file of words. On each attempt, this program tries to log into the targeted computer continually, by making use of different word from the text file. 2. Through Guessing The hacker guesses likely phrases or words like city of birth, names of children, and local sports teams in an attempt to log onto the account of the user. 3. Offline Brute Force Attack This is planned to establish passwords that may not be available in the text file. Offline brute force attack is a variant of the dictionary attacks. Although it can be tried online, it normally takes place offline with a copy of the target password file of the system, owing to latency and network bandwidth. In this type of attack, the hacker use automated program that creates encrypted values or hashes for all likely passwords and match them with the values in the password file. 4. Offline Dictionary Attack In this type of attack, the hacker looks for the copy of the file where the encrypted or hashed copy of the passwords and user accounts are stored, and then makes use of an automated program to establish the password for every account. The offline dictionary attack is like the online dictionary attack. This kind of attack can be finalized and completed quickly, immediately the attacker has managed to obtain a copy of the password file. However, the good news is that the use of strong passwords will slow down or even defeat these attack techniques tremendously. As a result, try as much as possible to use strong passwords for all your accounts whenever possible. Qualities of Strong Passwords Passwords can be described as case-sensitive and may have a lot of 127 characters. 1. Strong password doesn’t have username 2. It is of a minimum of six characters long 3. Has characters from the following categories: Description Examples Lowercase letters a, b, c,… Uppercase letters A, B, C,… Numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols (all characters not defined as letters or numerals) ` ~ ! @ # $ % ^ & * ( ) _ + -={ } | [ ] \ : ” ; ‘ < > ? , . / The Bottom Line In order to prevent attackers and hackers from gaining access to your account, please change your Password to a stronger one now and take note of such changes or Transaction Password before effecting the change. Avoid using abcd, date of birth, or 12345 from today! For more tips on how to create strong passwords, visit https://ragpbusiness..com |
(1) (Reply)
Intellectual Property Law For Startups / Digital Marketing Class, April 2019 / Buy And Sell Make Cool Cash
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 13 |