Rus Articles Journal

What is the good password?

The more our affairs from entertainments are transferred to virtual space, the one small feature opening a door to the magic country of the Internet - the password becomes more important. We are threatened even more often by danger to appear as near Karabas Barabas at whom vile Buratino abducts a gold key. Abducts maliciously to get into it, personally to Karabasov, the magic country. How to save magic dream from the one who sticks the long nose everywhere? Passwords most often simply select

. There are special programs which touch various combinations of letters and figures. In free access there is a John the Ripper program. It checks millions of passwords in one second. You want - check. And there are programs of selection of codes even more high-speed.

Programs for breaking of passwords before beginning it is stupid to touch combinations of letters, figures and special signs, generate possible keys, using special dictionaries for their selection. If the malefactor learned in any way that in the password login and date of birth of the user is used, it will place these data in the dictionary the first, and the program will instantly find the required combination. As we see, additional information sharply reduced operating time of the program which malefactors used. Information relieves of excess searches. From here follows: the passwords, most resistant to search, - generated incidentally and whenever possible long .

Clever people, experts in cryptography, made clever rules about what have to be passwords it was impossible to guess them. Not that it is absolutely impossible, but that the solution of the password took too much time.

So, the good password has to :

1. To have length at least of 15 symbols.

2. To include small letters.

3. To include capital letters.

4. To include figures.

5. To be other than the previous passwords.

6. Not to contain login or a name / surname of the user.

7. Not to contain names of family members and friends.

8. Not to contain words which can be found in the dictionary.

9. Not to contain the letters which are settling down in the same order as they settle down on the keyboard (qwerty, asdfghjkl, 12345678).

10. To include symbols it seems `!“? $? % ^ & * () _ - + = { [}]:; @ `~ # | / <>.? /

Exist online - generators of passwords which can create casual passwords of any length. The trouble is that it is difficult to remember casual long passwords. However, it is possible to try to remember one incidentally generated password and to enter it on all websites. However experts and here on the alert again to complicate our life. “So it is impossible to do! - they speak. - If someone spots your password, it will be able to visit all your websites“.

Yes, with these children it is not sophisticated to fall into paranoia! How all - to protect the life - life on the Internet and at the same time to remain within critical reason which was so appreciated by the famous philosopher I. Kant?

The best way - to generate passwords on a certain algorithm. To remember not the long senseless password, but an operations procedure according to which this password is created, much easier!

Algorithms of generation of passwords can be much. Here one of them which everyone at desire can be replaced with similar.

1. For a start we will break future password into three parts - conditionally speaking, a prefix, a root and a suffix. Let`s agree a prefix and a root to divide a symbol @, and a root and a suffix - a % symbol.

2. As a prefix we will use a random number from four figures. One can generate this number of online - random number generators and to remember. To remember 4 figures not so difficult.

There is one more option. All of us remember by heart number of the mobile phone . Take 4 last figures of this number either 4 the first, or 4 any consecutive figures. Number of possible combinations from four consecutive figures for 10 - a-place phone number equally 6. Is where to clear up!

Option for the men doing military service : instead of number of the mobile phone to take number of the, those still times, the automatic machine. It you remembered well, and to enemies it for anything not to learn. Unlike number of your mobile phone.

3. Other option: number “ďč“ which, as we know, consists of an infinite number of figures after a comma. However there are special mnemonic rules allowing to remember a large number of figures after a comma. For example, the pseudo-poem “Three, fourteen, fifteen, ninety two and six“ allows to remember 7 figures after a comma. You want to learn other mnemonic poems? Enter into a search line of Google or Yandex “it I know and I remember perfectly“ or, even more simply, “ďč“ . After that to write number “ďč“ with ten, and even with twenty figures after a comma it is possible.

One of possible sequences of 4 figures in number “ďč“ can be chosen as a prefix: 3141, 1415, 4159 and so on indefinitely.

4. We will pass to a root. As a root we will take some floor not less than 6 - 7 symbols long. It can be the Russian word which is written down by Latin letters. But nothing prevents us to use online - the translator on any of languages. For example, we will translate the Russian word “wasp“ - “Vespa“ into Italian. So the first motor scooter was called, by the way. Let`s agree that the root will always begin with a capital letter.

5. And as a suffix we will take the three first letters of the website on which we are going to enter. For example, Gma for gmail, Vko for “VKontakte“, Fac for “Facebook“, Yan for Yandex. The first letter of a suffix we will agree too to write header.

6. We will connect a prefix, a root and a suffix together now, without having forgotten about dividing symbols @ and %. 3141@Vespa%Gma is a password for an entrance on the website Gmail. com. And the password for an entrance to the social network “Schoolmates“ will be 3141@Vespa%Odn

the passwords Generated thus meet all above-mentioned requirements imposed to good passwords. For each website where registration will be necessary, we will have the password. At the same time it is not necessary to write down anything not to forget, and it is even necessary to remember almost nothing.

The time will come to change the password ? There is nothing more simply. We can replace a prefix, instead of 3141 will become 1416. We can replace a root. How there will be “wasp“ in Spanish? “Avispa“. Probably? Anything surprising! Spanish and Italian - two relatives each other Romance language. For bigger dissimilarity of the new password we will change both a prefix, and a root for previous: 1416@Avispa. Now for an entrance on mail. ru should be gathered: 1416@Avispa%Mai.

It is natural that before it it will be necessary not to forget to visit the corresponding website with the old password and to change it for the password new.

Before rejoicing and triumphing, we will take precautionary measures anyway not to forget the password. Let`s open on one of the websites of free e-mail (for example, on Hotmail) a mailbox with some imperceptible login. Here we will send the short message: 1416@Avispa. Even if enemies will intercept the letter, they will understand nothing. And we will know - before us a prefix and a root, and suffixes change depending on the website which we visit.

The similar precautionary measure is good also the fact that it leaves us “chronicle“ of changes of the password. Sometimes happens that long ago did not use any account and long ago did not change on it the password. In the presence of the list of old passwords (of course, not passwords, but their “semi-finished products“) it is possible to try several passwords from this list, but not to address service of restoration. Here only not to forget login and the password for an entrance to this mailbox!

But whether correctly I made what I publish this algorithm now? Whether this publication will nullify high degree of privacy? Droplets! Who disturbs my reader even if he is not very competent to take as a password root the floor “sun“ in translation into exotic Hindi - “Suraja“? The translator Gugl knows a set of languages and is always ready to come to the rescue to us. A series of passwords which the reader forms after that according to the algorithm opened for all cannot be guessed. Quod erat demonstrandum! you did not close Gugl yet? So translate this phrase immediately!