Password Generator

Password Generator

Password Generator To protect your passwords from being hacked by social engineering, brute force or dictionary attack methods, and to protect your online accounts, you should aim to:

  1. Don't use the same password, security question and answer for multiple important accounts.
  2. Use a password consisting of at least 16 characters, at least one number, one uppercase letter, one lowercase letter, and one special symbol.
  3. Try not to utilize the names of your family, companions or pets in your secret word.
  4. Do not use postcode, home number, phone number, date of birth, ID card number, social security number etc. in your password.
  5. Try not to utilize any word reference words in your secret key. Examples of strong passwords: ePYHc ~ dS *) 8 $ + V- ', qzRtC {6rXN3N \ RgL, zbfUMZPE6`FC%) sZ. Instances of feeble passwords: qwert12345, Gbt3fC79ZmMEFUFJ, 1234567890, 987654321, nortonpassword.
  6. Don't use two or more identical passwords that have the same characters, for example, ilovefreshflowersMac, ilovefreshflowersDropBox.
  7. Don't use anything that can be cloned (but you can't change) your password, such as your fingerprint.
  8. Do not allow your web browsers (Firefox, Chrome, Safari, Opera, IE, Microsoft Edge) to store your passwords, since all passwords stored in the web browser can be easily disclosed.
  9. Do not log into important accounts on other people's computers, or when connected to a public Wi-Fi hotspot, Tor, free VPN or web proxy.
  10. Do not send sensitive information online via encrypted (such as HTTP or FTP) connections, as messages from these connections can be sniffed with very little effort. You ought to consistently utilize encoded associations like HTTPS, SFTP, FTPS, SMTPS, IPSec.
  11. While traveling, you can encrypt your internet connections before leaving your laptop, tablet, mobile phone or router. For example, you can set up and connect to a personal VPN on your own server (home computer, dedicated server or VPS) with protocols like WireGuard (or IKEv2, OpenVPN, SSTP, L2TP over IPSec). Alternatively, you can set up an encrypted SSH tunnel between your computer and your own server and configure Chrome or FireFox to use Soza Proxy. Even then, if someone captures your data as it is transmitted through a packet sniffer between your device (such as laptop, iPhone, iPad) and your server, they will not have the option to take your information and passwords from the encoded streaming information.
  12. How secure is my password? You probably believe that your passwords are too strong to be hacked. But if a hacker steals your username and MD5 hash value of your password from a company server and the hacker has this MD5 hash on Rainbow table, then your password will be cracked quickly.


CEO / Co-Founder

Enjoy the little things in life. For one day, you may look back and realize they were the big things. Many of life's failures are people who did not realize how close they were to success when they gave up.

Recent Posts