5 rules for how to create and remember hard-to-crack passwords

to connectVideoFox News Flash, important news, Dec. 18

Fox News Flash, important news, for the Feb. 18, here. Check out what to click on

Passwords are our first line of defense, on-line, and the sad truth is that most of us are just not very good at creating strong, legs. We will be using the same weak passwords over and over again, despite knowing better.

And among the high-profile data breaches, phishing and brute-force password-cracking-apps-for hackers, there’s no shortage of ways to break into into someone’s account. Tap or click here to see 5 sneaky tricks that criminals use, and how you can fight back.

In fact, the tech companies know how careless users are with passwords, as well as develop more difficult to hack into ways to secure the accounts. There are some who believe that biometric passwords will be the norm in the future, and what that means is that your physical body will be used to identify you. His form is the best way to lock down your smartphone? Tap or click in order to compare numbers (Pins), passwords, facial recognition, and fingerprints.

In the mean time, you must enter your password in-game. Take a hard look at your online account and follow these ground rules to help you keep it protected.

Rule #1: make Use of all of them, no exceptions

Show of hands: Who here among us has opted for a simple, easy-to-remember password? You’d be shocked at how a lot of people have chosen to use a simple password such as ‘ baseball,” “123456,” or, in the worst case scenario, “password”) to create an online account, at some point or another.

We all have many accounts online, so go with the least resistance, it can help us to make more than one sentence that are easy to remember. A little further on there is a struggle to get by, and even harder to remember.

In the beginning of the day to get smarter. For all your tech, news and most trusted digital and the things that you will need to have it in your inbox each morning.

Unfortunately, these simple passwords are also the easiest to hack. All databases consist of the most commonly used passwords on the web, and you can bet hackers around the world are enthusiastic about the subject matter. These are some of the sentences, and try them first, if they are trying to brute force an account.

Your personal information is for sale on the Dark Web? Tap or click here to find out just how far cyber criminals are willing to pay for the use of your Gmail account password, credit card numbers, and social security number.

For a successful password is to create, with the aid of a complex combination of letters, numbers, and alternating the use of upper case letters. In a sentence such as, “Bingo123”, it would be much better off as a “biNg01789.” As you can see, the cover is alternated between the letters and the numbers don’t continue to follow a precise sequence.

The more “random” or complex your password is, the harder it will be to guess. And, of course, is a much more diverse range of characters, it gives hackers more opportunity to fail, and when to guess for your code. Don’t make the job easy for them.

Kim Komando has five tips on how to make it, and don’t forget hard-to-crack passwords for you.
(REUTERS/Pawel Kopczynski)

Rule #2: in a large

You will also need to stay away from the use of a common word as the base of your password. This is simply due to the fact that the words is likely to be less characters in length. In addition, the algorithm-based password crackers are getting better and better at picking out the individual words are to be found in the majority of computer.

In order for this to work, are going to be bigger. Although it is a complete sentence as a password may seem to be impossible to achieve, if you think about it, a sentence is a sequence of consecutive words, which is perfect for short, in a recognizable sense.

TECH HOW-TO: make Your phone filled with pictures, as well as the cleaning of them is not as difficult as you might think. Tap or click here for 3 easy steps to organize your messy photo collection.

Here’s an example: Let’s say that your favorite baseball team is the Cubs. If you’re a Boy fan, there is no way that you could almost forget about their stunning World Series Victory in 2016. So, you have to remember the code, take the phrase, “the Cubs won the world series in 2016”, and abbreviate it to “cwtwsi2016.”

Replacement of some of the characters and events, and you’ll have a “cwTw$i2016”, a much more complex password that is hard to guess, but easy for you to remember. Struggling to come up with this on your own? Tap or click to get a random password generator.

Give it a try, with a sense that you won’t soon forget it, and come up with a more advanced passcode is a lot easier. You can also do a full passphrase, and where the sentence is largely intact, but replace certain letters and numbers with other characters, and to toggle between upper case and lower case letters. For example, the cUb$W1nW0rLd$3r13$1etNzOI6.

Rule #3: extra protection

Of course, not to protect the security of your account is not complete without a fully implemented two-factor authentication (2FA). This is a convenient security method that has been around for some time now, and is running around the house with the help of an additional form of identification in order to have access to your account. Typically, the platform will ask for your mobile number, and you get to check or of your log-in attempt, with the platform of text.

This is a very powerful strategy for a number of reasons. First and foremost, it links to your account and access to something that only you have, which means that only you or someone with access to your phone, and you will even have the opportunity to get on board. Second of all, you will be informed of any unauthorized login attempts, right off the bat.

RELATED to: No two-factor authentication, hackers will be able to take over your smart home devices, including your home’s security system. Talk about scary. Tap or click here to find out what can be done if your accounts are not set up properly.

More importantly, 2FA adds an extra step, that is, the most of the career, the hackers don’t even try to get involved with. It’s too much of a hassle, and far, far beyond the capabilities of automated tools, or brute-force hacker and apps that can help you crack the code.

Rule #4: Think outside of the box

This is a challenge for a lot of people, and understandably so. On average, people usually have to have at least one social network they are a part of a bank-that is, they often have access to, the service accounts for utility services, the cloud-storage and app store, passwords, and accounts with their online activity.

Will try to remember more than one password is enough to make your brain hurt, that’s the reason why most people tend to be the easy way out and just serve the same password for multiple accounts. Unfortunately, this is not an option in today’s digital world. Hackers will find out how often an error, that this is a way to think about it, and the bank for the benefit of their unearned income.

Usually, when an attacker guesses or cracks a password has to be correct, they are trying to use it on more platforms, in order to see whether or not it’s a chance to get to work, and it is, unfortunately, all too often, their efforts are to be successful. Due to the use of different passwords and passphrases for multiple platforms, you’re making a hacker’s job much more difficult. You are to avoid a knock-on effect in the event of a breach, and, ultimately, more responsible, and your data across to take the easy way out.

Be PRACTICAL TECH TIP: Need to record a conversation on your ipad, iPhone, or Android? Tap or click here for more information.

Here’s something else that you may not have thought of: set up an online account on numerous websites, a lot of it will make you fill in the answers to a series of security questions as an extra layer of protection. There is a problem with this method, however, since it is not difficult for a hacker to get their hands on that information. It can be as simple as checking out your social media profiles in order to get the answers to these, and gain access to your accounts.

The reduction of the risk, the answer is simple: go and lie down. Do not have the answers to the security questions truthfully during the account creation process, and it will make it that much harder for a cyber criminal to break into. Were you born in Arizona? The answer to the security question to something like it in North Carolina. Do you have a dog named Fred to grow up? Instead, say, you had to have a cat named Sparkles. Don’t forget that this is a security measure that can be counter-productive if you don’t know what a fake answer.

Since the hackers have to work hard, and it is our job to be harder to work with in the creation of a variety of strong passwords, passwords, and security questions. It’s a shame that it will remind you of all of them, it can be a pain, but that brings us to our next rule.

Rule #5: Have a service that will do the job for you

A password manager is one of the greatest essentials to the most advanced internet users. Through the use of a single, and you’re putting all of your passwords, including encryption, to ensure that they are safe and secure. Tap or click here to find out more about one of my favorite options, and KeePass.

Also, keep in mind, however, that this is different than using your web browser (e.g., Chrome) to save it to your computer. The Browsers are still vulnerable to hackers and compromise, but it is a secure password manager that gives you the upper hand against cyber criminals.

Of course, you will still need to enter a password to remember to access your manager. Fortunately, though, this could be the last password you’ll have to keep in mind about all of them. Just make sure that it is stored somewhere very safe, like a piece of physical paper off your desk, or in a special notebook.

BONUS TIP FOR EXTRA KNOW-HOW: one of The major mistakes that people make when signing up for the streaming service

What’s new in the world of streaming TV? If that is the case, congratulations are in order to the freeing of oneself from your expensive cable bill. You now have the freedom to pick and choose the channels you want, at no extra cost, cable companies want to add to it.

Millions and millions have opted-in streaming services, as an alternative to cable, and on the most recent studies show on streaming, it will be in the 25 percent of U.S. homes, will come in 2022.

If you have a subscription to your favorite streaming services, and don’t forget to set these jumbo-sized mistake that might leave you with an extra cost. Here is how you can get started on the right foot.

Tap or click here to see this game-changing, money-saving trick.

What is the digital lifestyle, if you have any questions? Call Kim ‘ s national radio show, and then tap or click, here to find it on your local radio station. You can listen to, or look for, the Kim Komando Show up on your phone, your tablet, tv or on the computer. Tap or click here to see Kim’s perspective.

Copyright By 2020, WestStar Multimedia Entertainment. All rights reserved.

Learn about the latest technology on The Kim Komando Show, the nation’s largest weekend radio talk show. Kim takes calls and gives advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips newsletters and more, visit her web site at

Follow us

Don't be shy, get in touch. We love meeting interesting people and making new friends.

Most popular