What password can you come up with for your email? How to come up with a strong password? Tips and tricks

Editor's response

Last update: 09/09/2014

On September 8, a list of passwords for more than 1 million users of the Yandex mail service was made publicly available. Following this, the data of 4.5 million accounts of the mail service Mail.ru was posted online.

AiF.ru tells you which password you should definitely not choose, how to come up with the most secure code, and how not to forget where you wrote it down.

What not to do:

  • Use the same password for all accounts.
  • Use simple variations of the same password. If your name is Ivan, do not use the passwords “Ivan1” and “Ivan2” for different mailboxes.
  • Use words that can be associated with you. Hackers can easily find information that you write about yourself on social networks, so the name of a cat or a child is a very unfortunate and unstable password.
  • Use passwords that can be found in the dictionary. Special password-brute force programs try all the dictionary words in turn, trying to choose the one that will open access to your data.
  • Create a password by typing Russian words with the English layout turned on. This method, popular among the Russian-speaking audience, seems reliable at first glance, but Russian hackers long ago created a special dictionary that allows them to try such passwords. Plus, the layout on the computer keyboard is combined, and it’s easy to type the desired combination in both English and Russian. But on tablets you can use only one language layout at a time, so typing such a password while going through language options is not easy. You will have to remember a very complex combination of letters and numbers.

How to come up with a strong password:

How to remember a complex password:

When you have already created a long and strong password, another problem arises: how to remember or store it, especially if there are several passwords and you do not have a good memory. Experts are unanimous - you need to store passwords in your head (you can, for example, use mnemonics to remember) or in special programs. For example, the “Password Manager” application for computers and smartphones as part of the Kaspersky PURE security solution allows you to store all passwords in a securely encrypted form without straining your memory. You only need to remember one - the one that opens this database. Denis Makrushin adds that “Password Manager” allows you to save personal information, such as PIN codes for SIM cards, activation codes for software, and passport data.

In order not to forget the password from the “Password Manager”, you should not come up with a complex combination; as a rule, in this case, individual security questions and answers to them are used. Unfortunately, if you forget the master password for the manager, it will be impossible to recover it and all data will be lost. It will only be possible to create a new database.

Today, two-factor authentication has become popular, when access to your personal account on the portal is provided after entering a password and an additional factor. Most often this is a combination of numbers that comes as an SMS to your mobile number. Even if the password for the service ends up in the hands of attackers, they will not be able to gain access to it, since they do not have the second factor.

How not to forget where you wrote down the password:

If you decide to write down your password, you must always remember where exactly you recorded it. This can be done in the following ways:

1. On paper, hiding the sheet with the password in a book. It is advisable to place the book away from the electronic device where the password is used. Alternatively, put it in a bookcase, making sure to remember it well first.

You should not write your password in a diary, since this is the most common non-electronic option for recording it. Attackers are well aware of this and will check it first.

2. In the “notes” of your mobile phone. However, in this case, it is worth “disguising” it so that if the device is lost, fraudsters cannot use the data.

  • under the picture - just replace the file extension with jpg. Windows will change its icon, and by placing the file in a folder with other pictures, you will hide it securely. Naturally, you won’t be able to launch such a file by double-clicking the mouse, since, according to the extension, it will be picked up by your image viewer, which will immediately display an error message or show a blank screen. You need to open it by right-clicking and selecting “Open with”, and select any text editor, for example “Notepad”;
  • hide the list of passwords by embedding it inside another file.

To do this, pack the file into a rar archive. We take any jpg image and place them in any folder. After this, we launch the command line window (emulator) (Start -> Run -> cmd), go to the disk where we placed the source files, and then give the command to combine the files:

copy /b image name.jpg + file name.rar 333.jpg.

As a result, the output we get is a 333.jpg image with your file hidden inside. And if you want to view it, you will use the program that was used to create the archive.

Modern people spend a lot of time on the Internet. In most cases, to fully use the global network (from registering accounts to paying bills through electronic payment systems), it is necessary to create passwords. Moreover, there are separate ones for each case. After all, to register on an unimportant site (for example, to download games or music), the complexity of the password does not matter. It can be a simple set of letters or numbers. But, if these are sites related to storing funds, a simple password will not work. It must be reliable and definitely complex.

Today, few people guess passwords. Brute force is often used - the “brute force” method. This is an ordinary search of various options and combinations.

Of course, this method is not done manually, but with the help of specialized programs. The first combinations that will be checked are “111111”, “123456789”, “qwerty”, etc. That is, the most basic sets of numbers and letters. Next, an ordinary substitution will be carried out. This program is capable of sorting through a huge number of combinations in the shortest possible time.

For example, if the password is:

  • Date of Birth. “01021974” - the program will take about 2 seconds to decrypt;
  • Name passwords with a small letter (ivan, oleg) will require about 4 seconds;
  • Passwords that use names with a capital letter (Ivan, Oleg) - about 4 minutes;
  • The program will decipher complex combinations “1d2d3s4a8c” in 4 days;
  • Passwords from the "HSU5-BHJDa" series will be decrypted after 12 years;
  • And finally, the program will decipher the combination “IkRn%Kmbl253NNp” in a million years.

Therefore, asking the question “How to come up with a password?” it is necessary to focus on the above examples and draw conclusions that: - You cannot create short passwords.

  • The password must contain at least 8 characters. Ideally - 10 or more;
  • It is mandatory to use both numbers and letters. It’s even better to dilute the combination with punctuation marks, symbols, etc.;
  • The advantage will be the use of both small and capital letters. This can be done using the Shift or Caps Lock keys.

Naturally, a password can be cracked not only using the program described above, but also by analyzing all the collected information about the person. Data is collected either manually or using special programs.

For example, using brute force, a password from the “ivanovkostya” series will be found in the best case after 100 thousand years, but having knowledge about a person, the last name and first name will be checked first. This suggests that this password makes no sense.

Another way you can hack a password is to find the answer to the “secret question.” By clicking on the “Forgot your password?” button within a few seconds you can (with information) open any page of interest. Often, animal names, mother’s surname (maiden name) and other primitive data are used as an answer to the “secret question”.

A legitimate question arises: where do attackers get this information? The answer is incredibly simple. In social networks. By entering all the data there (from year of birth to the name of their favorite pet), people put themselves at risk.

Favorite music, quotes, bands, interests - you can find anything here. Therefore, Ivan Ivanov, who uses “ivanivanov” as a password to log into social networks, should change it immediately. Otherwise, you shouldn’t be surprised when you once see a page on Odnoklassniki hacked and spam sent on behalf of the owner.

Drawing conclusions, you should understand that hacking a password is quite simple, therefore:

  • Never use personal information when creating a password. This includes: year of birth, wedding date, telephone numbers, apartments, etc.;
  • It is advisable not to use a literary word (in any language) as a password;
  • Never use information that is easy to find out as answers to the “secret question”;

An important point will be generating a password. This is one of the available services with which you can easily and effortlessly create a combination that would be extremely difficult to select for any existing program. But, given that these are rather rare combinations of numbers and letters, you need to do everything possible so that you do not forget the password. Let's look at how to do this below.

So, using the “password generation” service or coming up with it yourself, using the above information, it will be quite difficult to remember it. It is for this reason that in most cases the same combination is used everywhere. Some modernize it slightly. It turns out something similar to “parol1”, “parol2”, “parol3”, etc. This is a pretty tricky step to make sure you don't forget your password. But, as a rule, the logic works quite well for experienced hackers. And they use it. Therefore, he will have access to any mailboxes or account if desired.

Obviously, having used the “password generation” function and received a meaningless set of numbers and letters, it should be stored somewhere. Some people manage to write all the information on a piece of paper and stick it on the monitor. And not at home, but at work... In an office where there are many employees and clients... This is about the same as creating a file on your desktop called “my passwords”. Why do this? Indeed, in this case, the efficiency will be zero.

Therefore, to prevent you from forgetting your password, use the following tips:

  1. Each site or forum requires a new, unique password;
  2. Combinations should not be stored on the computer desktop, due to the fact that professionals can easily break into the PC;
  3. You shouldn't keep your passwords in plain sight;
  4. Using a piece of paper for storage, be sure to create a copy of it;
  5. Never enter passwords in “strange” programs or on suspicious sites. The administration of any self-respecting Internet portal will never require you to provide a password;
  6. When using password storage programs, be sure to back up your files.

In Internet cafes or gaming clubs, try to enter passwords on other people's computers as little as possible. It is likely that when you use Internet banking to pay bills or log into a social network, the computer you are using has a so-called “keylogger.” A program that is used to remember the sequence of keystrokes.

Sometimes you should change your passwords. But the more reliable the combination is, the less often it should be changed. As a rule, passwords of 12-14 characters are changed every few years.

We can only hope that asking the question “How to come up with a password?” you will definitely use the recommendations that were described in this article. After all, using the above information, you can save accounts on social networks and protect yourself from intruders.

I remind you that on our website there is a password generator that you can use if necessary. saving his address to your favorites.


(21 Votes)

The computer and the Internet have firmly entered our lives and have greatly facilitated the solution of many problems. One of the signs of a person who keeps up with the times is the active use of the World Wide Web: email, various thematic forums, blogs, news sites and much more. Most services on the Internet require you to create a login and password. Let's take a closer look at how to create a username and password, and what rules you need to follow in order to successfully register. More on all this later in the article.

How to create a login and password correctly?

The registration process on any site or service begins with creating a login. This is a unique name by which the system will recognize you. Login requirements are indicated next to the field in which you must enter it. If the name you have chosen is already taken by another user, the system will not allow you to register under it. On some sites, the login may consist of only letters of the English alphabet and numbers; in others, the use of Cyrillic and special characters is allowed.

After successfully selecting a name, you need to create a password. The rules for choosing it may also differ, but almost all services today recommend specifying a complex, and therefore more secure, password. Often services and sites have automatic security checks, and if your password is too simple, the system will ask you to choose another one or complicate the code you entered.

What email services are there?

Today, there are many sites that provide email services for free. Let's list the most famous and popular among network users:

  • Mail.ru (Mail.ru);
  • Rambler.Mail (Mail.rambler.ru);
  • mail service from Google (Mail.google.com);
  • Yandex.Mail (mail.yandex.ru).

The above services are giants and veterans of providing postal services. However, in addition to them, there are also other sites where you can create “soap” and services that provide disposable and anonymous mailbox services. These are very convenient to use if for some reason you do not want to indicate your main email. There is no point in describing how to create a login, password and email on such services - the registration process here is no different from standard free email sites.

Choosing where to create an email

When choosing a service on which you plan to create an e-mail or “soap”, as many Internet users call it, you need to be guided by the following preferences:

  • usability or ease of use;
  • high-quality spam filter that will filter out advertising mailings;
  • mailbox size;
  • hacking protection, access recovery functionality;
  • virus protection.

Almost all services today provide the ability to link a mobile phone number to an email account. This allows you to track all actions performed on your mailbox. So, for example, when you log into Google mail on another device, a notification about this will appear on your phone, and when you change your password on Mail.ru, the system will send a notification to your phone.

Email registration

To create an electronic mailbox, select a mail service. It is better to choose from the most popular ones - they have higher protection, high-quality spam filters and convenient access recovery mechanisms.

By clicking the "Registration" button, begin filling out the fields. As a rule, you need to enter your first and last name, create a username and password. How to create your username and password, for example, on Mail.ru, is described directly on the registration page. There, the correctness of the data you entered is instantly checked. If the login you choose is busy, you will have to come up with another one. Often the system itself offers login options based on your first and last name.

When choosing a password, do not give preference to combinations that are too simple - they are easy to guess and hack.

After filling out all the fields and successfully completing the registration process, the mail service will automatically open a page with your mailbox. To enter it, for example, after closing the browser window, enter the mail service in the address bar, in the window that opens, select the “login” button and enter your password and login.

How to come up with a beautiful login?

Before you think about how to create a login and password for mail, decide how you plan to use this mailbox. For a work login, it is customary to use your first and last name. In some cases, the mailing address also uses the name of the organization you work for. And for a mailbox intended only for personal use, you can use both your first and last name, and, for example, your phone number - here you can show your imagination.

To make your login beautiful and easy to remember, follow these recommendations:

  • Do not use letters that can be confused when dictating your login. Such letters include, for example, S and C - not all Internet users know English and the correct pronunciation of letters. You may be misunderstood and the letter may not reach the recipient.
  • It makes no sense to indicate the current age in the login, because next year the mail name will be outdated.
  • If you plan to use mail for work, do not indicate your year of birth - possible customers and partners may refuse you, citing insufficient or too advanced age.

How to come up with a strong password?

To ensure your password is secure, just take a few simple notes into account:

  • Do not use the same passwords on different resources - if an attacker takes possession of it on one resource, he will automatically gain access to all other sites under your name.
  • Use both uppercase and lowercase letters.
  • Add special characters (punctuation, dollar sign, quotes, etc.).
  • Change your keyboard layout. For example, you chose the word “hammer” as your password. If you change the layout to English, the password will seem difficult to remember: vjkjnjr.
  • Do not use information in your password that is publicly available. This means your first and last name, the names of relatives, the names of pets, important dates in your life that you can find out about, for example, through social networks.

Where do I store my email login and password?

In addition to creating a login and password for mail, you will probably have to register for other services, and a login and password may also be required when logging into your account on your work computer. In this situation, the question of how and where to store such information becomes very relevant, since it is quite difficult to keep it in your head. So, in order not to forget your registration data, you should:

  • Write down your password and login on paper. However, in this case you will have to always carry the data with you, and if you lose it, you will have to work hard to restore access to the services.
  • Create a text document on your computer that contains passwords and logins for various services. To prevent them from becoming known to everyone who has access to your PC, change the extension. For example, .txt can be changed to .jpg. In this case, the file will be displayed as a picture, and in order to access the information in it, you will first have to change the extension.
  • To avoid storing logins and passwords on your computer, you can copy the file to a flash card and use it as needed.
  • You can use special software to store passwords. This way, all the data will be in one place, and to access it, you only have to remember one code.

Restoring access to email

For one reason or another, access to email may be lost. To restore it, you can use tools specifically designed for such situations. This could be an answer to a code question that is filled in during registration, or recovery of a password via a mobile phone (but this requires linking the number to your email account).

If you were unable to restore access yourself, you can contact technical support or create a new login and password for your email. However, in this case, all contacts and correspondence stored on the old mailbox will be lost.

We live in an information age where anyone can hack your email, your social media profile, or your website if you have one.

How to come up with a login and password for registration so that no one hacks you? Very simple…

It is extremely important to have strong protection at hand so that even the most powerful hackers cannot hack you.

I always thought this was a little nonsense, well, who needs the data of this or that person. But, if you think sensibly, then people who know how to hack can always do it. If it’s not clear, then I’ll try to give an example that it’s like the desire of a pickpocket who has gotten stuck to snatch an old lady’s purse on a bus.

That is, hackers can improve their skills in this way. Although, everyone may have their own motives, which is why I decided to write a detailed post on how you can protect your Internet resources and data.

How to come up with a login and password for registration

Now, everywhere on the Internet, what do you constantly enter? That’s right: passwords and more passwords, so it’s important to register ones that no one will ever hack.

A good password should meet the following modern requirements:

  • must contain not only Latin letters, but also numbers;
  • its length should be from 8-12 characters and this is the minimum;
  • It is best to use all letters of your keyboard for the password;
  • It will be great if your password has spaces, and several;
  • do not try to create passwords that indicate your date of birth or street and house number;
  • no need to enter the password like the letters that are placed next to each other on the keyboard.

These are the simple rules that you should consider when registering passwords for your social media profiles, for example: VK, facebook, twitter, google plus . Let's say, if you register on a one-time forum, for example, just to download something, then you can enter anything.

By the way, an excellent rule, try to update passwords on your sites from time to time, this will complicate and even scare off possible haters. And best of all, attach authorization via SMS to your sites.

Even if they find out your username and password, they still won’t be able to log in, since they will need to gain access to your mobile phone.

Secure login and password

There are many ways to help you find a complex password.

  1. It must not be understandable. How we come up with a password is basically a word and some numbers that mean something. Think of a word that is not in the dictionary, then add numbers to it that, in your life, mean nothing.
  2. Come up with a few words, and put some kind of symbol, for example, a comma, in the very middle of each one. Here's an example “Better!!iipa,ro l”. It seems to be a phrase: “The best password,” but try to find it again, because there are two exclamation marks and commas.
  3. Enter the password in upper and lower case letters. Here: "MyBirthday229", such a password will also be difficult to guess.
  4. In general, it would be cool if you put a word in your password and add your non-existent date of birth to it. Even if hackers hack you, they will check your date of birth, your relatives, but not others. Here's a simple example: "Sanechek19550202". As you can see, the numbers here don’t mean anything at all, so it’s extremely difficult to find one.
  5. We take some book or magazine and write down a phrase there, which, again, does not fit into your life. For example, the following type of password cannot be guessed "Valery Meladze in Minsk". The most important thing is that you don't forget it.

Well, I think you’ve figured out passwords, now you know what a strong and complex password should look like, which can be used to register mail, social networks, websites, forums, YouTube.

How to come up with a login

The most important thing you need to remember is that the words you use in your login should not be used in your password and vice versa.

To find your login, you can:

  • use the standard generator on the website;
  • come up with something like this from your past or vice versa from what you dream of coming to, for example: business-cool;
  • can be taken from your hobby;
  • a profession in real life would also work;

In short, there are a lot of free words that you can use to log in to any website.

I hope that I didn’t miss anything and that the article on how to come up with a login and password for registration turned out normal. If I missed something, then sorry, I can add.

That's all for me, thank you for reading this post.

Sincerely, Yuri Vatsenko!

All blog articles

Only at first glance, impenetrable passwords do not contain a logical structure and look like gobbledygook. Complex passwords are such only for those who do not know the recipe for creating them. You don't have to remember letter cases, numbers, special characters and their order. All you have to do is choose a memorable one and follow simple tips for creating strong passwords.

Nursery rhymes

We take any children's rhyme or counting rhyme as the basis for the password. It is advisable that it be found only in your area and not be generally known. And better than your own composition! Although any children's rhymes will do, the main thing is that the lines are firmly stuck in your head from a young age.

The password will consist of the first letters of each word. Moreover, the letter will be written in uppercase if it is the first in the sentence. We replace some letters with numbers similar in spelling (for example, “h” with “4”, “o” with “0”, “z” with “3”). If you don’t want to get too confused with replacing letters with numbers, look for a counting rhyme that already contains numbers. Don't forget about punctuation marks that separate words and sentences - they will come in handy.

Example:

The turtle has its tail between its legs

And she ran after the hare.

Got ahead

Who doesn't believe it - come out!

We replace the letters “h”, “z” and “o” with similar numbers. The second, third and fourth lines begin with capital letters and are therefore written in uppercase. Include four punctuation marks. Of course, we write in Russian letters, but on the English keyboard layout.

The 17-character password is ready! It may not be perfect because it contains repeated characters and consecutive lowercase letters and numbers. But to call it simple is certainly hard to come by.

Favorite sayings

The scheme is similar to children's counting rhymes. Only as a basis you take your favorite and very memorable phrases of thinkers, celebrities or movie characters. You can complicate your life somewhat by replacing the letter “h” not with “4”, but with “5”, for example. There can never be too many confusing maneuvers!

Example:

I found out that I have

There is a huge family:

River, field and forest,

In the field - every spikelet...

Replace the letter “h” with “8”, do not forget about upper case and punctuation marks.

Ze,8evTjc^H,g,bk,Dg-rr…

Jargon and terminology

This implies the use of professional jargon that is understandable to an extremely narrow number of people. These words are much more distant from the average person than the criminal sayings that are widely covered on television and the streets of any city.

For example, you can use a hospital discharge or a tricky medical definition.

Example:

Cyclopentaneperhydrophenanthrene is a 28-letter term. It turns out to be a bit long, so I propose to throw out the vowels and dilute the remaining consonants with upper case.

Memorable dates

Of course, your birthday or the day you start your married life is not the best basis for a password. The event should be of exceptional importance, and only you should know about it. For example, this could be the day you ate gum for the first time, ran away from class, or broke your heel. Since the password will be based on numbers, it would be a good idea to mix them with letters.

Example:

10/22/1983 and 06/16/2011

Replace the dots separating the day, month and year with any letter, for example the small English “l”, which is very similar to the quite commonly used separator “/”. Between dates we will put an underscore character “_”. Let's replace the zeros with the letters "o".

Visual Key

Use the smartphone unlocking technique on your keyboard as well. Think of any shape and “slide” your finger along its contours.

Don't forget to go through the numbers, change the horizontal and vertical direction of movement. And, unlike me, be imaginative!

Conclusion

The proposed methods for creating a password that is memorable, but at the same time quite difficult to understand, can be changed and combined at your discretion. It is enough to think about your super password once, and you can use it in the presence of a stranger without fear.

How do you choose your password?