![]() This makes things almost impossible for pirates: In addition to finding the key, they must pirate-or steal-a mobile phone. This mechanism is very safe, because the strength of the password adds the need to also have the code received to be able to open the product. This procedure is that the service or product combines the password with a code that is sent to the mobile phone and that must be inserted to access. One way to improve password security, in addition to using a password generator, is to enable two-factor authentication (2FA). You can find out if it has been so on a website that tells you if your password has beencompromised. If you use a key similar to these, beware: they may have stolen you. Using all these ephemeris or mnemonics rules to generate the keys is a big mistake. These 'classic' passwords are very easy to violate: birthday dates, dates of birth of children, places of birth, nicknames, names of your pets. It's even weaker than the eight-figure series we've seen before. The first five numbers are also often employed. The first five letters of the keyboard are a classic in the passwords. Never use numbers alone: try to combine them with letters and symbols.Ĥ – QWERTY. A slightly more elaborate, but equally insecure variant. Its fragility is also very high.ģ – 12345678. The word 'password' is another one of the most used expressions to protect Web services. It is a tremendously insecure key and any pirate is able to break it.Ģ - Password. Although it seems incredible, it is the most used password in the world according to the ranking of 2017. Some of the most common are these:ġ – 123456. Sometimes they are so little elaborate that they can be decrypted almost by deduction. The five most used passwordsĪlthough these tips are well known, users still use very weak passwords. if they are not used in more than one place. These passwords are created by combining letters, numbers and symbols and are even more secure if they are unique, i.e. To defend oneself, it is highly recommended to have secure passwords, indecipherable if possible. ![]() The importance of using a proper passwordĪccording to recent reports, 80% of attacks due to pirates or hackers have been used for unsafe or stolen passwords. In you will be able to obtain a solid independent password like a rock. They are easily deciphered by a little social engineering. It is not a good idea to use your date of birth, anniversary or your dog's name as passwords.
0 Comments
Leave a Reply. |