Skip to main content

Passwords: 8 Tips for Creating & Using them

Most of internet users underestimate the importance of a password, and usually internet users come-up with weak passwords, easy to guess and consequently subjecting their accounts to be hacked, stolen, exploring sensitive information and sometimes blackmailed!.

It’s important to know the password is like the PIN number of your bank account, once the PIN number is stolen the criminal or the malicious users can use your name to open new credit card accounts, draw your money, or apply for an online transaction. The same idea with your password, if it is stolen all your e-mails, contact lists, files…etc will be for misused and public use!.

Here are important tips you need to know while creating a password:


1. Make the password lengthy: long passwords provide more protection than short ones. Your password should be 8 or more characters, 14 or more will be the best.

2. Always Combine: it’s highly recommended to use combined characters in your password, the greater variety of characters that you have in your password, the harder to guess. Always combine uppercase letters (A, B, C, D, E), lowercase letters (a, b, c, d, e), numbers (0, 1, 2, 3) and symbols (! , # $ % ^ & ?)

3. Avoid sequences and repeated characters: try not to use the same character more than one time in your password, and don’t use sequences (1234, abcde)

4. Avoid personal information: your name, birthday, place of birth, ID number, or similar information will be a bad choice. It will be easy to guess and the hacker will first try them.

5. Don’t repeat your passwords: if you are having more than an e-mail account, never use the same password for all accounts.

6. Keep your passwords secret: never keep your password on any document, and don’t email yourself with the password. Never share your passwords with others.

7. Memorable keywords: try to use memorable keywords/phrases in your password. And make sure to be difficult to guess.

8. Regular Change: it will better to change your password every 40 day.

# Password Strength: the strength of any password is always determined by its length and complexity (combined characters). Always have long and combined password.

# Secure Login: whenever you are about to enter your password, always remember to add the letter “s” after the “http” in the URL address bar, refresh the page and enter the password:

Default: http://www.hotmail.com
Secure: https://www.hotmail.com

# Examples for a password:
1*eXaMpLe*7
>e.x.a.m.p.l.e
28$example%15
^-ex-am-ple^ 

# Relevant Posts: The Phantom of Delete Button

Popular posts from this blog

رحلتي في التعافي على مدار ٤ سنين

مفيش اي حد حقيقي هيساعدك غير نفسك.. صدقني مهما كان القاع مظلم وحاسس الحياة متهالكة احضن نفسك طمن نفسك وامسك ايدك خطوات صغيرة. ده عبارة عن مجموعة صور كل واحد بيحكي رحلتي في التعافي والصحة النفسية والبدنية على مدار اخر ٤ سنين عملت فيهم ٣ عمليات جراحية منهم اثنين في رجلي اليمين كان جالي كذا تمزق في الغضروف، واستئصال الزايدة لانها كانت على وشك تعمل بووم. كنت بعارف جامد مع الاكتئاب والتروما، وحالتي النفسية كانت متهالكة تماما ومعاها جسمي وروحي... [قضيت فترات بصلح جسمي] وزني وصل ١٢٥ كيلو على مشاكل غضروف وصدرية وكوليسترول، كنت دبدوب بكرش ثري دي بسند عليه الكيبورد والشاي. المهم، بدأت رحلتي في التعافي خطوات صغيرة، تكريس كل وقتي في تحسين وتطوير حالتي النفسية والبدنية ومعاها الروحانية.. مزيج من الرسم، والتليون، والرقص، والطبلة، والملاكمة، وتاي تشي، وسكاي دايفينج انا فتحت باب الطيارة ونطيت كذا مرة، وسباحة، وركوب عجل يوميا، وجري، وتسلق..  بس حقيقي من كل التجارب دي اكتر حاجة دخلت فيها بقوة ومزاج هي رياضة الكاليسثنكس، واهم حاجة عملتها اني اخدت التعافي بدوام كامل واقصى التزام اقدر عليه. مكنش ...

Few words on Encryption and Egypt

In dangerous times - whether during conflict, unrest, or disinformation - encryption isn’t a luxury. It’s a life-saving layer of security for individuals and societies. Weakening it doesn’t make us safer; it makes everyone more vulnerable. And no one is safe until everyone is safe. A few words on #encryption and #Egypt's context: 1. On decryption assistance mandates and Egypt’s context Decryption assistance mandates - as in forcing companies or individuals to provide access to encrypted data - don’t really function in practice, whether in Egypt or elsewhere. In Egypt’s case, we don’t see explicit legal mechanisms for ‘lawful access’ like those proposed in Western debates, but we do see functional equivalents through other means: broad surveillance powers, vague national security clauses, pressure on service providers, infrastructure ownership by the state, and granting isps and mobile operators secret licenses that gives the security full access to backend. There’s no clear overs...