4 Steps To Create An Unbreakable Password

Active Internet users typically exist on many sites such as Facebook, Twitter, Instagram, Tumblr, Bank, etc., each of them requiring a password, thus an active Internet user potentially has multiple passwords Occur. For a human, it is very difficult to remember the unique password for each individual website. Therefore, most of us reuse the same password on different platforms.

Now, complex passwords are difficult to remember, so many of us use relatively simple passwords such as “PasswordTwitter123,” “ABCDEF11,” pet name and vehicle number and other combinations. These less complex passwords are at great risk of breach and make us susceptible to crimes such as identity theft.

So in this blog, you will learn to create an unbreakable password easily. The steps are explained below:

Step 1: Memorize a phrase you never forget, which must be at least 10 characters long. 

For example, the phrase may be “Johnny Johnny Yes Papa, Eating Sugar No Papa, Open Your Mouth, Ha Ha Ha”.

Step 2: Now take out the initial letter of each word.

For the above example, it becomes – “jjypesnpoymhhh”. As you have seen, this password is very complex in itself. It is almost impossible to remember this password at a glance.

Step 3: Now, add some capital characters and special characters at specific locations.

For example, this could be – “ELEPjjypesnpoymhhHANT” after adding capital character and “ELEPjjypesnpoymhhANT% &” after adding a special character

Step 4: Finally add a number that is personally relevant to you. The best option would be a combination of two individually relevant numbers, making it extremely non-predictable. After this add your final password may look like this – “ELEPjjypesnp7610454567oymhHAL% &”

Final judgment

This password is so strong that it would take hackers at least a trillion years to crack it using “brute force”, the world’s best password breaking algorithm.

Because the password includes a well-remembered phrase, and a combination of numbers that is personally relevant to you and the password is hard to forget.

For the reasons cited above, the password can be remembered very easily.

In the end, this new password may seem complicated to others, but just for you it is a simple password, which can be typed very quickly.

All these factors are the best way to create truly unbreakable passwords, that too easily.

How to check the strength of your password

After creating a strong password with the above method, you may also like to check the strength of your newly created password. We recommend the website https://howsecureismypassword.net/ to check the strength of passwords. The website shows how long the hacker will need to crack your password with brute force attacks.

What are brute force attacks?

A brute force attack is an attempt to set every possible combination of a given key-space or character to a certain length. Thus, the attacker first tries all the single character passwords ie “a to z”, “A to Z”, “0 to 9”, all special characters, etc. If the password is not compromised, it tries everyone. The possible combination of two character sets until the password is broken.

John the Ripper is the best known password cracking tool available today.

What is the easiest way to secure your online account?

The simplest way to protect your account is to use 2FA (two-factor authentication). Read this article below to understand its effectiveness in detail:

Google 2-Factor Authentication (2FA) blocks automatic bot hack 100%

Two-factor authentication is annoying because you have to find your phone and enter a secret code every time you log into your accounts from a new device. is. But if you ever have any doubt whether it really makes you so secure, Google has the data to remove that uncertainty.

If you are not familiar with 2-factor authentication (2FA) or two-step verification, then using an extra layer of security to prove the person logging into the account or device is really about you. Even if someone steals your password or guesses, they will not be able to use your information without any other verifier. Sometimes this means that you type the code you received on your smartphone or tap on a prompt on a different device. If you need more security, you can also get a physical device that connects to your computer to verify your identity.

Google 2FA and others, support these forms; If you have it enabled on your Android device then you are probably “trying to sign in”.

Obtaining a secondary SMS code led to 100 percent of automated attacks, 96 percent of bulk phishing attacks, and 76 percent of direct, targeted attacks by hackers. Using those on-device prompts like those brings those numbers down to 100, 99, and 90 percent respectively. The improvement is likely due to the fact that it is harder to try to give an access code to it than tapping a person at an on-device prompt. Of course, the physical security key is the safest to use, blocking 100 percent of each type of attack during Google’s investigation.

Other forms of 2FA such as providing a secondary email address, phone number, or your last sign-in location were much less secure than those that are usually able to close bots, but not from phishing or targeted attacks. Adding a recovery phone number to your Google account can make it very easy for most people to keep it safe.

Which popular accounts/sites support 2FA?

Below is a list of popular sites that support 2FA.

Google 2FA: https://www.google.com/landing/2step/

Apple 2FA: https://appleid.apple.com/#!&page=signin%2F

Amazon 2FA: https://www.amazon.com/gp/help/customer/display.html?nodeId=201962420/

PayPal 2FA: Paypal

Twitter 2FA: https://twitter.com/settings/security/

Dropbox 2FA: https://blog.dropbox.com/topics/work-culture/have-you-enabled-two-step-verification

Evernote 2FA: https://www.evernote.com/Login.action?targetUrl=/secure/SecuritySettings.action/

1 password 2FA: https://support.1password.com/one-time-passwords/

GitHub 2FA: https://github.com/settings/admin/

Microsoft 2FA: https://login.live.com/

What if my site does not support 2FA?

In such a situation, consider creating highly complex passwords using the method described above. Also, you should read How Digital Footprints Are Affecting People’s Future

Leave a Comment