How do you evaluate the strength of your passwords?

blackdog

I know many, many people use terrible passwords. I try to make mine both something I can remember and reasonably strong. What do you use to objectively evaluate the strength (or weakness) of your passwords?

Topic: Security
Answer this Question

Answers

3 total
Christopher Nerney
Vote Up (15)

Common sense goes a long way in choosing and evaluating a password. Using something you can remember that's not too easy (numerical sequences, your last name backwards, etc.) is a good strategy. I also make a point not to use passwords based on any information about me that can be found online.

riffin
Vote Up (13)

There are quite a few tools online, but one thing to keep in mind is you don't want to just go to some unknown website and start entering your actual passwords. After all, Acme Crime's website could have a password checker that welcomes you to give them all of your actual passwords. Microsoft has one that is interesting - it attempts to predict the next character. All of your browser log entries are encrypted on this site, by the way, before they are sent to MS's servers. 

https://telepathwords.research.microsoft.com/

jimlynch
Vote Up (12)

Create strong passwords
http://www.microsoft.com/security/online-privacy/passwords-create.aspx

"A strong password is an important protection to help you have safer online transactions. Here are some steps to create a strong password. Consider using some or all to help protect yourself online:

Length. Make your passwords at least eight (8) long.

Complexity. Include a combination of at least three (3) upper and/or lowercase letters, punctuation, symbols, and numerals. The more variety of characters in your password, the better.

Variation. Change your passwords often. Set an automatic reminder to update passwords on your email, banking, and credit card websites every three months.

Variety. Don't use the same password for everything. Cyber criminals can steal passwords from websites that have poor security, and then use those same passwords to target more secure environments, such as banking websites."

Ask a question

Join Now or Sign In to ask a question.
A malware program that targets Hong Kong activists using Apple devices has trademarks of being developed by a nation-state, possibly China, according to a security company.
Google has tripled its maximum reward for finding flaws in its software to US$15,000, a figure the company hopes will deter independent researchers from selling their information on shady markets.
The "Shellshock" flaw has the potential to pose a risk to the payments industry, but doesn't appear to have caused any problems yet, an official with a consortium run by major credit card companies warned on Tuesday.
The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers.
The year since our previous Global Information Security Survey won't go down as one of the better years for information security. In fact, it may go down as one of the most grueling.
Small and medium-size U.S. companies should band together on cybersecurity systems as a way to pool limited resources against increasingly sophisticated attackers, the former director of the U.S. National Security Agency said Tuesday.
For the second time in as many weeks, a senior U.S. government official has warned that widespread use of encryption could harm investigations.
Four alleged members of an international computer hacking ring face charges in the U.S. of breaking into the computer networks of the U.S. Army and several tech companies and stealing several software packages, including programs used to train Army helicopter pilots.
A number of antivirus products caught all the malware the testing lab threw at it. But only a few were free.
Many banks with less than $50 billion in assets have a problem that payment systems like Apple Pay will make even more attractive to exploit, a team of security researchers says.

White Papers & Webcasts

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+