8 principles for setting easy-to-remember and secure passwords for gamers
The information first came to light in May, when experts at the National Institute of Standards and Technology (NIST) released a draft report discussing the assumptions behind passwords and how to create a 'strong' password. The draft was officially completed in June, and it provided a comprehensive list of dos and don'ts when creating a password.
1. Use a password that is at least 8 characters long. Simply because a password that is too short is easy to guess.
Have you ever been rejected because your password is too long? Yes, this is a problem that sometimes happens, and researchers at NIST want to change it. They say that service providers should allow passwords up to 64 characters long, and users should take advantage of this and use longer passwords to protect their accounts.
2. Keep your password to yourself. Don't share your password too easily, simply like that you can avoid account breaches, strange notifications. If you feel something strange happening in your account, immediately change your password!
3. Use a password manager. Password managers, like LastPass, allow you to have strong, unique passwords for each individual account.
4. Skip the special characters, they're not that useful. Characters like @, $, and & are still recommended in passwords, but you don't need them anymore. They just make your password harder to remember, and they don't make your password stronger.
5. Don't use password hints. Password hints are a big deal, because they can also help strangers guess your password.
6. Stop using personal questions to reset your password. The answers to questions like 'what was your first pet's name?' can be hard to remember, and there are now other ways to reset your password.
7. Avoid what NIST refers to as 'repeated or sequential passwords'. This means passwords like '12345678' or 'aaaaaaaaaaaa' should be avoided.
8. Don't use the name of the service you use as your password. If you're using 'AlexGmail' as your Gmail password, you're doing it wrong. Don't use your name, the name of the service you use, or anything that comes from the service or the user (like your date of birth).
Hopefully, with the 8 suggested principles above, gamers will be able to create strong and easy-to-remember passwords to protect their "darlings".
You should read it
- Learn the structure and principles of operation of the refrigerator
- 13 key principles for a lasting, lasting love
- 11 basic principles that every programmer should follow
- How to retrieve a Tik Tok password when it is lost
- Basic Knowledge Management Principles Everyone Should Know
- 10 Jewish principles of life, 3,000 years of value remain
- How to remove PDF file password
- Check the security of the password
May be interested
- Instructions for downloading and installing VietPN on your computerrecently, fiber optic cable breaks frequently cause slow web speed, lag in games, high ping. vietpn is a simple, fast solution, trusted by many people.
- Signs that your computer is infected with viruses and malwarecomputers infected with malware cause many dangerous problems for data. below are the signs that your computer is infected with viruses and malware today.
- It's time to switch to Passkey: The anti-phishing password alternative!with passkey, the modern alternative to traditional passwords, you won't have to worry about remembering, managing (with or without a password manager) or resetting your password ever again.
- Why do you need both a VPN and a firewall?understanding the difference between a vpn and a firewall, as well as why using them together provides better security, will help keep you safe.
- Disable Wi-Fi on These 7 Devices to Boost Privacyif you're concerned about your privacy, here's a list of 7 devices you can disconnect from your wi-fi to better protect your personal space.
- Should I buy a USB, Bluetooth or NFC security key?using a computer security key is the best way to authenticate your identity, but not all security keys are created equal. usb, nfc, and bluetooth security keys all have their own advantages and disadvantages.