Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

How to choose a secure password?

How to choose a secure password?

The time has come when every average Internet user has more than two accounts at different web addresses that require opening their own profile.

It is necessary to assign a password to each open profile, and this is where the problems arise, which is why I am writing this article.

The problem is that passwords, and especially those with important data such as emails, internet banking passwords, Facebook profiles, etc., must be complex, ie they must contain uppercase and lowercase letters, numbers, and various characters, and at the same time must be easy to remember. It is important to use different passwords for different internet services.

How to remember complicated passwords?

A good password can be made if you take a sentence of a few words that you will easily remember, e.g. white red color.

To make this password even stronger, we will insert spaces between words, a few capital letters, and a couple of numbers. So our example would look like this: White Red 196. This password now contains 3 words, 2 spaces, 3 uppercase letters, and 3 different numbers.

If you want to make the password even stronger, add a symbol, e.g. asterisk, plus, parentheses, etc. Here is our example: White Red * 196 *

The password strength tool says: "It would take a desktop PC about 322 septillion years to crack your password"

What if I forget my password?

All services that require accounts offer the possibility of resetting for all those who forget the password. In this case, a new password is sent to the e-mail that was confirmed when opening the profile. This is why the password of the e-mail must be especially secure because if a hacker breaks the e-mail protection, he simply sends requests to various Internet services to send new passwords and then reads them and abuses them.

I advise you not to use programs that store various passwords.

Comments

Popular this month

How to download the complete FB profile

UPDATE: The article has been updated. Click here. You have probably heard these days that the hacker group "Anonymous" will crash Facebook on November 5, 2011, maybe it will, maybe it won't. If you want to save all your pictures and videos, etc. you can do it in a few steps.

Five wishes from Google

Google is under investigation for allegedly abusing its strong position as a leader in the field of Internet search, and competing companies are suing Google and their partners, as this giant company is increasingly expanding into markets where it is already competitive.

This premium VPN gives free 17+ GB of bandwidth per month!

As you surf the internet your location is available on every site you visit. Basically, every site you visit knows your IP address, location, region, country . .. and much more. You don't believe it? Just look at this link and you will see your details: https://www.find-ip.net/ip-script If you don't already use a VPN, you can see your IP address, country, city, and region in the box above. Worrying?

Speccy - Get to know your computer in detail

The average user usually only knows what the CPU speed is, how much RAM it has, what the label is on the graphics card, and how much the HDD is… But he doesn't know some perhaps more important details. Speccy is a program that will reveal these details and you will have a complete insight into all the components that are inside your machine.

Look at historical objects in three dimensions

Google has launched a new Cultural Institute service where you can view some 3-dimensional historical objects on your computer in your favorite web browser. The items are detailed and you can enlarge them to see even the smallest parts. Of course, they are not perfect, there are some irregularities somewhere, but they were not noticed.