Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

How to choose a secure password?

How to choose a secure password?

The time has come when every average Internet user has more than two accounts at different web addresses that require opening their own profile.

It is necessary to assign a password to each open profile, and this is where the problems arise, which is why I am writing this article.

The problem is that passwords, and especially those with important data such as emails, internet banking passwords, Facebook profiles, etc., must be complex, ie they must contain uppercase and lowercase letters, numbers, and various characters, and at the same time must be easy to remember. It is important to use different passwords for different internet services.

How to remember complicated passwords?

A good password can be made if you take a sentence of a few words that you will easily remember, e.g. white red color.

To make this password even stronger, we will insert spaces between words, a few capital letters, and a couple of numbers. So our example would look like this: White Red 196. This password now contains 3 words, 2 spaces, 3 uppercase letters, and 3 different numbers.

If you want to make the password even stronger, add a symbol, e.g. asterisk, plus, parentheses, etc. Here is our example: White Red * 196 *

The password strength tool says: "It would take a desktop PC about 322 septillion years to crack your password"

What if I forget my password?

All services that require accounts offer the possibility of resetting for all those who forget the password. In this case, a new password is sent to the e-mail that was confirmed when opening the profile. This is why the password of the e-mail must be especially secure because if a hacker breaks the e-mail protection, he simply sends requests to various Internet services to send new passwords and then reads them and abuses them.

I advise you not to use programs that store various passwords.

Comments

Popular this month

Google offline maps - instructions

Google has recently added several new features to its maps, including Offline maps and turn-by-turn navigation. It was these two options that were missing so that Google Maps  that could be used as a standalone offline navigation app.

Make your phone "transparent"!

It's actually one app for Android devices. Transparent Screen is one useful application that will use the camera on your Android device to display everything that the camera captures on the screen, so you have the feeling that the phone is transparent.

SOPA is retiring for now

Lamar Smith said he is withdrawing the controversial SOPA law for now until they find a solution. Namely, the people behind this have obviously taken the protests of Wikipedia , Google, Reddit, and other big companies around the world seriously.

SIM card sizes (Mini, Micro, Nano) - explanation

Many users still complain about the size of SIM (subscriber identification module) cards. Which one goes on the phone? Can it be shortened? Can a smaller one into a larger slot? Although we are slowly switching to eSIM (more on this in this article ), we still use classic SIM cards. Newer phones usually require a Nano sizes, but operators issue SIM cards in all sizes. More precisely, now SIM cards are made so that the user can choose the size immediately, and later change it if necessary. More on that at the end of the article.

What should you check before buying a used phone?

If you buy a used phone from an unknown person, or even from a known person, you must always check the phone for any damage - visible or hidden. But what all needs to be checked? How? That is exactly what I am writing in this article!