Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

How to choose a secure password?

How to choose a secure password?

The time has come when every average Internet user has more than two accounts at different web addresses that require opening their own profile.

It is necessary to assign a password to each open profile, and this is where the problems arise, which is why I am writing this article.

The problem is that passwords, and especially those with important data such as emails, internet banking passwords, Facebook profiles, etc., must be complex, ie they must contain uppercase and lowercase letters, numbers, and various characters, and at the same time must be easy to remember. It is important to use different passwords for different internet services.

How to remember complicated passwords?

A good password can be made if you take a sentence of a few words that you will easily remember, e.g. white red color.

To make this password even stronger, we will insert spaces between words, a few capital letters, and a couple of numbers. So our example would look like this: White Red 196. This password now contains 3 words, 2 spaces, 3 uppercase letters, and 3 different numbers.

If you want to make the password even stronger, add a symbol, e.g. asterisk, plus, parentheses, etc. Here is our example: White Red * 196 *

The password strength tool says: "It would take a desktop PC about 322 septillion years to crack your password"

What if I forget my password?

All services that require accounts offer the possibility of resetting for all those who forget the password. In this case, a new password is sent to the e-mail that was confirmed when opening the profile. This is why the password of the e-mail must be especially secure because if a hacker breaks the e-mail protection, he simply sends requests to various Internet services to send new passwords and then reads them and abuses them.

I advise you not to use programs that store various passwords.

Comments

Popular this month

The Galaxy Note was ridiculed when it appeared, and now…

Did you know that the first Samsung Galaxy Note was ridiculed by users and the media? Everyone laughed at his "huge" case and said that it would fall apart immediately after it appeared. They said that it was too big and that such a phone would never be used every day.

To click on the post or not?

Recently, Facebook has been flooded with " click bait " posts, and sometimes you don't know if there is something really useful behind that post or if it's just collecting clicks. There is a plugin that can partially reveal this to you. Nothing special, it's a Chrome extension called " Photo Zoom ". What does he actually do? Enlarges the image you hover over by loading the source address of the image . How can it help? Clickbait posts often "trick" users into clicking with an image (in addition to terrible headlines). They place those pictures so that only a part of them is visible on the Facebook wall and just enough to interest your potential. If you want to see the whole thing, you have to click on the link, which is their goal.

The difference between Sleep, Hibernate and Hybrid sleep options

What is the difference between regular Sleep mode and Hybrid sleep mode? And what is Hibernate ? I will try to explain in the simplest way possible so that everyone understands nicely. 1. Sleep When you select Sleep mode , all components of the computer except RAM are shut down to store data. So, if you do something on the computer and press Sleep, the computer shuts down and everything you did (left open windows, documents, etc.) is stored in RAM.

What is GLONASS?

If you've looked at the detailed specification of an Android or GPS device, you may have seen another term next to the GPS tag and didn't know exactly what it represents. Well,  GLONASS is a global navigation system that was started by the USSR in 1976, so this project could be taken over by Russia after the collapse of the Soviet Union.

Google highlights the problems

Google has released a new study detailing how it is becoming increasingly difficult to identify harmful websites and attacks as antivirus programs increasingly prove to be an ineffective defense against new types of attacks.