Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

How to choose a secure password?

How to choose a secure password?

The time has come when every average Internet user has more than two accounts at different web addresses that require opening their own profile.

It is necessary to assign a password to each open profile, and this is where the problems arise, which is why I am writing this article.

The problem is that passwords, and especially those with important data such as emails, internet banking passwords, Facebook profiles, etc., must be complex, ie they must contain uppercase and lowercase letters, numbers, and various characters, and at the same time must be easy to remember. It is important to use different passwords for different internet services.

How to remember complicated passwords?

A good password can be made if you take a sentence of a few words that you will easily remember, e.g. white red color.

To make this password even stronger, we will insert spaces between words, a few capital letters, and a couple of numbers. So our example would look like this: White Red 196. This password now contains 3 words, 2 spaces, 3 uppercase letters, and 3 different numbers.

If you want to make the password even stronger, add a symbol, e.g. asterisk, plus, parentheses, etc. Here is our example: White Red * 196 *

The password strength tool says: "It would take a desktop PC about 322 septillion years to crack your password"

What if I forget my password?

All services that require accounts offer the possibility of resetting for all those who forget the password. In this case, a new password is sent to the e-mail that was confirmed when opening the profile. This is why the password of the e-mail must be especially secure because if a hacker breaks the e-mail protection, he simply sends requests to various Internet services to send new passwords and then reads them and abuses them.

I advise you not to use programs that store various passwords.

Comments

Popular this month

How to ROOT a phone in 30 seconds

Recently, an application appeared that ROOTs some Android devices in a few seconds! You don't need Odin or anything else, just that app, and in a few seconds, your phone is rooted. An app called  ExynosAbuse can be found on the XDA forum, downloaded, and installed for free on your phone. After starting, all you have to do is press " Root device " and it will do its job in a few seconds. You don't even have to restart your phone, you will only be notified that the ROOT has passed successfully and you will see the SuperSu icon.

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .

Create your own data encryption program

Create a data encryption program in Notepad in 3 minutes! How? All you need is Notepad++ (maybe a regular Notepad). If you are ready to get started!

YouTube Vanced is down! These are alternatives

The popular replacement for the YouTube app - Vanced - will no longer be available for download. Namely, the authors (due to "legal reasons") had to stop the development of their application and announce that the download links will be unavailable soon.

Hacker Typer - Knock like a hacker!

Hacker Typer is a site where you can type in the console like a real hacker! Just open the site  hackertyper.net , select the background color, text color, file type, and typing speed, and press " Hack ".