View Single Post
Old 06-27-2011, 03:18 PM   #6
LaneyDoll
Senior Member

How Do You Identify?:
Girly girl femme
Preferred Pronoun?:
She; Ma'am; Miss ;)
Relationship Status:
Pitbull protected.
 

Join Date: Apr 2011
Location: Birmingham, AL
Posts: 2,204
Thanks: 6,892
Thanked 7,683 Times in 1,607 Posts
Rep Power: 21474853
LaneyDoll Has the BEST ReputationLaneyDoll Has the BEST ReputationLaneyDoll Has the BEST ReputationLaneyDoll Has the BEST ReputationLaneyDoll Has the BEST ReputationLaneyDoll Has the BEST ReputationLaneyDoll Has the BEST ReputationLaneyDoll Has the BEST ReputationLaneyDoll Has the BEST ReputationLaneyDoll Has the BEST ReputationLaneyDoll Has the BEST Reputation
Default

Quote:
Originally Posted by dreadgeek View Post
1) Creating a strong password. I use a cipher technique to make any password that I think I might have to type in (like the password to login to my laptop or my workstation). Take a word or phrase you will remember, then shift your keystrokes in some direction. For example, if you take applepie (which would be a horrible password) and shift it up and left you get
Q00o3083. If you want to be really crafty you can change some of those numbers into symbols so Q00o#)83. Now, someone attempting to break your password has to to determine what your starting word is and what your cipher scheme is. With this, even an 8-character password becomes unguessable by sheer luck or brute force.
I love this! I can take my fave passwords, move my fingers up to another row ot two of keys and still have the familiarity of the keystrokes, without the security risk of my "fave passwords."

__________________
There are beauties who stop traffic and then there are beauties who grow obsessively in the hearts of the susceptible.
LaneyDoll is offline   Reply With Quote