{"id":11950,"date":"2016-12-05T19:58:41","date_gmt":"2016-12-06T00:58:41","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=11950"},"modified":"2016-12-05T19:58:41","modified_gmt":"2016-12-06T00:58:41","slug":"have-some-password-fun","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/have-some-password-fun\/","title":{"rendered":"Have Some Password Fun"},"content":{"rendered":"<h1>Have Some Password Fun<\/h1>\n<p>Every six months or so we like to impress upon you the benefits of using secure passwords. And every six months or so, we know our advice is falling on deaf ears. But we&#8217;re nothing if not intrepid.<\/p>\n<p>Now, you may think passwords are boring troublesome &#8211; because sometimes you can&#8217;t remember them &#8211; but t oday, we&#8217;re going to have fun with passwords. So even if you don&#8217;t take our warnings about using secure passwords seriously, you&#8217;ll have fun with this password-o-meter we are about to let you feast your eyes upon.<\/p>\n<p>We&#8217;re doing to intro the site first and then we&#8217;re going to show you some examples; a show and tell kind of thing.<\/p>\n<p>The site is called My1Login. On the site there&#8217;s a password-o-meter (we made that word up &#8211; phrase up?) with which you can test the strength of your passwords. It will show you how long it would take to crack you passwords using the standard hacker tools that guess billions of combinations a second &#8211; and yours might be one of those combinations, especially if it is a weak password.<\/p>\n<p>Here&#8217;s what the folks at My1Login have to say about Passwords &#8211; may their words not fall upon blind eyes:<\/p>\n<p>&#8220;<em>Is it actually safe to use Password Checkers?<\/em><\/p>\n<p>If you\u2019re reading this section, then good \u2013 the quickest way to get hacked online is to be too trusting or assume websites are automatically safe. It\u2019s good to be cautious and it\u2019s never a good idea to enter your legitimate credentials into any website you are not confident about. The ones to watch especially are those who ask you to input your credentials.<\/p>\n<p>So, why is this Password Strength Meter safe?<\/p>\n<p>The passwords you type never leave your browser and we don\u2019t store them (You can disconnect your internet connection and then try it if you wish)<\/p>\n<p>All the checking is done on the page you\u2019re on, not on our servers<\/p>\n<p>Even if the password was sent to us, we wouldn\u2019t actually know who you were anyway \u2013 so couldn\u2019t match it up to any usernames or any websites you may visit<\/p>\n<p>We\u2019re in the business of making people more secure online and the last thing we want to see is passwords being transmitted across the internet insecurely.<\/p>\n<p>How does My1Login&#8217;s Password Strength Checker work?<\/p>\n<p><em>The password strength calculator uses a variety of techniques to check how strong a password is. It uses common password dictionaries, regular dictionaries, first name and last name dictionaries and others. It also performs substitution attacks on these common words and names, replacing letters with numbers and symbols \u2013 for example it\u2019ll replace A\u2019s with 4\u2019s and @\u2019s, E\u2019s with 3\u2019s, I\u2019s with 1\u2019s and !\u2019s and many more. Substitution is very typical by people who think they\u2019re making passwords stronger \u2013 hackers know this though so it\u2019s one of the first things hacking software uses to crack a password<\/em><\/p>\n<p>The password strength meter checks for sequences of characters being used such as &#8220;12345&#8221; or &#8220;67890&#8221;<br \/>\nIt even checks for proximity of characters on the keyboard such as &#8220;qwert&#8221; or &#8220;asdf&#8221;.<\/p>\n<p>Common mistakes and misconceptions<\/p>\n<p>Replacing letters with digits and symbols. This technique is well known to hackers so swapping an &#8220;E&#8221; for a &#8220;3&#8221; or a &#8220;5&#8221; for a &#8220;$&#8221; doesn&#8217;t make you much more secure<\/p>\n<p>That meeting the minimum requirements for a password makes it strong. By today&#8217;s standards, an 8-character password won&#8217;t make you very secure<\/p>\n<p>That it\u2019s fine to use the same password a lot as long as it\u2019s strong \u2013 what if the website is hacked? Do you know how the website stores your password? What if they store it in plaintext?<\/p>\n<p>Guilty<\/p>\n<p>Weak practices \u2013 storing passwords in the notes field on your phone, does it auto sync to the cloud, iCloud or Dropbox.<\/p>\n<p>Putting them in a spreadsheet, even password protecting a spreadsheet doesn\u2019t keep the information safe. Check out our blog on this and other security subjects. https:\/\/blog.my1login.com\/<\/p>\n<p>What makes a strong password?<\/p>\n<p>A strong password is one that\u2019s either not easily guessed or not easily brute forced. To make it not easily guessed it can\u2019t be a simple word, to make it not easily cracked it needs to be long and complex. Super computers can go through billions of attempts per second to guess a password. Try to make your passwords a minimum of 14 characters.<\/p>\n<p>Passphrase<\/p>\n<p>A passphrase is simply a password, that\u2019s longer, it could be a sentence, with spaces and punctuation in it. The benefit of a passphrase is that typically they\u2019re easier to remember, but more difficult to crack due to their length. For every additional character in the length of a password or passphrase, the time it would take to break increases exponentially. Ultimately that means that having a long password or passphrase can make you far more secure than having a short one with some symbols or numbers in it&#8230;&#8221;<\/p>\n<p>Now for the fun:<\/p>\n<p class=\"auto-style747\"><img decoding=\"async\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2016\/password2016.png\" \/><\/p>\n<p>Above, we generated a 15-character password using the password generator in LastPass. I don&#8217;t even think EB will still be around 73 trillion years ago. In the screenshot above we&#8217;re showing you the password because we could not care less. It&#8217;s not our password. Feel free to use it as your own.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2016\/password2016-a.png\" \/><br \/>\nBut let&#8217;s just say you&#8217;re the fussy type and you don&#8217;t think 73 trillion years is good enough &#8211; you&#8217;re the kind that always wants bigger, better, newer, etc. You are the kind of person who always wants more. How about 509 billion trillion years? As you can see it&#8217;s a pass phrase that I can actually remember as long as I remember EB was born in 1906. Even the cantankerous EB cannot possibly live 509 billion trillion years &#8211; not even if just to aggravate me.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2016\/password2016-b.png\" width=\"681\" height=\"458\" \/><\/p>\n<p>Above you can see a password that would only take a hacker 27.08 seconds to crack. And we&#8217;ll bet that someone(probably many of you) reading this has a very similar password and they use that password on more than one site. Is it YOU?<\/p>\n<p><span class=\"auto-style774\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2016\/password2016-c.png\" width=\"600\" height=\"355\" \/><\/span><\/p>\n<p>OK now let&#8217;s go to extreme. Do you think hackers will be around six trillion trillion years from now? Don&#8217;t think so! As you can see all I did was take a line from a Beatles&#8217; song and put dollar signs at each end. That&#8217;s called a passphrase&#8230;and it&#8217;s something I can remember &#8211; even hum or sing to myself&#8230;or if you like, call me and I&#8217;ll sing it to you. Rock on, Paul.<\/p>\n<p>Are you ready to have fun testing your passwords and experimenting with very secure yet easy to remember passphrases. <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.my1login.com\/resources\/password-strength-test\/\">OK you can test your passwords by heading to this page .<\/a><\/span><\/p>\n<p>Oh, yes, and one more thing: They offer a free password manager too. If you don&#8217;t have one, you need one. There is no way the average human brain can remember different passwords for dozens of Web sites &#8211; especially long and strong ones. Yes, EB? Perhaps there are savants out there who can, that&#8217;s true. Yes, EB, maybe even Las Vegas card counters. But that&#8217;s not most of us, you know!<\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.my1login.com\/resources\/password-strength-test\/\"><strong>Have some fun with passwords right now<\/strong><\/a>!<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"auto-style788\" src=\"http:\/\/thundercloud.net\/infoave\/images\/2014\/premium-line.png\" alt=\"Cloudeight InfoAve\" width=\"600\" height=\"2\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have Some Password Fun Every six months or so we like to impress upon you the benefits of using secure passwords. And every six months or so, we know our advice is falling on deaf ears. But we&#8217;re nothing if not intrepid. Now, you may think passwords are boring troublesome &#8211; because sometimes you can&#8217;t remember them &#8211;\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/have-some-password-fun\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1462,1433,1678,1656],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/11950"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=11950"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/11950\/revisions"}],"predecessor-version":[{"id":11951,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/11950\/revisions\/11951"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=11950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=11950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=11950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}