You must be using your password to access information in your computer and in your on line transaction. The main purpose of a password is to guard something of yours. Password should be strong enough so that it can not be broken by wild guessing or by brute force method that hackers use from time to time. This article gives you the tips about how to check the password security.
- Hard to Guess: You should select a password in such a way that it is difficult to guess. You can secure your password in an improved way by mixing different set of characters. It can be uppercase and lowercase characters, numbers or could be a combination of special character like ‘&’ or ‘%’. Also, long password gives you better protection from intrusion because there are very few words that are more than 12 characters long.
- Different Login : It is a good idea for you to use different username and password to access different login screens. In that way, if hackers break one password, others are still going to be safe. If you have multiple password in your organization, you can use password database. One master password can be used to lock rest of the passwords in the database. Also, you must change your password periodically.
- Password Authentication: Most of the webmail users are familiar with password resetting question. How secret is the “secret question”- is a million dollar question. As per the study, brute forcing attempts against the security questions is a feasible attack tactic. The study further says that participants forgot 20% of their own answers within six months. 13% of answers could be guessed within five attempts by guessing the most popular answers of other participants.
- Password Checker: Windows users can use Microsoft Password Checker to protect online accounts, computer files or personal information. Password Checker does not collect, store, or transmit information beyond the computer that you use to access Password Checker.
- PAM Security Module: A system administrator can use Pluggable Authentication Modules (PAM) to enforce a password policy on a Linux system. PAM provides the administrator the choices over password length, the choice of passwords, and password aging.
- Password Encryption: We use the password encryption tool Host On-Demand in our organization. The tool is a command-line tool that allows you to generate a file that stores the encrypted password, which you must then copy to the appropriate place in the web.xml file. The Host Credential plug-in decrypts the password before using it.