We come up with complex and easy to remember passwords

    Relatively often articles come across on a habr one way or another concerning passwords. For example, this , or this or this . The topic is interesting, and I decided to contribute.


    I have been using my method for five years, and during this time I have not forgotten any of my passwords. The average password length is 18 characters. Numbers, special characters included. I call this method the "mask method", and have already described it many times in the comments on password articles. So, a small step by step HowTo:
    1. As the name implies, you need to choose a password mask. This line should be complex, contain numbers, alphabet characters in all possible registers, special characters, etc. Remember all this billiards once. Suppose I chose the mask "MySecrEt + * ###### _ 83". Here the symbols of the gratings are not part of the mask, instead of them we will enter ...
    2. ... our association with the resource on which the password is used. For example, for Habr the final password can be "MySecrEt + * itcommunity_83". It is very important that it is your association with the resource that fits into the mask as a “salt”. The first one that came to mind. For the root account, you can use the password "MySecrEt + * dangerous_83". You can feel free to use whole words: if your mask is complex enough, searching through the dictionary will not help to reveal the password.
    3. Now, when you go to any resource, you can not wrinkle your forehead - write your secret mask and the first association. If it does not help, the second association. Third. In my experience, the worst case is three attempts. There was some unknown resource, the association with which was not entirely obvious. If nothing helps at all - well, resetting your password and establishing a new association is often very easy.

    After all these manipulations, we get a password that cannot be broken by brute force (the password for the hub in the example is 24 characters long), which is difficult to search through the dictionary (this is only possible if the mask is opened to the attacker) and is very easy to remember.

    In order to somehow distinguish between security zones, you can use different masks for different categories of resources. For example, passwords for root server accounts are one category, passwords for social networks, twitter and other things are another category, a five-minute trash is the third. This will minimize the risks of exposing the password mask.

    PS If there are any other suggestions for improvement - write in the comments.
    PPS I do not claim authorship of this technique. It is possible that someone before me suggested such a method.

    Also popular now: