Test the strength of a password and its security

It's not new, the password argument, in this blog and in other articles, in fact, the problem of protecting your computer from external attacks has been addressed.
In posts such as "recovering lost PC passwords or lost internet" or "entering a PC from the outside", it was stressed that, in the vast majority of cases, a hacker must thank the naivete, the imprudence or "ignorance "of the user, if he manages to penetrate a computer or a network (see also" default password on routers "which testifies how many leave their network access uncovered).
Unless sensational cases, in fact, a computer or a network protected according to normal standards is almost impenetrable and since most people do not manage company databases and do not have a computer that contains sensitive data of other people, it is implausible that an experienced hacker would waste time forcing a private pc .
Normal security standards are met if you have an updated PC, an excellent antivirus always updated, a firewall software and, at most, an antispyware.
However the internet remains dangerous because surfing is easily distracted and more vulnerable.
While on the one hand trust in payment and banking tools on the internet has rightly grown, cybercriminals' attempts to steal data and passwords to steal money have also increased.
In this article, therefore, we try to understand how to set a strong password with a tool that simulates the behavior of a hacker who wants to discover it.

The procedure for discovering a password is called Brute Force which is basically nothing more than the work done by particular programs, which are easily found on the internet, which quickly scan all possible combinations of letters, numbers and symbols until they find the password. to access.
The problem with Brute Force procedures is that if the password is long enough and with alphanumeric characters, it can take up to 6 months to find a password.
The tool offered by the Hackosis website allows you to find out how long it would take, for a normal computer running a brute force program, to find out the password used .
The goodness of the tool is that it does not ask you to enter your password but asks how many characters it is, how many numbers there are, how many capital letters, how many symbols and special characters.
The tool has no scientific evidence but, presumably, it is very close to the real value of the time it takes to discover a password.
For example, a password consisting of seven lowercase characters and a number is discovered in 29 minutes, while a password consisting of 7 uppercase letters, 7 lowercase letters 7, a number and a special character can be found in 3129145610.89 days
Another online tool for measuring the strength of a password can be found on the Password Meter website which is used to generate a strong and secure password and to test the password used.
Easier to use and understand is the HowSecureismypassword website that tests to see how long it would take a bruteforce program to find out a password.
I personally believe that, if a private PC is kept in normal security, the access password can also be kept short of 8 characters with a couple of numbers; nobody would lose 3 days to crack the password of a private pc.
On the internet, you can always use the same 7/8 character password to sign up for one hundred forums and pure entertainment services.
For banking and important services, on the other hand, it is necessary to use more complex passwords using alphanumeric characters even if most websites block accesses as if they were an ATM if they notice bruteforce attacks.
So the most important thing is not to ever access external links or e-mails to services on the internet where it is really money and to always check that in the address bar of banking sites or online purchases, there is the https that testifies to the use of protected certificates.
In another article, the best internet password management strategies .

Leave Your Comment

Please enter your comment!
Please enter your name here