SlideShare a Scribd company logo
1 of 12
Download to read offline
six sexy ways to create a
hack-proof Password
1.The Condensed Sentence Solution
2.The Arbitrary Passphrase Paradigm
3.The Two-Word Shuffle Subterfuge
4.The One-Space-Over Operation
5.The Wheel of Fortune Configuration
6.The My Favourite Line Recombination
Password security is crucial in today’s digital age. Your
passwords enable access to your bank, credit card information
and much more. Hackers have tools that can attempt
thousands of logins per hour by generating passwords based
on your personal information, from phone numbers and
addresses to children’s names and birthdays.
Once a hacker has just one of your
logins, he can usually access more
of your private information and
wreak havoc on your personal and
financial life.
Here are six ways to devise super-
strong, secure passwords and beat
hackers at their own game.
1.The Condensed Sentence Solution
Think of a sentence that’s easy for you to remember. Maybe it’s something like
“My mother was the very best pastry cook in all of Wales”. Now take the first
letter of each word and turn the sentence into a password.
In this case, your password would be
“MmwtvbpciaoW”.
At 12 characters, this is a very strong password. If you want to add
a number and a symbol, just slightly alter your sentence to “My mother
was the # 1 pastry cook in all of Wales” for an easy-to-remember, hack
proof password that reads, “Mmwt#1pciaoW”.
2.The Arbitrary Passphrase Paradigm
One way to create an all but uncrackable passphrase that you’ll have no trouble
remembering is by juxtaposing entirely random words that only make sense to YOU.
For example, say you like cats. And your grandfather was a plumber. And you went to
Germany for your gap year. And your favourite food is shellfish.
Now construct a phrase with this information. Such as “kittywrenchautobahnlobster”.
Or “felineWCOktoberfestprawns”. In two seconds, you’ll have your new password
memorised, but the likelihood of anyone guessing it is next to nil.
Pick two words that mean something to you. What are your favourite pastimes?
Football and bowling? Now combine them into one word by alternating their letters.
That gives you “fbooowtlbianlgl”.
It might take you a few minutes to get the hang of typing it, so try typing “f o o t b a l l”
and then filling in the spaces with the letters in “bowling”. You’ll catch on.
3.The Two-Word Shuffle Subterfuge
4.The One-Space-
Over Operation
Choose a simple, easy to remember password, but whenever you type it, put your fingers
on the wrong keys either one key to the left or right. Let’s try one key to the right.
Suddenly an easy-to-guess password like “Ilovespaghetti” becomes “O;pbrd[shryyo” ,
which is pretty uncrackable.
One caveat: this is obviously not the ideal solution for a two finger typist.
Another hard to crack option is to pick
a pattern on the keyboard and just
start typing. For example, by typing a
counter-clockwise circle around the
letter d, you could obtain «rewsxcvf».
Likewise, a clockwise jaunt around
the letter k could result in “kjuiol,m”.
Your only job is to remember where
you started, what direction you went
in, and where you stopped. Easy,
right? Or was it left?
5.The Wheel of Fortune Configuration
D
6.The My Favourite Line
Recombination
Pick a favourite line from a book, a film,
a poem, even a nursery rhyme. Let’s try it
with the famous line from Forrest Gump:
«Life is a box of chocolates, Forrest. You
never know what you’re gonna get.» Now
choose two letters that you’ll replace
with numbers. Not the usual “3” for “E”:
be creative!
Let’s use 5 for the letter i, and 8 for the
letter g. Next, just as in The Condensed
Sentence Solution, type the first letter of
each word, but replace e with 5 and g
with 8. Here’s your new password:
“L5abocFYnkwy88”. It’ll take a bit of
getting used to, but soon it will become
second nature. And pick your own
favourite line – hackers know the most
famous ones!
Now that you’ve got a hack-proof
password system ...
...you probably think you have to create a new one for each of your accounts. But there’s
an easy trick you can use that not only lets you reuse your killer password for other sites
but actually makes them even stronger!
Just take the first three letters of the site or service you’re using and add them
to the beginning or end of your amazing, bullet-proof password. Let’s use your
“felineWCOktoberfestprawns” password as the root. On Amazon, your password
could be “felineWCOktoberfestprawnsAMA”; for your online bank account, it could be
“BNKfelineWCOktoberfestprawns”;
The all caps appended letters boost your security. You can use this method for online
shopping, social networks, whatever you want. It’s like having a thousand unforgettable,
unhackable passwords!
TIPS FOR MANAGING
INNOVATION
SHAKE UP YOUR BUSINESS
3
MORE TIPS AND ADVICE
ON COLLABORATION
AT THE ARKADIN BLOG!
FOLLOW OUR SOCIAL MEDIA
FOR THE LATEST!

More Related Content

More from The Cloud Communications division of NTT Ltd.

More from The Cloud Communications division of NTT Ltd. (20)

Bir ArkadinVision Kullanıcısının Hayatından Bir Gün
Bir ArkadinVision Kullanıcısının Hayatından Bir GünBir ArkadinVision Kullanıcısının Hayatından Bir Gün
Bir ArkadinVision Kullanıcısının Hayatından Bir Gün
 
Spotkania tak wyjątkowe jak Ty
Spotkania tak wyjątkowe jak TySpotkania tak wyjątkowe jak Ty
Spotkania tak wyjątkowe jak Ty
 
Dzień z życia użytkownika ArkadinVision
Dzień z życia użytkownika ArkadinVisionDzień z życia użytkownika ArkadinVision
Dzień z życia użytkownika ArkadinVision
 
Schůzky a konference jsou jedinečné jako vy
Schůzky a konference jsou jedinečné jako vySchůzky a konference jsou jedinečné jako vy
Schůzky a konference jsou jedinečné jako vy
 
Všední den v životě uživatele ArkadinVision
Všední den v životě uživatele ArkadinVisionVšední den v životě uživatele ArkadinVision
Všední den v životě uživatele ArkadinVision
 
How Much Energy Would Your Business Save With Remote Working
How Much Energy Would Your Business Save With Remote WorkingHow Much Energy Would Your Business Save With Remote Working
How Much Energy Would Your Business Save With Remote Working
 
10 ways to master the art of productivity Bruce Lee style
10 ways to master the art of productivity Bruce Lee style10 ways to master the art of productivity Bruce Lee style
10 ways to master the art of productivity Bruce Lee style
 
The heroic journey to the digital workplace: Our hero returns
The heroic journey to the digital workplace: Our hero returnsThe heroic journey to the digital workplace: Our hero returns
The heroic journey to the digital workplace: Our hero returns
 
7 pieces of furniture that increase your productivity
7 pieces of furniture that increase your productivity7 pieces of furniture that increase your productivity
7 pieces of furniture that increase your productivity
 
Top 7 tools to supercharge your team based collaboration
Top 7 tools to supercharge your team based collaborationTop 7 tools to supercharge your team based collaboration
Top 7 tools to supercharge your team based collaboration
 
Arkadin Value Prop video
Arkadin Value Prop videoArkadin Value Prop video
Arkadin Value Prop video
 
Arkadin value prop Event
Arkadin value prop EventArkadin value prop Event
Arkadin value prop Event
 
Arkadin value prop Corporate
Arkadin value prop CorporateArkadin value prop Corporate
Arkadin value prop Corporate
 
Arkadin totalconnect microsoft-ebook_fr
Arkadin totalconnect microsoft-ebook_frArkadin totalconnect microsoft-ebook_fr
Arkadin totalconnect microsoft-ebook_fr
 
The heroic journey to the digital workplace: Our hero rises
The heroic journey to the digital workplace: Our hero risesThe heroic journey to the digital workplace: Our hero rises
The heroic journey to the digital workplace: Our hero rises
 
How Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising StatsHow Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising Stats
 
The heroic journey to the digital workplace: Our hero sets out
The heroic journey to the digital workplace: Our hero sets outThe heroic journey to the digital workplace: Our hero sets out
The heroic journey to the digital workplace: Our hero sets out
 
The 6 worst habits affecting your productivity
The 6 worst habits affecting your productivityThe 6 worst habits affecting your productivity
The 6 worst habits affecting your productivity
 
HR - Your role in creating a digital workplace
HR - Your role in creating a digital workplaceHR - Your role in creating a digital workplace
HR - Your role in creating a digital workplace
 
Top Collaboration Challenges for Techies
Top Collaboration Challenges for TechiesTop Collaboration Challenges for Techies
Top Collaboration Challenges for Techies
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

6 sexy ways to create a Hack-proof Password

  • 1. six sexy ways to create a hack-proof Password
  • 2. 1.The Condensed Sentence Solution 2.The Arbitrary Passphrase Paradigm 3.The Two-Word Shuffle Subterfuge 4.The One-Space-Over Operation 5.The Wheel of Fortune Configuration 6.The My Favourite Line Recombination
  • 3. Password security is crucial in today’s digital age. Your passwords enable access to your bank, credit card information and much more. Hackers have tools that can attempt thousands of logins per hour by generating passwords based on your personal information, from phone numbers and addresses to children’s names and birthdays. Once a hacker has just one of your logins, he can usually access more of your private information and wreak havoc on your personal and financial life. Here are six ways to devise super- strong, secure passwords and beat hackers at their own game.
  • 4. 1.The Condensed Sentence Solution Think of a sentence that’s easy for you to remember. Maybe it’s something like “My mother was the very best pastry cook in all of Wales”. Now take the first letter of each word and turn the sentence into a password. In this case, your password would be “MmwtvbpciaoW”.
  • 5. At 12 characters, this is a very strong password. If you want to add a number and a symbol, just slightly alter your sentence to “My mother was the # 1 pastry cook in all of Wales” for an easy-to-remember, hack proof password that reads, “Mmwt#1pciaoW”.
  • 6. 2.The Arbitrary Passphrase Paradigm One way to create an all but uncrackable passphrase that you’ll have no trouble remembering is by juxtaposing entirely random words that only make sense to YOU. For example, say you like cats. And your grandfather was a plumber. And you went to Germany for your gap year. And your favourite food is shellfish. Now construct a phrase with this information. Such as “kittywrenchautobahnlobster”. Or “felineWCOktoberfestprawns”. In two seconds, you’ll have your new password memorised, but the likelihood of anyone guessing it is next to nil.
  • 7. Pick two words that mean something to you. What are your favourite pastimes? Football and bowling? Now combine them into one word by alternating their letters. That gives you “fbooowtlbianlgl”. It might take you a few minutes to get the hang of typing it, so try typing “f o o t b a l l” and then filling in the spaces with the letters in “bowling”. You’ll catch on. 3.The Two-Word Shuffle Subterfuge
  • 8. 4.The One-Space- Over Operation Choose a simple, easy to remember password, but whenever you type it, put your fingers on the wrong keys either one key to the left or right. Let’s try one key to the right. Suddenly an easy-to-guess password like “Ilovespaghetti” becomes “O;pbrd[shryyo” , which is pretty uncrackable. One caveat: this is obviously not the ideal solution for a two finger typist.
  • 9. Another hard to crack option is to pick a pattern on the keyboard and just start typing. For example, by typing a counter-clockwise circle around the letter d, you could obtain «rewsxcvf». Likewise, a clockwise jaunt around the letter k could result in “kjuiol,m”. Your only job is to remember where you started, what direction you went in, and where you stopped. Easy, right? Or was it left? 5.The Wheel of Fortune Configuration D
  • 10. 6.The My Favourite Line Recombination Pick a favourite line from a book, a film, a poem, even a nursery rhyme. Let’s try it with the famous line from Forrest Gump: «Life is a box of chocolates, Forrest. You never know what you’re gonna get.» Now choose two letters that you’ll replace with numbers. Not the usual “3” for “E”: be creative! Let’s use 5 for the letter i, and 8 for the letter g. Next, just as in The Condensed Sentence Solution, type the first letter of each word, but replace e with 5 and g with 8. Here’s your new password: “L5abocFYnkwy88”. It’ll take a bit of getting used to, but soon it will become second nature. And pick your own favourite line – hackers know the most famous ones!
  • 11. Now that you’ve got a hack-proof password system ... ...you probably think you have to create a new one for each of your accounts. But there’s an easy trick you can use that not only lets you reuse your killer password for other sites but actually makes them even stronger! Just take the first three letters of the site or service you’re using and add them to the beginning or end of your amazing, bullet-proof password. Let’s use your “felineWCOktoberfestprawns” password as the root. On Amazon, your password could be “felineWCOktoberfestprawnsAMA”; for your online bank account, it could be “BNKfelineWCOktoberfestprawns”; The all caps appended letters boost your security. You can use this method for online shopping, social networks, whatever you want. It’s like having a thousand unforgettable, unhackable passwords!
  • 12. TIPS FOR MANAGING INNOVATION SHAKE UP YOUR BUSINESS 3 MORE TIPS AND ADVICE ON COLLABORATION AT THE ARKADIN BLOG! FOLLOW OUR SOCIAL MEDIA FOR THE LATEST!