This document discusses password protection and provides tips for creating strong passwords. It outlines forms of protection like passwords, two-factor authentication, and biometrics. It emphasizes that passwords are still widely used and recommends passwords be 10-14 random characters combining letters, numbers, and symbols. The document warns that hackers have tools that can crack simple passwords very quickly and stresses the importance of unique, hard to guess passwords and regularly changing them.
This document discusses password protection and provides tips for creating strong passwords. It outlines forms of protection like passwords, two-factor authentication, and biometrics. It emphasizes that passwords are still widely used and recommends passwords be 10-14 random characters combining letters, numbers, and symbols. The document warns that hackers have tools that can crack simple passwords very quickly and stresses the importance of unique, hard to guess passwords and regularly changing them.
This document discusses password protection and provides tips for creating strong passwords. It outlines forms of protection like passwords, two-factor authentication, and biometrics. It emphasizes that passwords are still widely used and recommends passwords be 10-14 random characters combining letters, numbers, and symbols. The document warns that hackers have tools that can crack simple passwords very quickly and stresses the importance of unique, hard to guess passwords and regularly changing them.
This document discusses password protection and provides tips for creating strong passwords. It outlines forms of protection like passwords, two-factor authentication, and biometrics. It emphasizes that passwords are still widely used and recommends passwords be 10-14 random characters combining letters, numbers, and symbols. The document warns that hackers have tools that can crack simple passwords very quickly and stresses the importance of unique, hard to guess passwords and regularly changing them.
K.NITHIYANANTHAM B.SURESH R.AJITH A.BARVEEN Password Protection: How Safe Are Your Passwords? Overview
• About the Program
• Forms of Protection • Why Passwords? • Good Password Tips • Hacking Passwords • Testing our outputs Forms of Protection • Passwords • Two-factor Authentication – i.e. a password and image • Biometrics – Fingerprints, eye scans, etc. • Tokens – A piece of technology that only you can use to login somewhere. Why Passwords? • Passwords are here to stay • Why!? – Passwords are easy to remember. – Are used for almost everything. – Are still wonderful if created and protected well. Good Password Tips • If allowed, passwords should: – Be 10-14 characters long – Have lower and upper case letters, numbers and symbols. – Be something unique to you that you will remember. Hacking Passwords • Password protection is very important. • Hackers have tools now to find a password almost immediately. – Tools today can figure out simple passwords in under 0.23 milliseconds! • Tool: Even Celebrities Are Affected Testing Our program Password Rules • Remember the password Dos and Don’ts: • Do – Do have at least 10-14 characters. – Do have letters, numbers, AND symbols. – Do change your passwords regularly. • Don’t – Don’t reuse passwords. – Don’t use personal information that is easy to guess. – Don’t use commonly used passwords.