Tips For Making a Strong Password

There are so many bad Hackers outside there, and the will not stop  at nothing to get into your network and files.  They usually use three types of different methods to get  your password like brute force attack, dictionary attack, and social engineering.The most widely used method by them are using brute force .

Basically, it involves a program that tries every combination of letters, numbers, and keyboard characters to guess your password. The longer the password is, the more difficult it becomes to crack.

A strong password must contain eight characters in length and utilizes lower and upper case letters, numbers, and keyboard characters. With that kind type of password, hacker would need at least 2 years to crack it.

Because currently attacks are becoming more advanced  by using sophisticated software , I suggest that you don’t want to use something  in your password that belongs to your personal and easy to guess. Here are those things which I quoted from microsoft that you must not do in order to create a stong password:


  • Don’t use only letters or only numbers.
  • Don’t use names of spouses, children, girlfriends/boyfriends or pets.
  • Don’t use phone numbers, Social Security numbers or birthdates.
  • Don’t use the same word as your log-in, or any variation of it.
  • Don’t use any word that can befound in the dictionary — even foreign words.
  • Don’t use passwords with double letters or numbers.

Besides those “don’ts” things, I have tips that will help you to create a strong password but easy to remember. Pick a sentence that you remember most then make a password from it. For example: I Have a Dream Last Night With My Girlfriend is become IHdL4stN16hwMG

Thats all my tips for creating a strong password. Remember to practice to create a strong passwod in order hackers are not able easier to guess or crack your password.


0 0 votes
Article Rating

We are teams that have the same hobbies in Information Technologies and have experienced in many fields regarding Information Technologies .

Related Articles

Notify of
Inline Feedbacks
View all comments
Would love your thoughts, please comment.x