{"id":1337,"date":"2012-03-02T15:53:54","date_gmt":"2012-03-02T08:53:54","guid":{"rendered":"http:\/\/www.jaringankita.com\/blog\/?p=1337"},"modified":"2012-07-25T21:37:07","modified_gmt":"2012-07-25T14:37:07","slug":"tips-for-making-a-strong-password","status":"publish","type":"post","link":"https:\/\/www.jaringankita.com\/blog\/tips-for-making-a-strong-password","title":{"rendered":"Tips For Making a Strong Password"},"content":{"rendered":"<p><a href=\"https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2012\/03\/password.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1338 aligncenter\" title=\"password\" src=\"https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2012\/03\/password-300x199.jpg\" alt=\"\" width=\"234\" height=\"155\" srcset=\"https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2012\/03\/password-300x199.jpg 300w, https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2012\/03\/password.jpg 425w\" sizes=\"auto, (max-width: 234px) 100vw, 234px\" \/><\/a>There are so many bad Hackers outside there, and the will not stop\u00a0 at nothing to get into your network and files.\u00a0 They usually use three types of different methods to get\u00a0 your password like brute force attack, dictionary attack, and social engineering.The most widely used method by them are using brute force .<\/p>\n<p>Basically, it involves a program that tries every combination of letters, numbers, and keyboard characters to guess your password. The longer the password is, the more difficult it becomes to crack.<\/p>\n<p>A strong password must contain eight characters in length and utilizes lower and upper case letters, numbers, and keyboard characters. With that kind type of password, hacker would need at least 2 years to crack it.<\/p>\n<p>Because currently attacks are becoming more advanced\u00a0 by using sophisticated software , I suggest that you don&#8217;t want to use something\u00a0 in your password that belongs to your personal and easy to guess. Here are those things which I quoted from microsoft that you must not do in order to create a stong password:<\/p>\n<p>&nbsp;<\/p>\n<div>\n<ul>\n<li>Don&#8217;t use only letters or only numbers.<\/li>\n<li>Don&#8217;t use names of spouses, children, girlfriends\/boyfriends or pets.<\/li>\n<li>Don&#8217;t use phone numbers, Social Security numbers or birthdates.<\/li>\n<li>Don&#8217;t use the same word as your log-in, or any variation of it.<\/li>\n<li>Don&#8217;t use any word that can befound in the dictionary \u2014 even foreign words.<\/li>\n<li>Don&#8217;t use passwords with double letters or numbers.<\/li>\n<\/ul>\n<\/div>\n<p>Besides those &#8220;don&#8217;ts&#8221; things, I have tips that will help you to create a strong password but easy to remember. Pick a sentence that you remember most then make a password from it. For example: I Have a Dream Last Night With My Girlfriend is become IHdL4stN16hwMG<\/p>\n<p>Thats all my tips for creating a strong password. Remember to practice to create a strong passwod in order hackers are not able easier to guess or crack your password.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are so many bad Hackers outside there, and the will not stop\u00a0 at nothing to get into your network and files.\u00a0 They usually use three types of different methods to get\u00a0 your password like brute force attack, dictionary attack, and social engineering.The most widely used method by them are using brute force . Basically, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":1338,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29,765],"tags":[624,625,815,816],"class_list":["post-1337","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","category-knowledge-base","tag-cracker","tag-hacker","tag-password","tag-password-cracker"],"_links":{"self":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts\/1337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/comments?post=1337"}],"version-history":[{"count":8,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts\/1337\/revisions"}],"predecessor-version":[{"id":1580,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts\/1337\/revisions\/1580"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/media\/1338"}],"wp:attachment":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/media?parent=1337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/categories?post=1337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/tags?post=1337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}