O'Reilly logo

Passwords & Internet Addresses Journal For Dummies by Ryan C. Williams

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

What's the Secret Password?

images

In This Chapter

  • Understanding password vulnerabilities
  • Picking a quality password
  • Using encryption
  • Storing and remembering your passwords

images

Some computers already allow you to access your information with fingerprints and other biometric scanners. However, those methods usually work for hardware only. If you want to get anything done on the Internet, you need passwords — many, many, many passwords. This chapter takes a look at all of those passwords (and security questions, as well) and what you can do to make them less hackable.

images

Hackable doesn't just refer to evil computer geniuses working their way into your computer to ferret out your most important data. The term also refers to far more common social engineering, in which people pair knowledge about you with other techniques to guess or obtain your passwords.

Choosing and Protecting Passwords

When you set up an e-mail account — or any account — on the Internet, you have to set a password, which is the keyword you type in to confirm your sign-in along with your user ID. Passwords are not only used in e-mail, but also on almost every website you become a member of, and with many apps and devices. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required