If you want to avoid hacking, get to know the password well.
How the online security system works
All these facts through the login button with security systems that all data on the server is present in the test and inapuna committed data in the server, the krrta information (account open when personal information was at that) coincides with the security systems account eksasesa the match if you do not Do not give access.
Now let's know how hackers steal the account information (email, username, password)
Hacker hacks many passwords, including:
Social Engineering Attack or Social Attack
Phishing Attack
Sniffing Attack
What is Social Engineering Attack or Social Attack?
Trying to hack, guess on Social Engineering Attack or Social Attack. If a hacker hacks a social attack to hack my Facebook ID, then I will try to log in with my phone number or email address as shamolsingha, 123456 or my phone number as my password.
What is a phishing attack?
Phishing attacks are easy and so effective, so hackers do more with the Phishing Attack. There is a tune of Prosecution with phishing attack. If you follow the tune, then you will know about phishing, need to know about the tune here to prevent hacking from phishing.
What is Sniffing Attack?
Sniffing Attack The Most Faulted Attack If a hacker successfully sniffing you, you can handle all the information (email, user name, password) on the internet from your computer.
The way Sniffing is attacked
Did not understand? Let me clear an example
Please remember that Facebook (using SSL pheibuke taxes) Click to login with my password 1234567 1234567 I SSL system convert the data of the process inakrapta forms, such as Form 1234567 inakrapta the 20eabe5d64b0e216796e834f52d61fd0b70332fc. If hacker attacks me on sniffing, then my password will be found as 20eabe5d64b0e216796e834f52d61fd0b70332fc. Hacker can not know what my password is
Standing there, the good hacker can find out your password by decoding the inactive form.
How to make strong passwords.
The big ethic hackers say that
Make your password as big as possible (not less than 8 numbers)
If your password is only a number, the hacker will take 10 minutes or less to clear the passwords of your password.
If your password is uppercase or lowercase + number, the hacker will take approximately 10 hours to get the input of your password intact.
If your password is upper case + lowercase letter + number, the hacker will take approximately 24 hours to decrypt the encrypted form of your password.
If your password is uppercase + lowercase + number + special symbols, the hacker will take approximately 1800 (eighteen) years to decrypt the encrypted form of your password.
Special symbols are ~! @ # $% ^ & * () _ + = - \ ';: "/ ?.>, <more seems to have.
That means, the number of passwords is more than eight digits and the number of letters in uppercase + uppercase letter + lowercase + number + special symbols is less likely to be hacked.
A good password sample M1 @ 23 # n45 * 67
All these facts through the login button with security systems that all data on the server is present in the test and inapuna committed data in the server, the krrta information (account open when personal information was at that) coincides with the security systems account eksasesa the match if you do not Do not give access.
Now let's know how hackers steal the account information (email, username, password)
Hacker hacks many passwords, including:
Social Engineering Attack or Social Attack
Phishing Attack
Sniffing Attack
What is Social Engineering Attack or Social Attack?
Trying to hack, guess on Social Engineering Attack or Social Attack. If a hacker hacks a social attack to hack my Facebook ID, then I will try to log in with my phone number or email address as shamolsingha, 123456 or my phone number as my password.
What is a phishing attack?
Phishing attacks are easy and so effective, so hackers do more with the Phishing Attack. There is a tune of Prosecution with phishing attack. If you follow the tune, then you will know about phishing, need to know about the tune here to prevent hacking from phishing.
What is Sniffing Attack?
Sniffing Attack The Most Faulted Attack If a hacker successfully sniffing you, you can handle all the information (email, user name, password) on the internet from your computer.
The way Sniffing is attacked
Did not understand? Let me clear an example
Please remember that Facebook (using SSL pheibuke taxes) Click to login with my password 1234567 1234567 I SSL system convert the data of the process inakrapta forms, such as Form 1234567 inakrapta the 20eabe5d64b0e216796e834f52d61fd0b70332fc. If hacker attacks me on sniffing, then my password will be found as 20eabe5d64b0e216796e834f52d61fd0b70332fc. Hacker can not know what my password is
Standing there, the good hacker can find out your password by decoding the inactive form.
How to make strong passwords.
The big ethic hackers say that
Make your password as big as possible (not less than 8 numbers)
If your password is only a number, the hacker will take 10 minutes or less to clear the passwords of your password.
If your password is uppercase or lowercase + number, the hacker will take approximately 10 hours to get the input of your password intact.
If your password is upper case + lowercase letter + number, the hacker will take approximately 24 hours to decrypt the encrypted form of your password.
If your password is uppercase + lowercase + number + special symbols, the hacker will take approximately 1800 (eighteen) years to decrypt the encrypted form of your password.
Special symbols are ~! @ # $% ^ & * () _ + = - \ ';: "/ ?.>, <more seems to have.
That means, the number of passwords is more than eight digits and the number of letters in uppercase + uppercase letter + lowercase + number + special symbols is less likely to be hacked.
A good password sample M1 @ 23 # n45 * 67
No comments: