What is considered a strong password?

There are different password policies which could define a secure password. The rules we recommend for creating a secure password is as follows:

1) 6 - 8 alpha-numeric (Numbers, letters, symbols) characters in length
2) Varying case (Upper and lower case)
3) No dictionary words in the password forwards or backwards.
4) Change passwords every month or so
5) Never reuse passwords

Remembering passwords can be difficult, so one good rule of thumb is to use the phrase based password mechanism. For example, if your favorite quote is "Any sufficiently advanced technology is indistinguishable from magic" (Arthur C. Clarke), then your password could be "AsAtIiFm001". Thus, as long as you remember your quote, and the fact that each character alternates between upper and lower case letters, it begins with an uppercase letter, and your number for the password is 001, your password would be very hard to dictionary attack, or brute force. You should determine how secure you want your account, and apply more complex requirements as your need for security increases.

We recommend you to check follow website http://strongpasswordgenerator.com/ and generate strong password for you.
  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

One of the sites I visit is being flagged by Internet Explorer 7's Phishing Filter, but it's not a phishing website. What can I do?

If you believe that a website has been mistakenly flagged as a phishing site, do the following:...

Horde Webmail works with FireFox but not with Internet Explorer 7

We have found a couple of fixes that may or may not work. Once you have tried to log into your...

Where can I report abuse and/or spamming?

If you know of someone who is abusing the system, spamming, etc, please email us at...

What type of content am I allowed to host on my server?

You can host any content or software you like as long as you are not violating our Terms of...

How can I prevent my site from being hacked?

Typically, most sites are hacked because of older and exploitable software, or world-writeable...