In our everyday life, we use almost every field password, from withdrawing money from banks and social media to investing.
Let’s start with the misinformation about the safe password selection to this article.
1: “Do not use your personal information, such as your date of birth, in your password.”
This may have happened in the 1900s when 4-digit passwords were used during the years, but today our passwords are generally not allowed to be shorter than 8 digits. In this case, trial/error is almost impossible to find passwords and malicious hackers have to access the database or do brute attack *. This means that the presence of personal information in your ciphertext will not change the chances of your ciphertext being broken. It also makes it easy to remember to use personal information in the password when it is used carefully, on the contrary. Nevertheless, if you are asked for a 4-digit password as in the cash machines, do not choose a personal code as your password. In addition, all of your ciphers need not be personal data that is linked to each other.

* Brute force attack. The computer tries to find the password by trying all the possible results one by one (a1111, a1112, a1113, …). It is almost impossible to decipher the passwords with long, digits, upper and lower case letters and characters in this way.

2: “Use the same password everywhere to avoid forgetting your password.”
Even if you have chosen a code that even quantum computers will not easily be able to find, it is possible that you may be disguised as a malicious hacker, as if you were hacking a database that is not at your disposal. Although there are passwords in the database that are encrypted with methods such as md5, there is no encryption method that can not be solved today. When your password is compromised by malicious hackers, your username and password will try to access your other accounts as well. For this reason, it is safer to use a different password everywhere. If you use a different password each time in the third part of our article, we’ll see what you need to do in order not to forget so many passwords.

3: “Make a note of all your passwords.”
If you save all your passwords in a notepad on your computer, they can easily retrieve all your accounts when your computer is infected. If you write in a piece of paper at home, you may also have access to information such as someone who has access to your home or a thief account that will enter your home and credit card if you have written it. Nevertheless, when you write to your house, the possibility of it being passed into the hands of an unwanted person is much lower than the probability of acquiring the text file of the harmful and learning your passwords. We will also touch on how you can write securely to a paper or text file at the end of your writing.

We talked enough about the mistakes. Now let’s come up with the rules we need to create secure passwords.

Rules:
Rule 1: “If possible, set passwords that contain uppercase, lowercase, number, and character.”
The greatest factor that determines the security of passwords is the presence of upper and lower case letters, numbers, and characters. The presence of each of these is as important as the length of the ciphering. Passwords that contain characters are not supported everywhere, but they are supported in many places today. If it is not supported, not using the character is not a serious problem. Now I will try to explain the importance of upper and lower case letters, numbers, and characters. Let’s think it’s a four-digit prison. If this is just a letter, we might have 29 ^ 4 denominator (29 above 4) 707281 probability if we think that there are 29 letters in our alphabet. If this fortune-free character also includes uppercase and lowercase letters and digits, there may be 268 possibilities in each unit with 29 small + 29 uppercase + 10 digits + at least 200 symbols. There are 268 ^ 4 denominations (4 over 268) probabilities and 5158686976 possibilities. This is also the character, number,

* Symbol, example:!? # $ £ @% “‘> <:. ,

Rule 2: “How long is so safe.”
The helicopter security increases in proportion to the length of the security. So we can say how safe it will be for how long it is. However, we need to pay attention to the length as well as other rules. You do not need to overdo the length too much. Nowadays, there are no market computers that can break such hard passwords, but passwords can be broken by being programmed to work with quantum computers that are in the hands of bigger companies like Google or with hundreds of computers. If you are a normal person, no one will try to break your cipher with a big computer army. So you do not have to put passwords long enough to keep in mind when you care about length. Finally, we can say that 8-10 habits are ideal for a password.

Now, if you follow the above rules and the statements in the description of the mistakes, I will pass on our advice that will not affect your safety but will make your job easier.

Recommendations:
Recommendation 1: “Base Attachment Special Attachment Method”
I have developed this method myself, but most likely other people have come up with it. This method works like this. First and foremost, you need to choose a base password yourself. This code will be the same everywhere. For example, the base case is 1234Abcd. We will now sign up for Twitter. Twitter’s initials T . In this case, T witter password 1234abcd our T ‘re doing. It is up to you to place where you put T , in lower case. If you want T 1234Abcd you can develop this method yourself like 1234Abcd TT and do something customized for yourself. Moreover, thanks to this method, every site uses the same base and you have a chance to forget that you can find it in the special site name.
Recommendation 2: “Encrypt Recording Method”
This method is similar to the continuation of the other method. Without the other method there is no point in practicing this method. I developed this myself, but other people may have come up with the idea. If you sign up too many times but care about security, you will find it hard to keep all these passwords in mind. In the past, sites were not caching as much as today. Each time we had to memorize the password again, but today we go to a site every day, we can not have to rewrite the password for 1 year. When we enter so much time together we do not want to forget. To avoid this situation, we will store all our passwords securely in a text file. With the other method it does not seem necessary, but sometimes only mobile devices, Smart TVs and PlayStations can be passwords that are difficult to write. In such situations it is difficult to write, so we may not want to put passwords with upper case letters. In some cases, using the method in the first method, you may get confused if you just put the T suffix to the base suffix and then put in a different password if you encounter a site starting with another T letter. Assuming that we have applied the previous method, let’s assume the base case is 1234Abcd. We do not have a chance to forget that we already have this on every site. We write this into the text file by encrypting it like 1 * d. For example, if we apply the method at the end of the base by typing the initials of the site in large format, we put N. If we put two, we put NN. N represents the unknown.

Let’s make an example without overextending:
Password.txt:
Twitter (1 site) – 1 * d N (“1 * d” base, representing the letter “N” T)
T *** (site 2) – 1 * d n (“1 * d” base, representing the letter “n” t)
T *** (site 3) – 1 * d NN (the “1 * d” base represents the letters “NN” TT)
T *** (site 4) – 1 * d nn (“1 * d” base, representing the letters “nn” tt)

You can make it easiest for you by editing it. If you find ways to make it easier for everyone else, you can send it to us to help other people.