12 cybersecurity ways to generate safe password for facebook ,twitter, emails, instagram


cyber security jobs cybersecurity certification facebook login java ruby soap mongodb matlab mysql maven php facebook login page vi pointer pointer microsoft access python tutorial nodejs ariba qa encapsulation polymorphism lisp java arraylist arraylist java socket scala aws lambda c string tutorial online java compiler vba java compiler online sql update java array lua quick sort html comment merge sort bubble sort html image sql create table python if statement insertion sort matlab for loop for loop matlab tuple python online online python online python compiler jsp python online compiler online c compiler python operators python sleep selection sort java tutorial javascript tutorial assembly language python if divide and conquer python replace java compiler java set sql tutorial nodejs tutorial c compiler readlines python python readlines ethical hacks java generics python command line arguments batch file python not equal elif quantization java string length polymorphism in java strcpy pointers java online ide online java ide printf c pointers in c c printf qa testing multithreading in java java multithreading excel quick analysis tool scanf in c java charat http requests charat java malloc c strcmp c java online compiler network security with firewall java online 2d array python atoi c atoi in c java char fopen c computer ports fopen in c java string substring waterfall model python lower java absolute value sql where clause kafka tutorial sprintf c ruby for loop java constants ajax strtox atoi fgets inheritance java multiplexers pass python python online ide quicksort teradata perl design patterns binary code flask azure portal java interfaces node js java interface sql like java collections singleton python time powershell guice dynamic programming python compiler stack java python interview questions java stack rdbms sql left join angular material sed c strtok what is an instance variable in java flow of energy in an ecosystem relational algebra instance variables java c function free in c free c how to change font in html instance variable java python hashtable online java editor what is soap python isnumeric fread c database types algorithm for merge sort process vs thread html change font fread in marketing communications ten thousandths place typedef isnumeric python hashtable python plsql ten thousandth c free exception handling in java java method call batch file commands basic java java online editor what is grub sqrt python strncpy create table communication process kruskal's algorithm mosfet git clone data structures switch case whatis linux command jenkins git tutorial python length of list bing image search google colab cobol shell script java 8 binary search tree linked list bfs sql update statement c programming java switch  jdbc sap ariba ms access hashset java parseint data types in sql malloc python split decorator pattern java square root data types c date functions sql custom tag what is bean in spring what are constraints in sql hibernet tutorial nested loops python java bitwise operators c data types java editor online c files json for java java tutorial point c read from file hibernate in java symmetric distribution c file read file c ruby if else salesforce tutorial c strcat scala tutorial mutex vs semaphore pandas tutorial python strcat c java to json computer applications strstr c break loop python software design query in access pyspark tutorial date functions in sql reading a file in c readlines html for bold text powershell tutorial what is web servicescybersecurity


Best cybersecurity methods to generate password for facebook, instagram, twitter, and other social media platforms.

Things to Be Considered While Creating a Password 

1. Uniqueness :  Write a unique sentence as password which is easy to remember but very hard to be cracked or guessed by hackerEg:Iwenttoabeachwith1$

2. Words :

Choose difficult with worng spelling just like the i have written the word underlined or u can choose words like: passrwd 3. Symbols : Choose special characters or symbols to increase the complexity of the password. Eg- @#$%^&*
4. Numbers : Choose combination of number along with text such as you can add your phone number or pincode . But don't choose number that can be easily guessed such as your date of birth.
5. Upper & Lower case : Always include upper case and lower case letters to increase the complexity . Eg: iAmIRoNmAn
6. Username not be used as a password : Don not ever include your user name in your password. It is first guess of any hacker.
7. Make it difficult to crack : Make as complex as you can.Do not use known things to people about yourself like birthdate : Adding birth date makes it easy to be cracked.
8. Dictionary words are not to be used : Do not use random words from dictionary. There are some password cracking tools based on the dictionary. 
9. Do not use key strokes adjacent to each other like “1234”, etc : Password such as amit123, sidhart567, these passwords are easy to crack.
10. Avoid the exact same password everywhere : Do not use exact same password everywhere. If a hacker successfully hacked your one account then he can get access to every accout of yours.
11. Do not store the passwords as a list on the system : Do not save your passwords in  ms-word , or any text format even images of  your password. If some body installed a spyware or successfully hacked your system then he can easily get those. Even saving passwords in various browser is not safe because some of them save those credentials as cache in your device.
12. Use trusted password managers : There are online third-party services that help users to safeguard sensitive passwords, along with LastPass, DashLane, and 1Password that store passwords at the cloud and secure them all using a master password.


In Cybersecurity personal safety is first priority.

Comments

Popular Posts