Translate

الثلاثاء، 5 مايو 2015

Months 10 errors in the writing of password exposure accounts for theft

Months 10 errors in the writing of password exposure accounts for theft

Word Mror.thagaf yourself
In a poll of rationing and Fannin computer maintenance in order to know more things funnier among their customers, the hard drives content of pornographic material and personal images eccentric always ironic source, but it was easy prediction passwords of excessive weakness and naivete is more a matter of ridicule among them. Here are some common mistakes among the almost most of the users in typing the password and password that make Kaadamha as if you shut your door at night with duct tape only.

 

 

Errors in the writing of password exposure accounts for theft

1. Middle Ages: Believe it or most Internet users do not believe intensely obsessed with medieval characters, and found that no small number used the words "Princess" or "Dragon" intensively.
2. pornographic terms: experts point and rationing that your use of sexual terms as the word of the passage puts you within a huge slice of users at an alarming rate and within a very narrow range of words that are easy to predict, and thus present yourself easy proselytism Internet hackers prey, so it is advisable to put Hosk aside when it comes It Bomanc personal and penetrate your privacy.
3. Sports trap for Ashekayaa: also attracts blue light of the law in the detonator, attracts you sport to fall into the trap of an arbitrator, each of those teams and players and their numbers are fertile material to the words of the common traffic around the world and that can be a little research to predict about the state where you live and the sport's most prevalent in geographical surroundings, thinking of you it is safe and easy to remember, but unfortunately is also easier for hackers to attack your information
4. Use LetMeIn: be words such as: "took me" or in English (LetMeIn) is the perfect style, which says it for your privacy to go to hell, please your safety worth a password you received little thinking, invented !.
 5. animal world: uses a large slice passwords contain the names of animals such as the famous (Kitty) or (Rocky) and (monkey) Is it in order to get some joy? Probably not a sound option to be key for your personal life.
6
- Swearing and cursing, and Section: negative way towards your computer and your information and aggressive toward the cosmos as well as one of the phrases that top the list, easy to predict after a number of attempts.
7
- The word Allah "God": apart from the overall situation, which pulled away by many for religion, but Virtual him, some heading to this strange behavior, believing that the presence of the word Allah "God" in the password will protect the information against hackers and keystroke loggers attacks, some are keen on that step despite the negative complacency and its owner, which could also describe the summit tampering.
8
 - "I love you" in English or Arabic Some writes (ILoveYou) like a password, make love as an emblem of the stage is a beautiful thing, the fact 
This greatly appreciate your device as well as the pirate who would like stalking you, I gave him the key on a plate as they say. Millions of people are putting this word as a key passage .. so must pause for psychologists to discuss justified ..
9
- Strings of numbers or consecutive letters: Here we get a bit naive and disregard, (123) or (abcdef) and even (abc123) first choice without a competitor for any future people eavesdropping on your privacy, but the cat can access your information during daily Tmsheetha on your own keyboard device, although it is estimated the number of naive chose this option as the word of the passage of more than 20 million people a minimum.
10
- "Password": a good number used "password" Password like a password, which is what a person pays to use "password" Password like a password to their account !! We believe there is no justification!
11
-use Your phone number large number of people are using your telephone number password for each Hsaptha making it easily penetrate Hsaptha and stalking them also
        Source:  site thaqafnafsak.com  

0 التعليقات:

إرسال تعليق