Password Security // ENG //

Eagleweb

Kıdemli Üye
8 May 2021
2,120
1,151
localhost/e8
logo.png


1) Never use your date of birth, car license plate, home or mobile phone as a password. In the literature, this is called a Social Engineering Attack. It is the process of seizing passwords only from a person's information without using any scientific methods. Many users put the number of their landline phone on the modem, the phone on the store's brand or on the billboard is read and entered directly into the Wireless network. Oh, my God, don't say what would happen if they entered my Wireless unlimited. By using your wireless network, you will be directly responsible for a hacking attempt or statements made on the Internet on behalf of an illegal organization.



2) Do not use the password that you use for e-mail in particular in other places, for example, usually the password for facebook, twitter accounts is the same as email. What to do, you will say, is it so easy to remember the password. Develop a method of your own. For example, at least let Fb be at the beginning of the password when logging in to facebook, Em when logging in to e-mail, Tw when logging in to twitter.

by0d5b4.jfif


3)
In case you have a keylogger(spyware that captures keyboard movements) on your computer, be sure to use a virtual keyboard. It's like logging into a bank system. If there is no virtual keyboard in the system, the on-screen keyboard in Windows can be opened this way. Windows Start- Accessories - Ease of Access - On-screen Keyboard. You cannot block the entry of malicious programs such as keyloggers into your computer. Not necessarily with Flash memory, etc. it can come from many places. Use a licensed antivirus against this



4) When issuing a password, do not provide passwords consisting of consecutive numbers. When issuing your passwords, use at least one small uppercase letter, digit, sign ($, #, +, ., %,&,?,=) be careful to use it. Passwords should be at least 8 characters, shorter passwords, for example, passwords of 2-3 characters, are very easy to detect. You can read the SplashData news about the most used passwords at the link below.



5)
Do not type right or left because you are forgetting your passwords, you will take a risk when people you don't want see your password.Okay, so what? Let's say you have 4 debit cards, you give them all different passwords, how will you remember. This is very simple. There must be a 12-16 digit number on the card, you can use the first two, last two digits of this number or the 4 digits of your choice as a password.Use the same method on all cards, the passwords will be different.





In order to make online purchases without having come to the credit card issue, your Credit Card information is sufficient, you do not need to have a credit card. The CV2 Number, the Expiration Date and the Credit Card number will work. Never send your credit card by giving it to a waiter, give your credit card to an employee at gas stations, etc., and ask him to withdraw money. Go to the POS machine yourself in person, the malicious person can photograph your credit card on the way. Constantly check your debit and credit card expenses, ask the bank for shots that you don't understand.

6x7rfak.gif


6)
It is quite easy to listen to a wireless network and listen to sent emails and messages. Send your credit card information via a messaging program or by e-mail, etc. do not send it by typing. It is even safer to send SMS, do not forget to delete the SMS immediately after sending it. By the way, be careful if you store your passwords inside dec mobile phone, you risk forgetting your mobile phone somewhere.



7) Documents containing top secret information of a company or state-owned security information should not be kept unencrypted in folders. Folders that do not appear in Windows, invisible drives can be created with various programs. Only when formatting the computer, do not forget and delete these folders and drivers.



8)
Do not rely on Windows login passwords, Windows 7-8, initial login passwords can be easily cracked. If you have to use Windows, encrypt on the basis of folders and drives. You can lock the screen with the Lock Computer option on the screen that comes after the CTRL+ALT+DEL key combination so that someone doesn't confuse your computer when you go to the lunch break or the bathroom at work.

lypmlpg.gif


9) Never leave the passwords of your devices in the factory settings, for example, cameras, modems come with a certain factory password, be sure to change it. If not, others also monitor your home or workplace that you watch online, and others use your modem.




10) If you are a software developer, do not save users' passwords directly to the database. Save it by passing it through message extraction algorithms such as MD6, SHA1. Thus, even if the database is compromised, user passwords cannot be learned in any way. In addition to the password, other fields may also need to be encrypted in the table. For these, use encryption algorithms such as AES, RC6.


Source : || Şifre Güvenliği ||
 

'The Wolf

Kıdemli Üye
22 Nis 2021
4,043
2,565
Tanrı dağı
logo.png


1) Never use your date of birth, car license plate, home or mobile phone as a password. In the literature, this is called a Social Engineering Attack. It is the process of seizing passwords only from a person's information without using any scientific methods. Many users put the number of their landline phone on the modem, the phone on the store's brand or on the billboard is read and entered directly into the Wireless network. Oh, my God, don't say what would happen if they entered my Wireless unlimited. By using your wireless network, you will be directly responsible for a hacking attempt or statements made on the Internet on behalf of an illegal organization.



2) Do not use the password that you use for e-mail in particular in other places, for example, usually the password for facebook, twitter accounts is the same as email. What to do, you will say, is it so easy to remember the password. Develop a method of your own. For example, at least let Fb be at the beginning of the password when logging in to facebook, Em when logging in to e-mail, Tw when logging in to twitter.

by0d5b4.jfif


3)
In case you have a keylogger(spyware that captures keyboard movements) on your computer, be sure to use a virtual keyboard. It's like logging into a bank system. If there is no virtual keyboard in the system, the on-screen keyboard in Windows can be opened this way. Windows Start- Accessories - Ease of Access - On-screen Keyboard. You cannot block the entry of malicious programs such as keyloggers into your computer. Not necessarily with Flash memory, etc. it can come from many places. Use a licensed antivirus against this



4) When issuing a password, do not provide passwords consisting of consecutive numbers. When issuing your passwords, use at least one small uppercase letter, digit, sign ($, #, +, ., %,&,?,=) be careful to use it. Passwords should be at least 8 characters, shorter passwords, for example, passwords of 2-3 characters, are very easy to detect. You can read the SplashData news about the most used passwords at the link below.



5)
Do not type right or left because you are forgetting your passwords, you will take a risk when people you don't want see your password.Okay, so what? Let's say you have 4 debit cards, you give them all different passwords, how will you remember. This is very simple. There must be a 12-16 digit number on the card, you can use the first two, last two digits of this number or the 4 digits of your choice as a password.Use the same method on all cards, the passwords will be different.





In order to make online purchases without having come to the credit card issue, your Credit Card information is sufficient, you do not need to have a credit card. The CV2 Number, the Expiration Date and the Credit Card number will work. Never send your credit card by giving it to a waiter, give your credit card to an employee at gas stations, etc., and ask him to withdraw money. Go to the POS machine yourself in person, the malicious person can photograph your credit card on the way. Constantly check your debit and credit card expenses, ask the bank for shots that you don't understand.

6x7rfak.gif


6)
It is quite easy to listen to a wireless network and listen to sent emails and messages. Send your credit card information via a messaging program or by e-mail, etc. do not send it by typing. It is even safer to send SMS, do not forget to delete the SMS immediately after sending it. By the way, be careful if you store your passwords inside dec mobile phone, you risk forgetting your mobile phone somewhere.



7) Documents containing top secret information of a company or state-owned security information should not be kept unencrypted in folders. Folders that do not appear in Windows, invisible drives can be created with various programs. Only when formatting the computer, do not forget and delete these folders and drivers.



8)
Do not rely on Windows login passwords, Windows 7-8, initial login passwords can be easily cracked. If you have to use Windows, encrypt on the basis of folders and drives. You can lock the screen with the Lock Computer option on the screen that comes after the CTRL+ALT+DEL key combination so that someone doesn't confuse your computer when you go to the lunch break or the bathroom at work.

lypmlpg.gif


9) Never leave the passwords of your devices in the factory settings, for example, cameras, modems come with a certain factory password, be sure to change it. If not, others also monitor your home or workplace that you watch online, and others use your modem.




10) If you are a software developer, do not save users' passwords directly to the database. Save it by passing it through message extraction algorithms such as MD6, SHA1. Thus, even if the database is compromised, user passwords cannot be learned in any way. In addition to the password, other fields may also need to be encrypted in the table. For these, use encryption algorithms such as AES, RC6.


Source : || Şifre Güvenliği ||
Nice Topic.
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.