Games Achievements My Kong Sign In
avatar for GeneralZap

GeneralZap

Latest Activity: Played Monsters' Den Chronicles (Sep 13, 2017 7:32am)

Points needed for next level: 53 Level

  • Friend
  • Private Message
  • Tools
  • Location

    Missouri, US.
  • Member Since

    Jul. 03, 2010

Information Technology, Gaming, etc.

The World Behind Creating an “Impenetrable” Password.
The weakest link in a password is really when a password is being put into a system, transported, or stored into a system. In truth, the only part of security a person may control is how elongated and complex it is, as well as not providing anyone the password. If you have to write your password down and keep it near the device you input it to remember it, you do not have true security. Other than these important to note vulnerabilities, you will now be taught how to memorize a 256 character password. These methods are not truly limited to any number of characters, and there are many variations which you could invent.
For simplicity’s sake, you should first take note that 16 multiplied by 16 equates to 256. Observing this indicates that it would be a wise decision for those of you not relying on computer generated codes to have a few repeating elements in order to ease memorization process. However, to make sure this cannot simply be plugged into any old supercomputer or botnet under the sun for a quick solution of the password, some elements must change. These elements can vary, using your own codes, simple alphabets or numbers, et cetera backwards, forwards, or in a pattern you are willing to keep in mind.
As an example, in order to make these changing but memorable chains, you may consider using the hexadecimal system, which counts from 0 to 15, using 0-F (A-F after 9, all letters in caps) makes it possible to count 16 different numbers in just one line of character, (when you include the 0.) You will make this your first line item in each of your 16 segments, so the first line of the first segment shall be 0, while the last segment starting line used shall be F. Congratulations, you just memorized 1/16 of a 256 character password! For the second line, perhaps you should use the exact same technique, but simply invert these, starting with F, and then followed by E, and so on with your ending segment’s second letter therefore ends up being 0. You may then for instance make the third line of every segment simply a lowercase x. So far then, your first lines of the first segment beginning lines shall be 0Fx, and your ending segments start should inevitably be F0x. As you can see, the end looks quite a bit like fox, so that may help you remember that important note. At this point, you could simply add a word like antipsychotic (which is 13 letters long) to each segment. Thereby you can complete each of the 16 characters of the 16 segments, forming a 256 character password of; 0Fxantipsychotic1Exantipsychotic2Dxantipsychotic3Cxantipsychotic4Bxantipsychotic5Axantipsychotic69xantipsychotic78xantipsychotic87xantipsychotic96xantipsychoticA5xantipsychoticB4xantipsychoticC3xantipsychoticD2xantipsychoticE1xantipsychoticF0xantipsychotic. If you can recreate that at any time you have memorized a 256 character password and according to howsecureismypassword.net, “It would take a desktop PC about Infinity years to crack your password.” Congratulations, you now know how to form a 256 character password! There are many “improvements” you could make to the security of this password, such as using a shorter word and more changing characters, and as another example replacing the x with a symbol (where permitted.) No password is truly 100% secure due to user error and other anomalies. User error or other malicious possibilities can cause vulnerabilities such as; low security encryption anywhere in the internet systems, low encryption or physical security anywhere the password may be stored, and even on the computer or keyboard itself there is a cornucopia of potential vulnerabilities. While it may be true your password is designed to be impenetrable and under proper circumstances should be for years or perhaps decades, this would be under exclusively perfect conditions, perfect conditions are void of key loggers, cameras, and other recording devices. Despite these many vulnerabilities, writing a password down and not obliterating the words upon the paper or note inevitably could serve as perhaps the greatest threat to you. Anything shredded is potentially placed back together with time and patience, so your best bet is a company incinerator, crosscut shredder, or other method of secure disposal. Security is easily broken at the weakest link, therefore if you are never the weakest link you can imagine that there are possible benefits in being able to blame someone else every time.

Activity Feed

    GeneralZap has not published any activity yet.Would you like to post a shout to welcome them to Kongregate?

See all shouts »
Developers Players Support YouTube TikTok X (Twitter) LinkedIn
Join the conversation Join Discord
Terms Privacy Code of Conduct
© 2024 Kongregate