It's no secret to anyone that the simpler the password, the greater the chance that hackers have access to personal user data. Despite this, many people still choose easily cracked passwords, because then they are easier to remember.
Recently, an 18-year-old hacker managed to crack
Twitter ’s blogging service and gain access to three dozen celebrity accounts, including President Barack Obama and singer Britney Spears. The attacker heartily mocked the American president, sending out proposals on his behalf to other bloggers to take part in the poll and earn $ 500. Britney Spears got even more. Hacker pleased readers with a detailed description of her "charms."
As it affected the reputation of the service, it is easy to guess. However, hacking could not happen if the administrators of the portal did not choose the easy password - happiness. To decrypt a password from unrelated within the meaning of 9 letters, it takes about 5.4 trillion combinations. Given the fact that this is an English word written in lowercase letters, the hacker had enough of a million combinations. If not only lower case letters were used in the password, but also capital letters, as well as numbers and other symbols, then the possible number of combinations would reach 630.250 trillion.
Hacking the Twitter service is a vivid example of the fact that any, even the most reliable protection leaves room for vulnerabilities associated with the presence of the human factor. The Twitter administrator himself became a blacksmith of his “happiness.”
')
Using the happinessisgood password (happiness is good) would be a much better solution. Its decoding requires going through about 1.6 billion trillion combinations. However, for security fans, there is an even more powerful option - “happinessis2good”. Obviously, the password search program will never master such a combination.
Returning to the beginning of the topic, the question arises: is it really much harder to remember the password of “happiness” than “happiness”? Then why not start using it? By choosing the second option, the user himself consciously makes himself vulnerable to hacker attacks.