Easy Password Creation Systems For Life (Introduction)
5/5
()
About this ebook
Let's create our own password system which can be used anywhere for all of the passwords we will ever need. We want to make them easy to formulate yet be secure enough.
The grid system that you finally choose can easily be recreated any time you like on a piece of paper. You will need to take that piece of paper everywhere you go but you can keep it in your wallet, purse etc. Even if it is exposed to others it won't matter because they won't know exactly how you are using it: you will incorporate your own password-design method with that information to create the final passwords. The page will be used like an ultra-thin computer, combined with the giant one in your head.
We will learn that many different variables need to be considered and satisfied for that one system to work in all situations. Upon finalizing the choices of your system that will be the one that you will use for the rest of your life.
How easy are these systems to create? The answer is surprisingly easy but obviously impossible if you don't know how.
We will also need to provide human-meaning names to aid in the usage of grid designs. That way you will have less to remember. So although we can easily forget things (which is disastrous in password-creation systems) we can also take advantage of the fact that we can remember many things (including people) easily. We can make use of our strengths and side-step our failings. Complicated ideas always require the correct aids before they can be easily used.
It has often been said that the weakest part of a security system is the password. And what about those security disasters, forever exposed in the news media, such as when hackers broke into a system and revealed everyone's passwords to expose their weaknesses?
How good are the hackers' passwords?
In deciding the choices for your system you will be playing about like a kid and having fun with simple mathematics.
Using many random 20-character passwords will no longer be Ahassle%4=w-
What is a password? A personal signature, which everyone already knows?
It's one of the shortest books you'll ever read. It doesn't need to be long. It's cryptography made easy for ordinary people since cryptography is normally a complicated subject.
Summing up in one phrase: no more insecure feelings about your passwords from now on.
(This book is intended for e-reader/tablet screen sizes and larger.
Can you comfortably do basic maths without using a calculator? If so then this book is not for you.
The book is more of a tool/method than a book. Once the method has been learnt there is no need to read the book again like it is with an ordinary book. Think of it as a piece of computer software.)
(Readers, please note that it's a difficult book to set a sample rate for because it's so short and because it's not an ordinary book. I am in the process of contacting people that readers already trust like popular novelists and others. They will be given copies so that people will be able to see their reviews of it. These links will be shown on my author page at the Smashwords dotcom ebook store.)
Josephine Rosenburgh
From California this young author spends most of her time working in a computer store. An avid fanatic of sudoku and crosswords, she has a natural flare for mathematics. Reading several articles on cryptography lead her to the inspiration she needed for her first ebook.Married to her husband, John, a sales rep, she also spends her spare time writing and dancing. Prior to the launch of her first ebook she was unsuccessful in her attempts to get another book into print and still continues to pursue this objective.She is currently seeking a career change.
Related to Easy Password Creation Systems For Life (Introduction)
Related ebooks
Google Drawings For Beginners: The Ultimate Step-By-Step Guide To Creating Shapes And Diagrams, Building Charts And Annotating Your Work For Generating Eye-Catching Documents Rating: 0 out of 5 stars0 ratingsHow Not To Use Your Smartphone Rating: 5 out of 5 stars5/5Exploring AI Rating: 0 out of 5 stars0 ratingsI Can Be a Cool Coder Rating: 0 out of 5 stars0 ratingsWhy AI Hallucinates: The BotVerse Begins Rating: 0 out of 5 stars0 ratingsDeep Learning with Keras: Beginner’s Guide to Deep Learning with Keras Rating: 3 out of 5 stars3/5The Art of Immutable Architecture: Theory and Practice of Data Management in Distributed Systems Rating: 0 out of 5 stars0 ratingsAlgorithm Challenges: The Dojo Collection Rating: 0 out of 5 stars0 ratingsBrown Dogs and Barbers Rating: 0 out of 5 stars0 ratingsD2 Robot Creator's Guide: As an E-Manual Mobile Edition Rating: 0 out of 5 stars0 ratingsCodeless Data Structures and Algorithms: Learn DSA Without Writing a Single Line of Code Rating: 0 out of 5 stars0 ratingsGet Tech: Understand Computers, the Internet and Cut Through the AI Hype Rating: 0 out of 5 stars0 ratingsPasswords Made Easy+ Rating: 0 out of 5 stars0 ratingsReal Computing Made Real: Preventing Errors in Scientific and Engineering Calculations Rating: 3 out of 5 stars3/5Hack Computer System For Noobee Rating: 1 out of 5 stars1/5Machine Learning For Beginners Rating: 0 out of 5 stars0 ratingsBreaking Computer Network with Internet Rating: 0 out of 5 stars0 ratingsCreate an Animation with Scratch Rating: 0 out of 5 stars0 ratingsAIQ: How People and Machines Are Smarter Together Rating: 4 out of 5 stars4/5Neural Networks: Neural Networks Tools and Techniques for Beginners Rating: 5 out of 5 stars5/5Practical Suggestions For Microsoft Windows Rating: 4 out of 5 stars4/5"Artificial Intelligence: How Does It Work? And How to Use It?" Rating: 0 out of 5 stars0 ratingsGROKKING ALGORITHM BLUEPRINT: Effective Methods and Functions of Grokking Algorithms Rating: 0 out of 5 stars0 ratingsMachine Learning Box Set: 2 Books in 1 Rating: 0 out of 5 stars0 ratings
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings
Reviews for Easy Password Creation Systems For Life (Introduction)
1 rating0 reviews
Book preview
Easy Password Creation Systems For Life (Introduction) - Josephine Rosenburgh
Easy Password Creation Systems For Life (Introduction)
Josephine Rosenburgh
Copyright 2014
Smashwords Edition
Smashwords License Statement
Creative Commons License NonCommercial-NoDerivs CC BY-NC-ND
http://creativecommons.org/licenses/
This ebook may be freely distributed to others unaltered for non-commercial purposes. It may be uploaded to ebook download sites.
Table of Contents
To start off if you have problems with basic maths then this is not for you. Can you comfortably do basic maths without using a calculator? If you can then proceed.
Start
AES
Message to computer programmers
Final
Epilogue
Start
This is the introduction to my ebook, one about a system for creating your own passwords effortlessly (and extremely securely).
On some Web sites, like Scridb, the book's description is shown with no line breaks so here it is written properly (you can skip it if you have already seen it):
"Let's create our own password system which can be used anywhere for all of the passwords we will ever need. We want to make them easy to formulate yet be secure enough.
The grid system that you finally choose can easily be recreated any time you like on a piece of paper. You will need to take that piece of paper everywhere you go but you can keep it in your wallet, purse etc. Even if it is exposed to others it won't matter because they won't know exactly how you are using it: you will incorporate your own password-design method with that information to create the final passwords. The page will be used like an ultra-thin computer, combined with the giant one in your head.
We will learn that many different variables need to be considered and satisfied for that one system to work in all situations. Upon finalizing the choices of your system that will be the one that you will use for the rest of your life.
How easy are these systems to create? The answer is surprisingly easy but obviously impossible if you don't know how.
We will also need to provide human-meaning names to aid in the usage of grid designs. That way you will have less to remember. So although we can easily forget things (which is disastrous in password-creation systems) we can also take advantage of the fact that we can remember many things (including people) easily. We can make use of our strengths and side-step our failings. Complicated ideas always require the correct aids before they can be easily used.
It has often been said that the weakest part of a security system is the password. And what about those security disasters, forever exposed in the news media, such as when hackers broke into a system and revealed everyone's passwords to expose their weaknesses?
How good are the hackers' passwords?
In deciding the choices for your system you will be playing about like a kid and having fun with simple mathematics.
Using many random 20-character passwords will no longer be