Skip to main content

Is your password too weak for Twitter?

If you think you can get away with using an easy-to-remember password like '123456', 'qwerty', or simply 'password' on the internet, think again.
Micro-blogging site Twitter recently banned users from using 370 words as passwords while signing up for a Twitter account since they are 'too obvious' and therefore vulnerable to hacking. The list also includes the names of popular TV shows, football teams like 'Chelsea' and 'Arsenal', brands, names of famous cars such as 'porsche' and 'ferrari', characters and common dictionary words.





Also banned are a few popular science fiction terms like 'THX1138', title of the first film by George Lucas of Star Wars fame and 'NCC1701', the registry number of Star Trek's starship Enterprise. 'trustno1', Fox Mulder's password in The X-Files is also in the list.
Research has shown that one in five people use their pets' names for their passwords, while one in eight use unforgettable dates, such as birthdays. One in 10 use their children's names.
Security experts advise that a strong password should consist of lower and upper case letters, numbers and punctuation marks. All passwords should be changed regularly and the same password should not be used for all online services.
Hindustan Times 
 
Source : Yahoo! India

Comments

Popular posts from this blog

Quiz 1 : Mobile Application Development - Android

Download PDF Version From Here   MCQ 1. Select a component which is NOT part of Android architecture. a. Android framework   b. Libraries          c. Linux kernel   d. Android document 2. What is AAPT? a. Android Asset Processing Tool.             b. Android Asset Providing Tool.   c. Android Asset Packaging Tool.             d. Android Asset Packaging Technique 3. Required folder when Android project is created. a. build                 b. build/               c. bin     d. bin/ 4. Adb stands for   A. Android Drive Bridge.                  ...

IP Delivery Concept

It is the practice of using the IP, the network address of the connecting computer, whether robot or human, and sending different content based on that. The database used to assist with the process. In the case of geo-targeting: Databases stores various ranges of IP addresses, and indicates where this ranges of IPs are in the world. A geo-targeting script scans the list to see in which country the current IP is located. Programmer can use this value to effect changes in presentation or logic. In the case of cloaking : Databases stores the IP addresses of the various spiders that may hit your site. The cloaking script scans the list to see if the current IP is a spider. The programmer can use this information to effect changes in presentation or logic. Implementations of IP-delivery-based cloaking also look at the User-Agent header of the request. The user agent header is a header sent by both browsers and spiders. But it is not regarded authoritative, bec...

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.