Archive for the ‘Uncategorized’ Category
Videoconferencing is an increasingly viable communication tool for businesses of all sizes. However, there is no one-size-fits-all videoconferencing solution; the one that fits best depends on the size of a business, the nature of a business, and what a business wants to accomplish.
Larger businesses can opt for providing all employees with desktop videoconferencing capabilities, multiple room-based systems, one or more immersive telepresence systems, or some combination thereof. Whatever the configurations you choose, the muscle and might resides on the core of your network, in the IT closet.
Systems may include per-seat licenses for as many employees as necessary, each endpoint (a desktop or a room) equipped with the necessary cameras, microphones, and videoconferencing software. The addition of a bridge, which can handle anywhere from a dozen or so users up to hundreds of users, enables multi-way videoconferencing; multiple bridges, which can be placed in various offices or branches, multiply the number of possible simultaneous users.
You can also add a recording box to the system, which allows you to record video conferences and stream content to dozens of users. With the addition of a dedicated streaming box, you can create a sort of corporate YouTube where thousands of users can access recorded content at once.
The crème de la crème solution is the immersive telepresence system, which is essentially a room containing a video display wall, the ability to hold simultaneous calls between large groups of people, and the ability to call virtually any other videoconferencing system. Immersive telepresence is ideal for corporate training sessions, conducting university classes online, and government applications.
You don’t need special bandwidth capabilities to run even the most elaborate system; the broadband Internet that most companies already have in place is sufficient.
The cost of a videoconferencing system varies widely. In general, however, the more functionality you add to a system, the higher the price. Instead of buying every component separately, it’s typical to buy everything you need as a package from a single vendor. However, many customers buy the displays—typically large-screen HDTVs—on their own, as it’s often more cost-effective that way.
Desktop endpoints cost in the neighborhood of $100 per seat, with rooms running anywhere from a few thousand to tens of thousands of dollars, depending on how elaborate a given room is. Bridges cost between about $25,000 up to a couple hundred thousand dollars, depending on how many simultaneous users they support. A recording box may cost around $25,000, and you can expect to pay approximately $75,000 for a streaming box. Immersive telepresence solutions run between about $150,000 to $500,000 per room, depending on the scale of a given installation and its amenities.
How to browse the Web, run apps, play music and games— and most important, watch what you want, when you want it.
“Smart TV” is the new hot buzzword these days. Imagine, for a moment, that your HDTV combined the simplicity of the
normal TV-and-remote experience with the powerful search features and video-on-demand libraries you’re accustomed to on the Web. Toss in social networking, photo sharing, music, gaming, and a hundred kinds of Web content. That’s what
“smart TV” means. It means never needing to settle for anything less than having what you want to watch (or hear, or
play) running in big-screen glory right now, while you master the universe from the couch with your all-powerful remote.
Don’t let all the TV and tech companies out there fool you, however. You have many ways to make your existing TV
smarter, other than just buying a new connected TV with all the bells and whistles built in. You don’t have to purchase a
brand-new PC or yet another set-top box, either. and you don’t have to let your cable-TV subscription hold your eyeballs
(or your wallet) hostage with hundreds of channels you’ll never watch.
Looking to buy a new HDTV? Choose the right TV—one that connects directly to the Internet—and you can enjoy loads of
Web features and apps without having to buy any add-ons or boxes. But choosing may not be easy: all the major TV manufacturers now have some package of Internet-connected features built into their midrange and high-end models.
In early Internet-connected TVs, packages included only a few additional “channels”—Netfl ix Instant Watch, YouTube, and a few video-rental services like amazon Instant Video, CinemaNow, and Vudu. Connected-television features have since advanced quickly.
New connected TV sets come packed with apps, games, and Internet video channels, often with options exclusive to the manufacturer.
Cost: You’ll have to pay for the television ($1000 to $2000 for midrange to high-end sets). The good news: You don’t necessarily have to pay a premium for an Internetconnected TV: Some manufacturers, such as Vizio, sell lowend models that are priced in the $750 to $830 range. The cost of an HDTV will generally de pend on the set’s size and on its panel technology (a 50-inch plasma set will cost more than a 50-inch LED one). and you won’t have to pay for access to the smart-TV service itself—just for the subscriptions to specifi c services such as Hulu Plus or Netfl ix, as well as the video-download rental fees.
Advantages: Connected TVs are simple and elegant. You can use your TV’s own remote, you don’t need to worry about
running extra power cords or audio/video cables as you do with a set-top box or a home theater PC, and many HDTV sets
include built-in Wi-Fi support (so you don’t even need to plug an ethernet cable into the back).
What’s more, newer TV sets often come with new remote controls that make it easier to use the Internet features. For
example, Lg’s Magic Motion remote is a gesture-oriented remote control similar to the Nintendo Wii controller (just
point the remote at the TV to move your cursor), which lets you more easily use the built-in Web browser of Lg sets.
Vizio’s high-end sets include a Bluetooth remote with a slideout keyboard to facilitate typing.
Disadvantages: Connected TVs aren’t particularly versatile. If your set-top box doesn’t have a channel you want, you can go buy a new one, but you won’t be able to do such a thing so easily with a big, expensive HDTV. also, if you’re big on live TV, you’ll still need your cable-TV subscription, as the Internet features are mostly on-demand video only.
Advanced tips: Most connected TVs include uSB ports and DLNa support (see the glossary on page 65), meaning that
you can watch your locally stored video, photos, and music from a uSB drive by plugging it straight into your TV or from
other PCs on your network—handy for the times when the video you want to watch is sitting on your PC in the den.
Future-proof? Yes—but only if you choose wisely. although early Internet features in HDTVs looked pitiful compared with what a standard set-top box could offer, the big players in the HDTV market (Lg, Panasonic, Samsung, Sony, and Vizio) are each looking to make their Web-connected TV sets your entertainment hub by adding new features, video channels, and even their own app stores. For example, Panasonic’s “Viera Connect” Internet features include Facebook, Skype, Twitter, and even downloadable games from gameloft in addition to a whole host of media-streaming services like
amazon Instant Video, Hulu Plus, Netfl ix, and Pandora.
Smartphone malware isn’t yet as big a threat as you might think, but it’s coming. Here are some tips to help you avoid it.
Malicious software is leaping from PCs to cell phones, as malware makers target the platform in hopes of making a quick buck. Examples include the infected Droid Dream and Plankton Android apps. An infected app released into the
Android market can infect several thousand users’ phones before anyone discovers the presence of the malware.
In the DroidDream incident, several thousand people downloaded software infected with a Trojan horse that rooted their phone and sent data such as the user’s location and phone number to a remote server. That same day, Google killed the contaminated apps in the Android Market, wiped the apps from phones remotely, and issued an update to patch and repair the damage that the DroidDream Trojan horse had done.
Because of how Android apps are built, a malware writer can disassemble a popular app, repackage it with malware, and reupload it to the Android Market with a slightly different title.
Nevertheless, we’ve yet to see any mobile malware infestations or threats on the scale of desktop PC problems. Thus
far, all of the reported mobile malware incidents have been small, isolated outbreaks that malware fighters have patched or identified within several hours of their appearance. According to Symantec, it’s still early in the smartphone malware game; and though the threat may seem overblown today, outbreaks are nevertheless very likely to increase in the future.
Threats to Watch Out For:
Malware makers favor Android because it is an open platform that allows users to load custom applications onto their devices. But other mobile gadgets are at risk of malware, too.
In its closed app ecosystem, Apple screens apps to ensure that they don’t contain objectionable content. But Apple does not check every bit in every app submitted to the App Store.
In July 2010, an app called Handy Light passed Apple’s screening process and appeared in the App Store. Though Handy Light looked like a simple flashlight app, it contained a hidden unofficial tethering function that let users treat their iPhones as cellular modems. Handy Light wasn’t malicious, but it showed that no vetting system is entirely safe. Most of the mobile malware we’ve encountered so far has taken the form of infected apps on the Android platform. For a phone to become infected, its user must install the compromised app; it isn’t vulnerable to drive-by downloads and other infection methods, as PCs are. That situation may change as malware makers begin to target other smartphone operating systems.
Ultimately, it’s up to users to make the right decisions when choosing where to download apps and which apps to install. In June of this year, McAfee Labs released a report stating that BUGS & FIXES alternative third-party app stores unofficial app markets not sanctioned by Google or Apple had more malware on average than the official markets. The Gemini trojan for Android, for example, was distributed exclusively through third-party app stores in China.
How to Protect Yourself
The safest course is to avoid apps that you’ve never heard of and to research apps and their publishers thoroughly before pressing the Download button. When you install an app, you’ll see a list of permissions for services that the app can access on your device. but an alarm clock app, say, probably shouldn’t need to access your contacts. If something
in the permissions screen looks fishy, just don’t download the app.
You should also be wary of what you click (or tap) while browsing the Web. In late June, mobile security company Lookout discovered malicious advertisements aimed at smartphone users and designed to trick them into installing infected apps. Some types of mobile antivirus software, like Lookout mobile Security, have features intended to protect you from phishing attacks like these.
If possible, install antivirus software on your phone. most big-name security companies like AVG, mcAfee, and Symantec have a downloadable mobile app for protecting your phone. besides guarding against malware, these apps have such features as the ability to lock and wipe your phone remotely. When you receive a new phone, it’s a good idea to install an antivirus program before you add any other apps. That way, your phone will be better protected against malware from the get-go.
At least for the moment, smartphone malware is relatively easy to avoid; but being aware that it exists is the first step toward protecting yourself and your data from falling victim to it.
WHO HAS YOUR private info? Who knows, given how common security breaches have become. And credit card information is one of the most common types of personal data we volunteer online. So what can you do to minimize credit card fraud? Well, you can’t stop the break-ins, but here are four ways to keep your funds out of the hands of the bad guys.
Disposable credit card numbers: Why share your 16-digit number with online merchants, particularly those you’ve never heard of? Many major banks let you create a unique, temporary card number for each online purchase.
For instance, ShopSafe (www.bankofamerica.com/shopsafe) is a free service for Bank of America Visa and MasterCard holders who bank online with the fi nancial giant. When you want to make a purchase online, you open a new browser window and sign in to your Bank of America account. Next, you follow the ShopSafe instructions to create a 16-digit credit card number, which you use on the vendor’s site in lieu of your regular number. (The vendor won’t know the difference.) The temporary number has its own expiration date and security code, and is valid at only one online vendor. You may reuse the number when you buy from that vendor again, however. Other institutions, including Citibank (www.citibank.com/us/cards) and EntroPay (fi nd.pcworld.com/71872), have similar services.
Even if you don’t use a disposable number, you’re protected from unauthorized credit card purchases. If someone uses
your card without your permission, your liability typically ends at the fi rst $50, according to the U.S. Federal Trade Commission (fi nd.pcworld.com/71873 ). And many card issuers now have zero-liability policies, where you won’t have to pay a penny.
Online payment services: The free Google Checkout service (checkout.google.com) stores your credit card details and doesn’t share your full card number with merchants. If a vendor accepts Google’s payment service, you can make a purchase simply by clicking the Google Checkout button on its site. Naturally, you’ll have to sign in to your Google account to complete a transaction. The venerable PayPal (www.paypal.com) is another option, and it won’t charge you a fee to buy stuff online. Both sites will reimburse any unauthorized purchases in full, as long as you report the fraud within 60 days.
Prepaid credit cards: Personal finances shaky? Can’t obtain a regular credit card? you still have online-shopping options, albeit pricey ones. usually you can get a Visa Prepaid card without a credit card or bank account (find.pcworld.com/71874). When you buy a prepaid card, you load it with the cash amount you want; as you buy stuff, the goods’ purchase total is deducted from the balance. Visa’s zero-liability policy applies to prepaid cards, as well. Just remember that these cards are often loaded with sneaky fees. A Western union Prepaid Visa Card (www.westernunion.com), for instance, has a $10 “non-refundable activation fee” and a $5 “load fee.”
Secure cards: For additional protection online, consider services such as MasterCard secureCode (find.pcworld.
com/71877) and Verified by Visa (find.pcworld.com/71878). Both require you to enter a password to complete a transaction. The lists of participating vendors are short, but if you regularly buy, say, plane tickets on British Airways, using an extra layer of security could help throw potential fraudsters off your tracks.
One last important rule of thumb: Never use wire transfers. “it’s just like sending cash—once it’s gone, it’s gone.
you can’t get it back,” the FtC’s Consumer Alert site warns. the agency also points out that using cash equivalents,
including debit cards, personal checks, cashier’s checks, or money orders, to buy online is wise only if you’re familiar with the seller. Buying a $50 herbal supplement from a dubious siberian pharmacy? say nyet to cash.
Using any of these methods can help you significantly reduce the chances of being duped by a malicious seller or site hacker. Of course, even if you take steps to disguise your financial information, you should regularly check your
accounts to spot fraud more quickly. But with a little vigilance and extra effort, you can stay one step ahead of
Many leading brands that are eager to get closer to customers have come to embrace Twitter, Facebook, blogs and other similar platforms as their primary vehicles for customer engagement and lead generation. In many cases, domestic social media efforts have paid off in measurable, impressive returns on investment (ROI).
However, social media strategy becomes significantly more complicated when companies expand it to include multiple international markets. For all of its allure, social media is not a panacea for globalization needs. It can be a useful tool, but website owners who include social media as one aspect of a more complete, integrated campaign often see better results abroad than those who put all their localization efforts into tweets and Facebook updates. Below are five facts that all Web businesses should know about international social media:
1.Social media is not effective in every market
There are some industries in which social media lives up to its promise for better business. In these markets, customers respond in droves to carefully crafted tweets, and they like and share Facebook posts, leading directly to increased conversion rates.
In other spaces, however, the impact of social media is nominal. In such cases, website owners must carefully consider the value of translating social media content for international audiences.
For internationally focused companies, social media activities can be time- and resourceintensive, since multilingual social media cannot be managed by machines alone. One hundred and forty characters in English, for example, do not neatly translate into Russian or German tweets. Human experts are required to oversee that process, as well as other
social media tasks, such as responding to wall posts on Facebook or answering messages on a blog.
Before retailers invest in these activities, they should consider its potential value and examine the predominant sources of their website traffic in various regions. They should look at the way they define conversion and find out what their conversion rates are. They must look at the effect of social media on their home market and seek out evidence that
might predict its impact abroad. Finally, businesses on the Web should determine whether they have the resources in place to manage localized social media on a global scale.
2. It can be easy and difficult at the same time
It seems so simple: Write a short blog post, send a pithy tweet, craft an irresistible Facebook missive, create a video for YouTube. These activities seem straightforward enough, and valuable, too, since the company retains control over a message that could go viral. Globalization, however, complicates matters.
Effective localization for international prospects requires more than plugging words into a machine that returns literal translations. This is certainly true for global websites, but the importance of connotation intensifies as communication gets more compact.
Twitter’s strict length parameters, for example, make every character choice a critical one. Translating for this kind of platform requires not only timesaving software solutions but seasoned human translators, as well. These experts are needed to choose the right words, as well as understand the cultural implications and potential reactions of the target markets.
Additionally, creating short, frequent content requires ongoing local support, since the expectation of social media is not a one-sided broadcast but an interactive conversation. For business owners that want a one-time invest investment
in international marketing that requires little follow-up effort, social media is not the best option.
3. If you want to go social abroad, hire locally
There is, of course, a reason for all of the hype around social media. When it is done well and prospects embrace it, social media marketing can pay off. This is not only true locally but also with international campaigns.
Online businesses that succeed in international social media marketing do so because they factor translation, international messaging, cultural norms, local news and localized search engine parameters into their strategies. They recognize that social media itself is not a marketing campaign; rather, they view it as an element of an integrated approach.
When websites look at the way all available media and mediums can function together to reach a goal, they capture a greater return on their efforts.
Those who succeed also recognize that social media outreach makes numerous demands, including the following:
-Writing fresh, relevant content on a frequent basis.
-Monitoring other blogs, tweets and posts in the market, and commenting regularly.
- Calling on a local voice to manage these tasks to ensure that language nuances and cultural practices ring true.
- Investing in a local marketing professional who can devote time to content creation and social media management.
4. Social media marketing works best when it is part of a complete campaign
When it comes to international outreach and localization, the real return on investment comes from a well-integrated campaign that potentially includes social media as one element. Other common elements include targeted pay-per-click ads tied to a comprehensive international search engine marketing (ISEM) campaign, culturally relevant landing pages for fast conversions, multilingual rich media, adapted banner ads and marketing, out-of-home advertising, experiential marketing with people on the ground, philanthropic community involvement and events like launch parties and networking functions.
Unfortunately, too many companies see that their website traffic is low and respond hastily with carelessly translated ads or machine translation that replicates their domestic blogs and churns them out in international markets. Both of these activities fail to achieve their overall marketing goals — building business globally, generating new leads and spreading awareness about products and services.
5.International search engine maketing:
Before companies take on social media, they need to build a foundation to support their outreach to international markets. That foundation is not as flashy as Facebook, but it can be far more effective. Furthermore, ISEM enables
every effort that comes after it, increasing penetration in new markets.
ISEM starts with the careful creation of keywords. Literal translation does not work for keyword creation, as slang and local vernacular play a significant role in regional search practices. The next step involves research into local search engine preferences.
In most of the world, the results will all point to one engine: Google. However, in some countries such as China, a local search engine will dominate. In these cases, businesses must learn the algorithms of the local favorite and create the keywords, ad placements, website content and tags most likely to boost rankings.
It’s unlikely that any business can drive international prospects to its landing pages without an integrated marketing campaign. Social media alone cannot build business abroad. For example, a retailer who leads prospects to a landing page that is irrelevant to the ad they viewed sees the impact in lower conversion rates. If a website fails to use high-quality translation, its search engine results — as well as conversion rates — will fall. These problems are solved first by ISEM, and then by an integrated group of marketing efforts. While there is a lot of international excitement around social media, the business reality is that these mediums require resources and effort; they are not quick fixes or replacements for a missing strategy.
However, when international social media outreach is incorporated into a larger, more complete marketing campaign,
it can be an effective method for reaching new prospects around the world.
Maintaining a corporate blog has many business benefits; both for search engine optimization (SEO) and from a lead generation perspective:
-Publishing regular new content signals “freshness” and keeps search engines crawling your site on a regular basis.
-Blogging is a great way to rank for long-tail search queries and more informational queries for which sales pages are unlikely to rank; these queries often reveal a high degree of intent.
-Blogging fosters link-building because helpful, informative blog posts are more likely to attract natural editorial links than sales pages.
-Positioning yourself as an expert in your field builds industry authority, trust and the strength of your brand.
For these reasons and more, many companies have launched corporate blogs.
The most successful of them have large returning readerships (in addition to high
rankings) because they’re good at anticipating what their audience wants to read.
The best way to answer the question — what does your audience want? — is to use all the
data at your disposal to define your blog’s content and editorial calendar. This article will
outline a three-step strategy for using tools and analytics to build a steady stream of
content that will appeal to your readers and customers and help achieve high search
1. Generating content ideas from keyword research When launching a new blog with a topical focus, it’s a good idea to use keyword research tools to help create a framework of topics to cover. This foundational content will serve to establish your blog as an authoritative source of
information in the industry and on the chosen topic. For example: You own a kitchen supply company and have decided to launch a food blog. By researching food-related keywords, you can plan some of the basic topics your
writers will cover — this can also help define the major categories of your blog.
By researching “recipes,” you might notice a large volume of searches for “easy recipes”. This can be the focus of the new blog.
Drilling down further into that niche, outline some subcategories to tackle, such as:
• Easy chicken recipes
• Easy pasta recipes
• Easy dessert recipes
• Easy recipes for kids
• Easy Mexican recipes
Using simple keyword research, you have now established a focal point of the blog as well as generated several ideas to get started with and on which to focus optimization efforts. And, based on this research, you now know some of the topics most relevant to your target audience.
2. Using Keyword Referrals to Build Out the Editorial Calendar Once you’ve covered the basics on the blog, it’s time to start delving into analytics data to find more specific, long-tail keywords that are driving traffic to your website. This data is especially valuable because it’s private, personalized, and proprietary — these are real keywords that are bringing real people —customers and prospects — to your pages.
Go into your analytics application and look for referring keywords — the terms that people have entered into search engines that led them to your blog. You should find some interesting long-tail phrases that are relevant to your blog, but perhaps for which you haven’t yet created dedicated, targeted posts.
• How to make guacamole
• Easy recipe for chicken parmesan
• Quick birthday cake recipes
By tackling these phrases in new blog posts, you will capture more traffic in those niches from search engines, as well as provide even more specific, useful and link-ready content for your readers.
3. Using Traffic and Engagement Data to Optimize and Refine Your Strategies Don’t stop at using keyword tools and analytics data to inspire new blog posts. You can also use this data to go back and further optimize your existing blog content for search. Published posts are still valuable sources of new traffic, links and leads even when they aren’t new. And, you can use your best-performing posts as models for creating new content that will have the most impact with your audience.
Here are some ways to use analytics data to optimize content and refine your direction:
• Check keyword reports for specific blog
posts — Are the keywords that are driving
traffic the ones that you optimized the page
for? Look for missed opportunities — are
there keyword variations you could go
back and include in the copy? Is your title
tag doing enough work?
• Pay attention to engagement, too —
Which blog posts have the most comments?
Which posts have low bounce rates or high
conversion and clickthrough rates? How
can you replicate those conditions?
• Look for patterns in your highest-traffic
and best-converting blog posts — Are
they how-to posts? Videos? What types of
posts get the most links? Do your readers
like longer posts or shorter posts? List-style
posts or articles? Learn from your own
mistakes as well as your own wins —
repeat what works and don’t waste time on
We live in a password driven world, one in which 4 to 20 characters can unlock the door to accessing data, communicating with friends, and making online purchases. The problem is that passwords should be different everywhere you use them, making it quite difficult to remember them all. And, if a password is truly strong, it’s usually even tougher to remember. But follow the tips below and you can take total control of your terms for access.
Use Different Passwords Everywhere
Why would you do this when it’s so easy to just type “fido” at every password prompt? Here’s why: If “fido” gets cracked once, it means the person with that info now has access to all of your online accounts. A recent study by BitDefender showed that 75 percent of people use their e-mail password for Facebook, as well. If that’s also your Amazon or PayPal password, and the wrong person discovers it, say goodbye to
some funds, if not friends.
Remember To Change Passwords
You should change them often (okay, maybe not every day). Don’t share them. Don’t leave them out for others to see (no sticky notes!). Actually, sorry, they should be mysterious. In other words, make your password a total mystery to others.
Avoid Common Password
If the word you use can be found in the dictionary, it’s not a strong password. If you use numbers or letters in the order
they appear on the keyboard (“1234” or “qwerty”), it’s not a strong password. If it’s the name of your relatives, your kids, or your pet, favorite team, or city of your birth, guess what—it’s not a strong password. If it’s your birthday, anniversary, date of graduation, even your car license-plate number, it’s not a strong password. It doesn’t matter if you follow this with another number. These are all things hackers would try first. They write programs to check these kinds
of passwords first, in fact.
Other terms to avoid: “god,” “money,” “love,” “monkey,” “letmein,” and for the love of all that’s techie, if you use “password” as your password, just sign off the Internet right now.
How to Build strength
To create a strong password, you should use a string of text that mixes numbers, letters that are both lowercase and uppercase, and special characters. It should be eight characters, preferably many more; a lot more. The characters should be random, and not follow from words, alphabetically, or from your keyboard layout. So how do you make such a password?
1) Spell a word backwards. (Example: Turn “New York” into “kroywen.”)
2) Use l33t speak: Substitute numbers for certain letters. (Example: Turn “kroywen” into “kr0yw3n.”)
3) Randomly throw in some capital letters. (Example: Turn “kr0yw3n” into “Kr0yw3n.”)
4) Don’t forget the special character. (Example: Turn “Kr0yw3n” into “Kr0yw3^.”)
You don’t have to go for the obvious and use “0” for “o,” or “@” for “a,” or “3” for “e,” either. As long as your replacement makes sense to you, that’s all that matters. A “^” for an “n” makes sense to me.
Password Creation Tricks
Choose something simple to remember as a password, but when you type it, place your fingers on the wrong keys—
maybe one key to the left or to the right. Then a password like “kroywen” becomes “jeitqwb” or “ltpuerm.” This is only going to work for non-perfectionist touch-typists. And skip this tip if you type passwords on your phone; you’ll only sprain a thumb trying to be inaccurate instead of letting the inaccuracy flow naturally.
Another option is to pick a pattern on the keyboard and type based on that. For example, a counter-clockwise spin around the letter “d” could result in “rewsxcvf.” Throw in some random caps and numbers to really lock it down.
Perhaps the easiest thing to remember is an acronym from a phrase of your choice. “We didn’t start the fire, it was always burning” becomes “wdstfiwab” based on the first letters of each word.
Remember, the longer the password, the stronger it is. Always. Something more than 15 characters is very difficult to remember, but it’ll be a breeze with a mnemonic.
If you don’t trust yourself to create an unbreakable password, there are plenty of tools that will make one for you. The PC Tools Secure Password Generator, for example, makes one based on your criteria: how long, include (or don’t) mixed case, numbers, punctuation, similar character replacement, etc. It even provides a phonetic pronunciation guide that you use as your mantra while typing the password, for example: MA7ApUp# is MIKE – ALPHA – seven – ALPHA – papa – UNIFORM – papa – hash.
If you’re worried that your password of choice isn’t strong enough, check it at How Secure is My Password?. The site will even tell you how long the average PC would take to crack it. For example, cracking “kroywen” would take 13 minutes, “kr0yw3n” would take about 2 hours, “Kr0yw3^” 15 days, and “MA7ApUp#” about 3 years.
You can tell from these results that more capital letters are better for strength and more characters (eight instead of seven) also make a huge difference. Adding a single capital letter to the end of “Kr0yw3^,” such as “Kr0yw3nZ,” boosts the crack time to 3 years. Throw another special character in (“Kr0yw3^Z!”) and it jumps to 237 years.
Password Tracking and Changes
It’s easy for me to say that you should use a strong password and then expect you to remember that messy non-word string of characters. But how dare You use a different password on every site you visit and account you own. That’s madness!
Or is it? Here’s a simple trick that would make your already steroid-strong password even more muscular, while individualizing it for each entry. Simply take the first three letters of the site or service you’re entering and append them to the beginning or end of your strong password. On Amazon, you’d have “Kr0yw3^AMA.” Your e-mail could be “Kr0yw3^EMA.” Facebook would be “Kr0yw3^FAC.” Notice I always use all caps for the appended letters, just to crank
up the security. This can work for banks, shopping, social networks, you name it. It’s like creating a thousand passwords you can remember easily.
Every few months, you should change all of your passwords—everywhere. Even if you made a password that would take a few centuries to hack, you might have shared it with a co-worker or boyfriend or girlfriend, right? What happens when they become ex-coworkers or an ex-BF or ex-GF? Yeah, you can probably guess.
You could change your base (“Kr0yw3^”), which might be easy if you based it on an acronym for a longer phrase. Or you could change the appended letters by moving them to the front or even the middle (“Kr0y- FACw3^” for Facebook). Perhaps switch to the last three in the service name (“OOK” for Facebook.) You could even stick in the date of the change. It’s your call.
You’ l l be most annoyed when you encounter those select few sites that only let you have a short password of four, six,
or even eight characters. What might have seemed easy before is going to soon become a vexing problem when you
embrace the might of a strong personal password paradigm.
The Right Advice is Wrong
Some experts will tell you to do a couple of things that go against conventional password wisdom. And the reasons are simple: productivity.
For example, I read a recent treatise on why you should write down your passwords, especially if you actually go the distance and use a unique string of characters for every log-in. The amount of time you could lose trying to remember each password whenever you have to type it may not be worth it. Just try to keep the list somewhere that’s not readily accessible, such as in your wallet. A desk drawer at work is not optimal for keeping out snooping co-workers.
Related advice f rom a Microsof t researcher says that having multiple passwords is also not worth the effort, or, more
specifically, the indirect costs of the effort of tracking them all. That’s right, that big list of passwords I just said to put in your pocket? Maybe it’s not worth it.
Tools of the Password Trade
What about password managers and other methods of entry-like biometrics? Well, of course. We’ll round up some of those for you soon, but first go pick a strong password for backup, just in case.