What the password and login should look like. What is login and password? Why do you need a login, how to come up with one

Today I want to touch on a very important topic that concerns any user who works on a computer and has access to the Internet.

And this topic concerns passwords that we are required to enter in almost all services, from email and social networks to a personal account on the government services website.

And, although the password policy on many sites may differ slightly (which characters can be entered when entering a password and which cannot), all services without exception insist that we use complex passwords.

Very often we simply ignore this warning. Why? In my opinion, for two reasons.

The first reason is simply laziness.

Well, the second reason, rather, partially follows from the first. It's much easier for us to remember simple password "123456 " or "qwerty", since it is simple and convenient for us to press 6 keys in succession rather than remember difficult type password "!QjhRt^&018@asW", consisting of 15 characters ( , numbers and special characters). Moreover special characters for this password ( !^& And @ ) you still need to find it on the keyboard, which is not always possible the first, second, and sometimes even the tenth time (your humble servant is no exception to this rule).

So why do you need to enter complex passwords? How to make a complex password so that it is easy to remember?
I want to talk to you about this and much more in this lesson.

First, about logins

The Internet is remarkable in that we ourselves can come up with a “name” under which, firstly, we will be recognized on the Internet, and secondly, we will be entered into forms in which we are asked to enter our username and password.

This could be your real name, or it could be something original that you came up with.

There are some problems with real names on the Internet today. Real names are practically all taken. What does "busy" mean?

One illustrative example is creating an email account on any email service.

For example, I want to create a mailbox on the yandex.ru mail service. And I want my email address to be [email protected].

Beautiful, understandable, recognizable and easy to remember.

I'm trying to do this. I enter it into the field “Create a login” your name in Latin - Oleg.

The service tells me that "Sorry, login is busy". And it offers me 10 options for free logins.

But all of them do not suit me for one simple reason - they are too long. Moreover, it asks you to enter your mobile phone number as a unique login. It turns out that everyone who receives my letters will know my mobile phone number. Is this what you want? For example, I don't want to.

OK then. I’ll overcome my laziness and bias towards long logins and add my last name with a dot. Judging by the options offered by the service, you can use the dot in the login. I enter Oleg.Ivashinenko.

The result is similar to the previous one. It turns out that there is already an account on the Yandex mail service with the same first and last name.

This means I need to come up with my own unique name, which, most importantly, I liked myself.

At one time, I racked my brain for a long time on how to come up with a name for myself so that I would definitely not forget it and so that it would be more or less sonorous.

In the end, I took the first two letters of my first and last name and got Nick(nickname - from the English nickname, which means “another name”, “pseudonym”) oliv.

But over time, this nickname was also occupied by the services where I registered. Then I added two more letters from my middle name and it turned out to be a nickname olivur.

For the last 10 years I have used this nickname during registrations without any problems. So if I have a postal email address in the form [email protected], that will also be good.

I enter into the form my original, as I believe, login “olivur”.

Busy too. I don't want to give up. I add the magic seven to the name.

Everything worked out. Basically, the email address [email protected] looks good too. You can continue registration.

True, I won’t do this, since I already have 2 mailboxes on Yandex. Enough for now. Let's move on to passwords.

I have nothing to hide. I'm an honest person.

Very often on various forums, especially on forums on computer and Internet security, I often come across comments like “I have nothing to hide. I'm an honest person."

And, although I usually don’t comment on such statements, one time I still couldn’t stand it and wrote something like this: “Well, since you have nothing to hide and you are an honest person, then write your login And password from this forum where we communicate."

Do you think there was a response to my comment? Right. There wasn't. This means there is something to hide. And if there is something to hide, then in the context of this phrase the forum member is no longer an honest person.

Okay, this is all sophistry.

In fact, all information relating to each user should still remain confidential. Starting from the passport number and TIN to the email address, as well as logins and passwords for various resources and services on the Internet.

At the initial stage of mastering a computer, it is really difficult to understand why confidentiality is needed. But with time, understanding will come.

Let me give you a few of my own examples.

For the second year now I have not gone to the post office or Sberbank to pay utility bills.

I make all payments from home using my home computer. These are the so-called online services of various banks.

Russian Standard Bank calls its service “Bank in your pocket”, VTB24 calls it “Telebank”, etc. And, although the names may be different, the essence is the same - everything is very convenient and transparent.

To conduct financial transactions, I have three plastic cards - salary, debit and credit.

I use the debit card as a “passbook” and very rarely pay in the store. Very convenient. There are no fees for maintaining cards or accounts. Well, interest also accrues on the accumulated funds.

I pay all payments using my salary card. Well, if suddenly the time comes to pay the receipt, and there is nothing on the salary card, then I pay with a credit card. Well, from my next paycheck I’ll transfer the required amount to my credit card so that no interest is charged.

So why am I telling all this?

I do all this (payment of utility bills using ready-made templates, transfer of money from account to account) in the personal accounts of the relevant banks. Well, access to these personal accounts carried out according to logins and passwords.

Since this is my personal finance, I am very keen that no one except me knows my credentials in these banks. And, although when performing financial transactions banks require confirmation codes, which they send me via SMS to my mobile phone, my passwords are quite complex.

And, although, just in case, they are written down in my , I remember these passwords. But more on that a little later.

Another illustrative example.

Just recently I registered on the government services website. It turned out to be quite an interesting and necessary portal for me, at least.

I was surprised to discover that I had a tax debt. But the surprise quickly passed, as I remembered that I paid the land tax too late. And I got a penalty. My debt to the state a month ago was already 12 rubles. 75 kop.

At the same time, I looked to see if I had any traffic fines. It turned out that there is one. Although I have not yet received any paper by mail.

Although I’m not going abroad yet, I still paid off these debts so that my soul would be at peace.

The resource turned out to be interesting. You can easily get a foreign passport, register your car, enroll your child in kindergarten, etc. etc.

So, as login this resource uses the number SNILS A. This login is truly unique and only I know it.

SNILS is the Insurance Number of the Individual Personal Account of the insurance certificate of the state pension insurance. Well, so that no one had access to my personal information, I had to come up with a really complex but memorable password.

How passwords are cracked

I'm not a hacker or a computer security expert. But I am familiar with the basic principles of information security. And you should know them. This will help save a lot of nerve cells in the future.

I will not deny that a hacker (the largest specialist in the field of computer system security), if he wants to hack your computer, will do it. Provided, of course, that you yourself are not an expert in this field.

One thing consoles me. To be honest, neither you nor I are needed by hackers at all. Take my word for it. They have global interests.

But as for us mere mortals, quite common programs on the Internet work with us and are available to any user.

I have already described how such programs get onto our computers in the lesson “”. Therefore, I will not repeat myself.

Now I want to tell you about one of the types of such programs that select passwords on various information resources.

This type of program is called "Brutforce". This name comes from a combination of two English words "brute force" , which mean "Total overkill" or "Brute force method".

Such password guessing programs use special "dictionaries". What are "dictionaries"?

A “dictionary” is a regular text file (or several files), each line of which contains a “word”. For example:

password

So here it is. Such programs take each “word” from such a “dictionary” in turn and substitute it in the password field until this “word” matches the “word” you created that you use as a password.

Depending on the complexity of your password, such a program may take from a few seconds to hundreds of years. Or maybe he won’t be able to pick it up at all.

So if you have a password "qwerty" or, let's say "z,kjrj"(word "apple", typed in English), then this type of program will take seconds to guess the password.

So what to do? How do you know how simple or complex your password is?

In fact, it's not all doom and gloom.

Coming up with a complex password

Computer security specialists are also not sitting idle. They conduct ongoing analysis of various malware. In particular, programs like “Brute force”.

And at the moment there are already a lot of resources on the Internet where you can check the uniqueness of your password.

Let's use one of these resources as an example and see how to create a “complex” but easy-to-remember password.

Let’s choose http://password.ru/ as such a resource (More services for checking password strength: 2ip.ru, howsecureismypassword.net)

Another resource, the link to which was sent to me by reader Mary: https://ru.vpnmentor.com

I will tell you about one of the algorithms. But you can show your imagination and come up with your own algorithm.

Let, for example, your name is Ivanov Ivan Ivanovich. We “come up” with a password based on our last name, since we definitely remember this word from childhood - ivanov

Judging by the site's response, cracking such a password will take less than a second. Add an exclamation point (or any other special character) before the last name - !ivanov

Already better. To crack such a password, the program will need 12 minutes 57 seconds.

Add an exclamation point after the last name - !ivanov!

The result is also not a very complex password, which can be cracked in 12 hours and 31 minutes.

Add the numbers 12345 to the end - !ivanov!12345

As you can see from the message, such a password can be cracked in 7 and a half million years.

Although the password turned out to be complex, it is quite easy to remember. These are roughly the same algorithms for creating passwords that I use myself.

There is another option for creating complex passwords that are easy to remember.

For example, this morning before work, the cartoon “The Scarlet Flower” was shown on TV. Why not a password? Easy to remember.

But, of course, it is not advisable to leave such a password. Let's change it. Let's type the name of the cartoon in English case with a small letter without a space: fktymrbqwdtnjxtr and check it on the website.

It would take about half a million years to crack such a password.

As you can see, it is not at all difficult to come up with a complex, easy-to-remember password.

That's all for today. Good luck and creative success to everyone. 🙂

With respect to all my readers and subscribers

Oleg Ivashinenko

If you liked the article, share it with your friends on social networks.

    There are 15 comments on this post

Hello, dear readers of the blog site. It seems like a simple question, but it still often arises for novice Internet users when they need a login and password.

It would be better if I immediately warn you and try to explain the importance of your usernames and passwords, because on the Internet they break everything, and not just where something is located.

What is “my login” and how does it differ from a username?

So, login is your individual identifier (must be unique for the service where you register). Now many services allow you to use names or nicknames written in Russian letters as your logins, but previously everyone was required to use exclusively Latin characters and numbers when writing them.

This is apparently due to the fact that the data received during user registration (login and password) is stored in the database. Therefore, when entering my login, I use the same rule that is acceptable to use in - ,,,[_],[-]. This spelling is suitable when registering for any service.

You still have to figure it out what is login, and what is a username. Very often one is different from the other. This confusion is growing from the same above-mentioned rule of using only Latin characters when registering, while on the forum, website, blog and social network where you register, it would be appropriate to use usernames (real or nicknames) written in Russian language.

That’s why you often have to fill out two fields in the registration form: login (only in Latin) and name (possibly in Russian). True, there is now a general trend on the Internet towards simplification, and there are fewer and fewer sites where you are confused by incomprehensible fields with two similar concepts.

Now often use as their login just your mailbox address or the mobile phone number specified during registration. Moreover, you can use any of these identifiers (login, phone or E-mail). It is clear that I am not talking about forums, but about sites like or.

It’s also worth coming up with your login wisely, because your personal data (full name) indicated in it can help attackers apply social engineering methods to you if you inadvertently become an object of interest for such individuals (this is how wallets in electronic payment systems, postal and social accounts, as well as much more).

In our digital age, we need to learn to be vigilant and overcome our innate gullibility. Don't think that no one needs you. They are needed, but not you specifically, but together with thousands more careless users like you. Accounts are stolen online and then sold in bulk to spammers and other bad people.

In addition, please note that on most services, the the login cannot be changed later, except perhaps only by registering a new account. Therefore, try to think through in advance all the awkward moments that may arise in this regard (for example, having registered in Miralinks under the nickname of one well-known character in the world of SEO, I received questions from the administration several times about the ownership of certain sites added to this system).

A complex password is what will allow you to sleep peacefully

Well, now let’s talk about the second part of personal data, which you will need so much when logging into any service on the Internet. I'm talking about password. What is it? Ideally, this is a very difficult to select and difficult to predict set of characters, which are not always letters or numbers.

The more complex my password is, the more difficult it will be for attackers to hack my mailbox, account on a forum, website or social network by simply searching through dictionaries. An example of bad options would be your name typed in the Latin layout, qwerty options, 123456 and thousands of others, lists of which are available to any hacker lying around.

It is clear that you are insured in case you forget the password you came up with or lose the piece of paper on which you wrote it down. But anything that helps you recover it will help the attacker figure it out. The good old saying still applies: if you put it further away, you will take it closer.

Personally, I realized the need using a secure manager to store my passwords and logins only after the theft of funds from my WebMoney wallet and after almost all of my sites were infected with viruses. In both cases, there was a banal theft of passwords (in the first case, it seems that my mailbox with a password equal to qwertyqwerty was hacked by brute force, and in the second case, my passwords for accessing sites via FTP, stored in clear text in a file file, were taken out).

Carelessness is always punishable, especially on the Internet, where the situation is similar to the dashing nineties in Russia. When choosing a password manager, I was guided by reviews on the Internet, and also by the fact that it was free and open source(any understanding programmer will be able to identify developer loopholes if they exist).

The latter is important, because trusting all your data to one single program is quite fraught. But if there are no “bookmarks” in the code, then opening the database without entering a master password or specifying a key file will be almost impossible, because cracking a complex database encryption key with passwords by brute force can take years even on a supercomputer.

The program is again free and open source - time-tested reliability. In general, be vigilant and do not trust even yourself in matters of security.

Good luck to you! See you soon on the pages of the blog site

You can watch more videos by going to
");">

You might be interested

How to register on the social network Twitter? Yandex Account - registration and how to use the service Account - what is it, how to create or delete it
How to restore a page in Contact (if access is lost, deleted or blocked) How to delete your page on Odnoklassniki
How to put a password on a folder (archive or otherwise password protect it in Windows)

Not every beginner knows how to come up with passwords and logins so that they are reliable and easy to remember. The article will discuss such important combinations that each user is able to register to work online.


The modern owner of a computer with Internet access is offered all the advantages: freedom of access to data, communication through various channels, a large assortment of technical tools designed to visualize creative ideas, sources of income and much more.

A good memory for logins is necessary, because a lot depends on it. For example, a letter read in a timely manner, data saved on time, etc. To ensure effective work on the Internet, you will need at least several personal logins and passwords to gain access to forums, various social networks, and video conferences. The fact is that there are billions of users on the global web. Therefore, the most successful and well-known login options are already taken. It's worth noting that there are different approaches to creating names. You can see the most typical examples.

As a rule, the basis is the user’s first and last name, his creative combination of numbers with the user’s data, as well as significant dates, a nickname, and an informal version of the name. There are also game nicknames. This is a nickname used in computer games. It should be noted that the content of the login itself is not particularly important. The main condition is uniqueness. If it is not met, the user will not be able to register on the site. In some cases, the specified login cannot be changed, so it is recommended to approach this issue thoughtfully.

Logins based on full name

Users often provide their passport information on the Internet. Such a login is almost impossible to forget, but its uniqueness is at a low level. There is a way out in this situation. It consists of combining a full name with numeric data, using a dot or hyphen as a separator, and using suffixes and special characters. Examples could be the following:

- anna.andreeva.1999;
- semen-semenich.

Here everything depends on the imagination of the user himself. However, in this case, for many, the year of birth is visible. You can also use any numbers. For example, postal code or car number. This login is already quite difficult for third parties to guess. A secret combination of characters is used to register on a forum, social network, or website. A password is also required. It is recommended that it be close to the login, which will allow you to remember it faster. Examples could be:

— pr-manager (profession);
- lenochka (sister's name).

It is worth noting that the password can be changed if the need arises.

Mail logins

As a rule, a mail login is created in order to create an email account. Its address is a combination consisting of the domain name of the individual “number” of the box. Users can enter words and numbers as symbols. Elementary examples of logins for mail are:

[email protected];
[email protected].

As for the choice of mailbox, it depends on the personal desires of the user, and the name depends on the audience to whom you will need to send letters from this address. There is a difference between personal mail and business mail. A personal mailbox is required for personal correspondence, while the second one is intended exclusively for business relationships.

Login for Skype

Today, Skype is used by virtually all users with access to the Internet. And this is not surprising, because it offers to create chat and video conferences with a person located anywhere in the world. The Skype application also requires a nickname when registering. It is desirable that it is easy to remember. There is no point in giving examples, as this can be done endlessly. It is better to take the name of the Skype program itself as a basis, adding your own individual data to it. Examples of some logins specifically for Skype:

- marina.erohina-skype;
- skypeskriper;
- dimaskype.

In addition to the login options discussed above, there is another type of secret combination. She is selected more strictly and seriously. This combination is a business login that is used in work or in the process of correspondence with users that are of great importance for one's career. It’s hard not to agree that such a frivolous contact as [email protected], will gain authority in business circles.

There is also a high probability that a letter from such an addressee will be immediately sent to spam without being read. To gain authority and respect, you must be professional, have good manners and work efficiently. However, little things like a torn button or a ridiculous mailing address can confuse an employer or business partner. Here are some examples of professional logins:

[email protected];
[email protected];
[email protected].

As it is worth noting, in this case a completely different impression is created.

How to quickly remember logins?

Every user is exposed to the risk of losing personal data. To prevent this from happening, it is recommended to secure the combination in a safe place that is not accessible to unauthorized persons. The login and password can be encoded in a notebook or kept in a special file offline. It is desirable that both combinations are logically related to each other. As for a professional login, it may contain a password in the form of the name of a department or product produced by the company. In personal data, you can use the child's name or the name of your favorite TV series.

And an example of logins" in order to give yourself a worthy name and remember this vital combination. Let's look at examples of logins and passwords that a user can register to work online.

The modern Internet user has access to all its advantages - freedom of access to information, communication through a variety of channels, an immense arsenal of technical tools for visualizing their creative ideas, sources of income... Sometimes a lot depends on a good memory for logins - a letter read on time, data saved on time . To work effectively on the global network, you need at least several individual logins and passwords to access forums, social networks, chats, and video conferences. The problem is that there are almost a billion users on the Internet. And all the most successful and common login options have already been mastered by someone.

There are different approaches to forming names. Let's look at typical examples of logins that are accepted in the online world. The most common ones are often based on one’s own first and last name, a creative pseudonym, a combination of numbers with meaning for the user (year of birth with a name, other important dates), a nickname, an informal version of the name. There are gaming nicknames - in computer games. In fact, it doesn’t matter what exactly the login contains. The main thing is that it must be unique, otherwise the user simply will not go through the registration procedure on the site. Sometimes it is impossible to change the selected login; it is better to approach this issue quite thoughtfully.

Example of logins based on full name

Most often, a user names himself on the Internet using his own. This is a logical and easy example of logins, the most common, but associated with the problem of uniqueness - there are many identical surnames. In this situation, there is a way out: connect your full name with digital data, separate them with a dot or hyphen, use suffixes, prefixes and special characters.

  • anna.andreeva.1999;
  • semen-semenich.

It all depends on the user’s imagination. True, in this case, many people know the year of birth. You can use any numbers - postal code, car number. The login is used to register on a website, forum, or social network. This requires a binding; it’s better to take someone close in spirit to the login to make it easier to remember:

  • pr-manager (profession);
  • lenochka (sister's name).

The password can be changed if necessary, especially after a hacking attempt.

Mail logins

Basically, a login for mail (examples will be discussed below) is created in order to create the latter; it is a combination of the domain name of an individual mailbox “number”, which can be designated by a word and numbers. A typical example of logins for mail looks like this:

The choice of mailbox depends on and the name - on the audience to which letters can be sent from this address. There is a difference between personal mail and business mail - the first is intended only for private correspondence, the second - only for business relationships.

Login for Skype

Chat and video conferencing capabilities thanks to the Skype application are used by a lot of people today. In addition to mail and many other numerous online registrations, Skype also requires you to register a nickname that is easy to remember. What is the best username to use on Skype? Examples can be given endlessly, but it is better to take the name of the program - Skype - as a basis and add your individual data. Here is an example of logins designed specifically for Skype:

  • marina.erohina-skype;
  • skypeskiper;
  • dimaskype

This way, uniqueness will be maintained, and it will be easier for all users (including you) to remember your unique name for communicating on Skype.

Universal and professional logins

If the options discussed above are quite individual, then here is another example of logins that are selected quite strictly and seriously. This is your business login, which you use at work or when corresponding with people important to your career, clients, and officials. Agree that by sharing a frivolous contact( [email protected] or [email protected]) You are unlikely to gain authority in business circles. In addition, such an email address is difficult to remember, and the first time the addressee receives such a letter, the addressee may send it to spam without delving into it. To gain the authority of others and inspire respect for yourself, you must not only be a professional, have good manners and work efficiently. Little things like a missing button or a stupid email address or online nickname can confuse an employer or business partner alike. Here's an example of logins that will reflect your personality and make them easy to remember:

[email protected];
[email protected];
[email protected].

As you can see, the impression of a business login is radically different.

How to remember logins

In order not to expose yourself to the risk of data loss, you need to record your login and password combination in a safe place, inaccessible to strangers, encode it in a notebook or keep a special offline file where you can enter all individual data. It is desirable that the login and password are logically related to each other. A professional login may have a password in the form of the name of the department or product that the company produces. Personal - the name of a child or favorite film actor. Using it, you can securely fix the most ornate login in your memory.

Very often we don’t know how to come up with a login for Skype or email. We are looking for appropriate programs or trying to come up with a login ourselves. So, what kind of login can you come up with? First of all, let's figure out what the concept of “login” actually means. Login is a concept that means your name in some system, for example, in an email box, on a website or on a social network. In another way, a login is called a nickname or username; there may be such an option as a “fictitious name”. Quite often, the user uses the same login in the games in which he registers, in mailboxes and in other services.

How to come up with a login for mail

First, of course, you should determine what purposes your given mailbox for which you need to come up with a login will serve. If this is a work mailbox, then for convenience it is advisable to use your last name and first name, or combine them in a certain way with the name of the organization, if it has not previously appeared in the name of the email server. For work email, we also recommend that you provide accurate information and data about your first and last name when registering. Examples: ,

If you want to create a mailbox for your personal use, then you can choose, for example, an option such as a nickname generator. A nickname generator is a special program that creates nicknames and names for social networks according to user criteria. A person only needs to indicate the desired length of the nickname and the characters with which it should begin and end. The program will do the rest itself, and the person will not have to rack his brains to create a name. An example of such a program would be a server such as: Nickname generator.

How to come up with a username for Skype

On Skype, simple and uncomplicated nicknames and logins are most often used. The most common option is, of course, the first or last name in English and the year of birth.

If you want a more unique login, you can use the following tips:

  • Close your eyes, place your fingers on the keyboard, and type the combination of the required length. The resulting word or phrase will become your new nickname. (hjhlkjk).
  • Think about your hobbies and favorite things, perhaps these are the things that will give you a wave of imagination. (foot_ball).
  • You can use the mirror method. Write your first and last name backwards. A very creative option. (ariavonavi).
  • You can also use some abstract concept or dog name as a nickname. (l_o_v_e).

Now you know what kind of login you can come up with. Good luck to you in your business!