On Passwords
|
One crucial aspect of securing data is your password. Ideally you should change your password regularly for added security.
|
|
If you do not enter the password you cannot access the encrypted contents. There is no special procedure, secret code, or hidden entry method to fall back on.
|
|
*********************************************
|
Should this be a concern, we would recommend that you consider the purchase of Cryptainer Enterprise, a corporate version, which has an integrated administrative module. Cryptainer Enterprise has been extensively deployed in corporate environments where sometimes there is a necessity to recover the password/phrase which may have been lost/forgotten or other contingencies. The end-user interface is identical to that of Cryptainer. More information is available here
|
*********************************************
|
|
A good system is to use two unrelated words separated by a symbol or mark (e.g. rare;beast). Random strings of characters, numbers, and special characters are even better. For example 6j3*{>s1r2%u~9m). Such passwords are not easy to remember but they are also not easy to crack.
|
|
Pass phrases are much better than passwords. You can use a sentence up to 100 characters. This makes it easy to remember but almost impossible to crack.
|
|
To illustrate, "The rain in Spain falls mainly in the drains" (apologies to G.B.Shaw) is probably a perfect pass phrase, or about as perfect as it gets. Easy to remember, and almost impossible to crack.
|
|
Bad Passwords
|
Words extracted from databases, dictionaries, or encyclopedias.
|
Personal information like your name, phone numbers etc.
|
Phrases or secret codes used in popular movies or serials.
|
Swear words and commonly used slang.
|
Keyboard patterns (e.g. asdfg).
|
Simple character strings and numbers (e.g. AAAAA or 123123).
|