Javascript must be enabled to continue!
How to Protect Your Passwords and Secret Personal Notes
View through CrossRef
Many people think of using passwords for their data security, but few of them think about how to protect their passwords. The passwords we use also need to be protected. While creating a password, it’s better to create a strong password, but because many people can forget it, they choose to use weak or reused passwords, which make their accounts more vulnerable to breaches. Many people forget their passwords, and sometimes it’s impossible for some systems to restore forgotten passwords. This is why I thought the solution of that problem: Creating a writing system (script) as secure method to write and save offline my passwords or/and secret personal notes. The result of this study is to show that anyone can create easily not language, but his own alphabets or writing system (script) and this will help to resolve the problem of forgetfulness and confusion of passwords and you will never have fear again of creating strong passwords or passphrases. The finding will also help to write and save safely your secret personal notes using your own writing system (script).
EdinBurg Peer Reviewed Journals & Books Publishers
Title: How to Protect Your Passwords and Secret Personal Notes
Description:
Many people think of using passwords for their data security, but few of them think about how to protect their passwords.
The passwords we use also need to be protected.
While creating a password, it’s better to create a strong password, but because many people can forget it, they choose to use weak or reused passwords, which make their accounts more vulnerable to breaches.
Many people forget their passwords, and sometimes it’s impossible for some systems to restore forgotten passwords.
This is why I thought the solution of that problem: Creating a writing system (script) as secure method to write and save offline my passwords or/and secret personal notes.
The result of this study is to show that anyone can create easily not language, but his own alphabets or writing system (script) and this will help to resolve the problem of forgetfulness and confusion of passwords and you will never have fear again of creating strong passwords or passphrases.
The finding will also help to write and save safely your secret personal notes using your own writing system (script).
Related Results
Cyber and Physical Access Control in Legacy System Using Passwords
Cyber and Physical Access Control in Legacy System Using Passwords
Passwords—secret combinations of symbols—play an important role in physical world security (e.g. watchword to prevent unauthorized entry into military forbidden...
Usability Study on Textual and Graphical Passwords
Usability Study on Textual and Graphical Passwords
One of the most common methods used for authentication are passwords, in particular textual passwords. However, maintaining multiple textual passwords across various websites or in...
Efficient Plain Password Cryptanalysis Techniques
Efficient Plain Password Cryptanalysis Techniques
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common mea...
Are Joint Controllers Joint Trade Secret Owners? What EU Data Protection and US Information Privacy Law Tell Us About Trade Secret Law
Are Joint Controllers Joint Trade Secret Owners? What EU Data Protection and US Information Privacy Law Tell Us About Trade Secret Law
The article focusses on (joint) trade secret ownership as a (neglected) aspect of European Union (EU) and United States (US) Trade Secret Law. The article shows that Information Pr...
Evaluating Windows Vista user account security
Evaluating Windows Vista user account security
In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too muc...
Trade Secrets, Good Fences, and Big Data
Trade Secrets, Good Fences, and Big Data
The "fencing costs" theory of trade secrecy posits that in the absence of legal protection, holders of confidential information will overinvest in secrecy precautions relative to t...
Verifiable secret sharing based on the Chinese remainder theorem
Verifiable secret sharing based on the Chinese remainder theorem
ABSTRACTA (t,n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such a way that (i) the secret can be recovered successfully with t or more than t s...
Le secret bancaire. Etude de droit comparé (France-Suisse)
Le secret bancaire. Etude de droit comparé (France-Suisse)
Si le secret bancaire helvétique fait régulièrement l'objet de virulentes critiques et attaques sur le plan de la scène politique internationale, à chaque crise, un constat s'impos...

