Using Secure Passwords by Elee Wright

Using Secure Passwords by Elee Wright.


Passwords are the keys to access personal information stored in your computer. This means they are the one barrier between your data being safe and sound to having your entire system compromised. The greater variety of characters in your password, the harder it is to guess. If you cannot create a password that contains symbols, you need to make it considerably longer to get the same degree of protection. Avoid using only look-alike substitutions of numbers or symbols. Criminals and other malicious users who know enough to try and crack your password will not be fooled by common look-alike replacements.

Avoid your login name. Any part of your name, birthday, social security number, or similar information for your loved ones constitutes a bad password choice. Use more than one password everywhere. If any one of the computers or online systems using this password is compromised, all of your other information protected by that password should be considered compromised as well. Change your password every 30-60 days and avoid using any old password. There are several parental controls embedded within Windows. You have the option of turning them on or off, as well as collecting information about computer usage by enabling Activity Reporting.

Web filter contains an Allow and Block list which you can edit. You can also choose to block some websites or allow all websites for the user to visit. You can also third party web content filter software for maximum protection. It’s important to advise your kids on safe surfing. Advise them on not speaking to strangers and explain how it’s very easy for someone to be misled on the internet. Tell them which sites they’re allowed to visit any why. Internet proxies act as go-between for requests from clients seeking resources from other serves. This is meant for the purpose of either keeping the machines anonymous or speeding up access to a resource via caching. The two main proxies we’ll talk about are web proxies and content filtering proxies.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s