Bytes Interactive Password Generator  







Password Generators



Password Don'ts
  1. Do not use words or names found in dictionaries in any language.

  2. Do not prefix or suffix words or names found in dictionaries in any language with random characters less than 8. mary8U3k
    6Tdqmydog
    etc ...
    These can be easily cracked since the randomness is less than 8.

  3. Do not leave your computer unprotected at any time. Always use a firewall, virus protector (more than one) and spyware/malware scanner (more than one). You don't want your good passwords and what they are used for stolen by key loggers.

  4. Do not repeat characters. This reduces a password's randomness

  5. Do not use leet characters in dictionary words or names. m@ry (mary)
    p0p51cl3 (popsicle)
    5p0r+ (sport)
    etc ...


  6. Do not select a known phrase or expression for any acronym password.


Random Passwords
Strong Passwords generated from Pseudo Random Number Generator (PRNG) algorithms that uses a random seed (the starting number of the algorithm) will produce a very good password.

It is good in the sense that it will be difficult to guess at and could only be cracked using a brute force algorithm which is a program that attempts all possible combinations.

In addition passwords are secure when the characters are selected from a large character set and are long.

Bottom line keep passwords random and long (at least 12 characters; not less than 8).

There are 4 Character Sets to choose from
  1. (0-9)
  2. (a-z)
  3. (A-Z)
  4. Special Symbols (, ', ", [, ], (, ), :, ;, ., ?,^, %, $, #, @, !, -, +, =, -, *)
Next to each set is a checkbox and a dropdown. In the dropdown one can pre-determine how many characters are selected for the password. The default called R indicates that the selection will be randomly determined.

Typewriter passwords help some people to memorize random passwords.

A typewriter password starting from the left has all the odd position characters selected from the left side of the keyboard while all the even position characters are selected from the right side of the keyboard.

A typewriter password starting from the right has all the odd position characters selected from the right side of the keyboard while all the even position characters are selected from the left side of the keyboard.

Clearly Jerry Lewis will have no problem with random passwords as seen in this YouTube Video

Why Did We Create GoodPassword.Com?
We created this web site
  1. educate internet users on the importance of choosing good passwords that are random, long and selected from a large character set.
  2. to experiment with new techniques and methods of password creation.
  3. for fun.
We always welcome your comments and feedback on how we can improve and add new features to our programs.



Thank-you and enjoy!

How Does Our Program Work?
GoodPassword.com uses 100 Pseudo Random Number Generators (PRNGs). The PRNG is based on Mersenne twister. Each PRNG is assigned to a user by the last 2 digits of their IP number. Each PRNG is seeded by a set of random numbers received from random.org through a SSL (Secure Sockets Layer) connection, a web site which generates random numbers from radio waves. The state of each PRNG is what we store in a SQL datatable for 300 minutes. A crontab script (a scheduled task) runs every 30 minutes to check if any of the PRNG'S state is older than the 300 minutes. If so the state is deleted and thus leaving no trace of how any password was created.

Note:
  1. The time we set to change the seed to the PRNG can vary since its dependent on the allowance set by random.org. Currently there is a quota of 200,000 bits per day though it can vary.
  2. We DO NOT STORE IP addresses, User Agent or any infomation accessible from the browser to the password applications' SQL database in order to preserve your anonymity.

Leet Passwords and Password Recovery
Leet Passwords are easy to remember acronym passwords generated by combining the first letter of each word, randomly changing the case, and replacing alphanumeric characters with their Leet (1337)1 equivalents, that is characters that look and/or sound the same ( Single ASCII 1337 Characters ). It is essential that the phrase selected is uncommon and known only to you.

By selecting the password recovery feature one will be able to retrieve their password with our password recovery tool in the event of forgetting or losing it. All that is required is the original phrase used to create it. How does this feature work? A cookie is created to remember the pattern taken by the password created from the phrase. Each character extracted from the phrase can have 4 possible states either as an upper case letter, a lower case letter, or up to 2 leet character substitutions. The following example illustrates this process. My wonderful dog Goldie is eight years old.
A possible password for this is: MWd913Yo
The pattern for this password is: CCcLLlCl

Legend of the 4 Possible Character States
C Upper Case Character
c Lower Case Character
l 1st Leet Character Equivalent
L 2nd Leet Character Equivalent

Each time a phrase is created a new cookie is created to remember the password pattern. In instances of more than one password of the same length the password recovery program will display all possible passwords used.

Also note that each cookie is created to expire in 1 year unless you remove it. Further if one prefers not to use a cookie then simply record the password pattern which is displayed next to the password upon creation.

The Leet equivalents used are defined in the table below.

Single ASCII 1337 Alphabet *
A @   4
B 8
C [   (
D D
E 3
F F
G 6   9
H #
I !   1
J J
K K
L 1
M M
N N
O 0
P P
Q Q
R R
S 5   $
T 7   +
U U
V V
W W
X X
Y Y
Z 2


* Single ASCII 1337 is built from Light 1337 and Hard Core 1337 of all possible single ASCII characters in the range of 33 to 122.



Copyright ©2003-2012   Bytes Interactive   All rights reserved.
Disclaimer