Mnemonics: Computer Password Ideas at Work

‘According to research developed by Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor and Anupam Datta, a system of spaced repetition paired with mnemonics, increases the likelihood that users will remember their passwords over long periods of time.’- Brian Donohue, Kaspersky.com

Password Protected
Computer Password Protected


Computer passwords are mandatory… Surprisingly, even though the new Windows 10 is out on the market, the old concerns are the same: ‘which is the best method to protect my computer?’ Standard operating systems require computer passwords that tend to feature protection according to the user’s computer password’s strength. Whether the computer password is software generated or well thought out, the challenge is as competitive as the hacker’s intelligence. Furthermore, encryption plays a significant role in protecting information, too. However, common security programs provide a sense of encryption for emails and certain writing endeavors. Conversely, the tendency to type anything or utilize the mouse is the risk.


What Makes a PSWD Strong or Weak?

A strong password:

  • eight characters long (minimum)
  • Does not contain your legal name, name of your organization, or username.
  • Does not contain a complete word without spaces.
  • Is significantly different from previous passwords.
  • Contains characters:
Character Definitions             Examples
  • Uppercase [alpha] letters
  • A, B, C
  • Lowercase [alpha] letters
  • a, b, c
  • Numbers (numerals)
  • 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
  • Symbols that are allocated on the keyboard  and spaces
  • ` ~ ! @ # $ % ^ & * ( ) _ – + = { } [ ] \ | : ; ” ‘ < > , . ? /

A password can obtain the same criteria above and still be a weak password. For example, Goodday2U! meets all the criteria for a strong password listed above, but still isn’t strong because it contains a complete word. G00d [email protected] 2 U! is a stronger alternative–it replaces a few of the letters in the complete word with numbers and also includes spaces.





Picture Passwords


Computer passwords and mnemonic and visuospatial [kinetic] movement codes work together. For a long time–approx. 30 years now–computer user have been utilizing password technology to enhance data [information] privacy.  This article features two ideal methods to protect your privacy–a strong alphanumeric computer password and the pictorial computer password technology.


Computer Password Generator


Finally, there are a number of effective computer password generators on the market. Additionally, the Internet provides a few interesting websites that equipped to assist users by creating a password right before your eyes. As featured, the Passwordgenerator.net website creates a genuine password within seconds.


Pictorial (Microsoft)


Compared to standard computer passwords, this method seems easier to remember because individuals tend to see objects to remember all of the time. In contrast, individuals tend to not focus so much on memorizing numbers and letters in sequence. In fact, it can take years for certain learners to conquer that particular type of goal. Moreover, the picture   for further user coding. In relation, it takes a natural feeling to motivate getting involved.

Passwords are the first-line-of-defense to deter unauthorized access to your computers and the networks that are used; over a corporate network, administrator’s assign [mandatory] strong passwords.

Check Also

A Robot Will Be the Priest at Your Funeral

A Robot Will Be the Priest at Your Funeral

A company in Japan is trying to undercut the funeral market by having a robot priest oversee the services. In Japan robots can serve as companions, helpers for the elderly, entertainment bots and even sexual partners, but now SoftBank’s humanoid robot Pepper has put itself up for hire as a Buddhist priest for funerals...