Parent Previous Next

EG Free Antivirus 2018              


A Password is a string of characters used to verify the identity of a user during the authentication process. According to the strength, password may be divided in three categories.

  1. Week Password: A password that is easy to detect both by humans and by computer. People often use obvious passwords such as the names of their children or their house number in order not to forget them. A typical weak password is short (1 to 5 characters) and consists solely of letters in a single case. However, the simpler the password, the easier to detect.
  2. Strong password: A strong password is one that is designed to be hard for a person or program to discover. Essential components of a strong password include sufficient length (minimum 8 to 10 characters) and a mix of character types (atleast mixture of 2 small, 2 capital alphabets, 2 numbers and 2 special characters).
  3. Very strong password: Includes (minimum 12 to 16 characters) mixture of atleast 3 small alphabets, 3 capital alphabets, 3numbers and 3 special characters. The password should not contain a dictionary word, combination of dictionary words, special numbers sequences and series of special number sequences. Any word on its own is bad.

How to choose a very strong password:

Guidelines for choosing good passwords are typically designed to make passwords harder to discover by intelligent guessing.

1.  Use a minimum password length of 10 to 14 characters.

2.  Include lowercase and uppercase alphabetic characters, numbers and symbols.

3.  Generate passwords randomly where feasible.

4.  Avoid using the same password twice (e.g., across multiple user accounts and/or software systems).

5. Avoid character repetition, keyboard patterns, dictionary words, letter or number sequences, user names, relative or pet names, romantic links            (current or past) and biographical information (e.g., ID numbers, ancestors' names or dates).

6. Avoid using information that is or might become publicly associated with the user or the account.

7. Avoid using information that the user's colleagues and/or acquaintances might know to be associated with the user.

8. Do not use passwords which consist wholly of any simple combination of the aforementioned weak components.