大象传媒

Managing information on computersUser accounts and passwords

Using computers and the internet to store, access and organise information carries some risk. You need to take responsibility to make sure files are not lost, corrupted or viewed by the wrong person.

Part of ICTSoftware

User accounts and passwords

All of your , and are stored in your . You can your user account to prevent other people from accessing its contents. Your username is commonly based on your name and you usually get to choose your own password.

To access your user account, enter your username and password into the . Sometimes the username is selectable or entered for you, especially if you were the last user to login to the machine.

A user name and secure password login protect a computer

Passwords can be set to expire, at which point you will be forced to choose a new one. This is a security feature. Always choose a password that鈥檚 difficult for someone else to guess.

Choosing a password

A strong password is:

  • at least eight characters long
  • a mixture of numbers, uppercase and lowercase letters and other symbols, eg !@#拢$
  • not a real word
  • impossible to guess

A weak password might be:

  • the word 鈥榩assword鈥
  • your favourite colour/favourite football team/pet鈥檚 name
  • a single letter
An graphic showing the importance of choosing a strong password by choosing characters, numbers and symbols.

Stealing a password

The word 鈥榗racking鈥 is used to describe the process of obtaining a password by force. use programs that use brute force and dictionary attacks to crack passwords.

  • A brute force attack tries every combination of letters, numbers and symbols until it identifies the password.
  • A dictionary attack behaves in the same way but uses a list of words instead.

Do not write your passwords down and use a different password for each of your accounts. If you use the same password, a hacker that gains access to one of your accounts will have access to all of them.