5 Ways To Create A Safe Password Without hurting your brain

If there is one thing I've learned while doing research for At Wit's End, it's that computer security experts know we pick awful passwords. We use pets, our address, our spouse's names, or any other number of things closely associated with our lives.

Let's not do that anymore. Here are five methods to choose a password that is easy to remember but is hard to crack.

Please note, you can use any one of these methods, or you can mix and match. Have fun with this annoying task!

1. The Randomly Open A Book Method

At Wit's End, to be re-released through Booktrope publishing February 11

I constantly have paperback or hard cover books laying around. There's one underneath my monitor right now. If you're a reader like I am, you probably have some around you as well.

Open the book to a random page. In this instance, I'm using page 10 from my Advanced Reading Copy of Tracer by Rob Boffard.

Count down a set number of lines. In this example, I'll use ten. The first complete sentence I find there is: "Darnell glances up, and Reece jerks his head at the door."

The next part depends on how many characters the password wants you to use. Many are 8-16 characters. Many require alpha-numeric so numbers will be needed.

Using this method, my password would be: 10Dguarjhhatd

The 10 is for the number of lines from the top I selected. The letters are the first letter from each word in the sentence.

Only you know what book you chose, and you can keep a bookmark on the page and no one will be the wiser.

2. Using a Favored Lyric

But A.K., you say, you told us not to use things that are personal. Everyone knows my favorite song!

Of course they do, because you play it all the time. Remember that song you played a million times, ten years ago? Trust me, your friends don't and neither will a hacker.

Similarly to what we did with the book, this time we choose a song. I'll use Crash Into Me by Dave Matthews Band for this example.

One of my favorite lines in one version of that song goes, "I'm the king of the castle/you're a dirty rascal."

I'll choose either KingOfTheCastle or ADirtyRascal

When numbers are required, it's quite simple to swap out the i's with 1 or the a's with 4.

K1ngOfTheC4stle or 4D1rtyR4sc4l

Disclaimer: Author does not accept blame for songs being stuck in users' heads.

3. The Only Acceptable Childhood Memories Method

Who was your oldest friend? The one who was there when you took off your training wheels, or bought your training bra?

Can you picture them? What was their phone number? What road was your school on?

These can be fun to blend. In the interest of protecting my friend's privacy, I'll use a fake New York phone number for the example.

I like using their phone number as a base, and then breaking it up with random information in the middle.

Samples: 555Main1234 or 212555Second1234

School mascots can be helpful, also.

555BlueDevils1234 212555Hawks1234

Again, this isn't your phone number, it is one that has no association with you, but you probably dialed it a million times. Probably while listening to that song we mentioned earlier.

It can also be a nice reminder to check back in with your friend. You're welcome!

4. The Random Phrase That Only Means Something To You Method

We all have a sentence that stuck with us for some reason. Maybe it was the funniest thing you've heard in months, or something you'd like to catch on as your personal catch phrase.

On our first date, my Companion and I started talking and, by the time I brought my head back out of it, the sun was near rising.

Having enjoyed a few frothy brews, my first question upon return to reality was, "What time does the sun rise around here?"

No one but my Companion and myself would remember this phrase because no one was around to hear it. I chuckle about it all the time.

So an excellent password based off of that is: SunRiseRoundHere

Once again, we can replace some letters with numbers. In this instance we have o's and i's.

SunR1seR0undHere

Unguessable, my friends.

It's awkward to type, I understand. That brings us to the fifth method, which is my Consultant's suggested method.

5. The Shave And A Haircut... Two Bits A.K.A. The Rhythm Method

Pretty sure that shave cost more than 2 bits. And what would 2 bits be after inflation? Anyone?

This is an advanced method for people comfortable with their keyboards.

For this method, forget the letters and numbers on the keys themselves. We're going to choose a design that can be drawn on the keyboard.

I'm going to show you two this time. One without making use of the shift key, and one with. They will be the same pattern, starting in the same location, but very different and completely uncrackable passwords.

It's a zig-zag pattern.

First, without the shift key, is 1q2w3e4r

Second, with the shift key, is !Q@W3e4r

You'll notice we used the shift key in the first half of the password, but not the second. Use the shift key however you see fit, or don't, but the use of it does make cracking your password exponentially harder.

Final note from my Consultant:

When using a touchscreen, be sure to wipe and dust your prints from it often. Believe it or not, a gummy bear can be used to defeat your fingerprint scanner on nearly all devices, including the smart phone you are probably reading this on.

Sharing is caring. Please help make sure your friends and family are using passwords safely. Share this article with someone it can help.

A.K. Lawrence is an author with Booktrope Publishing. Her first re-released romantic suspense novel is coming out February 11, 2016.

Created with images by jeroen_bennink - "Keyboard" • *King of the Ants* - "Making Music" • gabemac - "BFF Gabe & Gabe" • puroticorico - "Aphoric Amor; That Universal Phrase, I Love You" • BotheredByBees - "celtic knot haircut"

Made with Adobe Slate

Make your words and images move.

Get Slate

Report Abuse

If you feel that this video content violates the Adobe Terms of Use, you may report this content by filling out this quick form.

To report a Copyright Violation, please follow Section 17 in the Terms of Use.