Password  

articles.

Here you will find information about how to password protect your PC.

A Windows password alone is not sufficient to password protect your computer. The Windows password is used simply to identify who is logging into a Windows computer, in order for Windows 95 or 98 to adjust the desktop settings for multiple users on the same computer. The Windows password can easily be bypassed.

In Windows 95 or 98, the best way to password protect your computer would be to create both boot and screen saver passwords. Since a screen saver password can be bypassed by restarting the computer, you also need a boot password to keep anyone from breaching your security.

There are many reasons why you should protect your information. If you use the internet or e-mail, your private correspondence is available to anyone who knows how to access it. This might be fine for ordinary messages, but not if they contain sensitive information that you want only the recipient to read. Perhaps you have a notebook you carry around that contains confidential data. What if the hard disk fell into the wrong hands? How would your organization suffer if the data was discovered by your competitors? Privacy is an encryption and decryption application.

  • Password Protection
  • Boot password
  • How can I get rid of the Windows 95 password
  •  How do I eliminate the password request at login
  • How can I password protect my computer In Windows 95 or 98
  • How do I force a password change on an existing account
  • How do I install a Password protected screen saver
  • On a PC, how do I reset, or remove, the CMOS password
  • Require a password protect PC entry
  • Screen saver password
  • What are .pwl files, and how can they affect my passwords
  • Screensavers-password
  • What are guidelines for a good password
  • What are Windows 98 and Windows 98SE
  • Screen password
  • Public Access Security Issues
  • Security Available
  • Protect the computer at the user interface level.
  • Protect the computer at the hard disk level.
  • Your Computer's Built-In Security
  • Protect  Booting from a floppy disk
  • Prevent booting from a Floppy Disk
  • How to remove the password
  • Test the Security
  • Why Should I Care about Password Security?
  • What Are the Guidelines for Choosing a Password?
  • What Are Some Strategies for Choosing a Good Password?
  • How Can I Avoid a Bad Password?
  • How Do I Change My Password?
  • How to get Windows-98 to save login password
  • How to Password-Protect a Windows Computer
  • Password-Protect Your Computer While It Is Asleep
  • Password-Protect Your Screen Saver
  • The Screen Saver Password
  • Document History
  • Deleting Your Web History
  • Multiple User Accounts
  • Creating User Profiles
  • Eliminating The Windows Password
  • Stop People On The Network From Accessing Your Files
  • Your Personal Pass To Privacy
  • Network & Screen Saver Passwords
  • Access control
  • Prepare To Use Access Control
  • Share-Level Control
  • User-Level Control
  • Use Software-Level Controls
  • Measures To Protect Your PC
  • Passwords
  • Windows Logon
  • Profiles
  • Poledit
  • System Security
  • Protect Your PC From External Intruders
  • Protecting Your System
  • Multiple Users
  • Protecting Screen Savers
  • Protecting Folders On A Network
  • Password Protecting Files
  • Keep passwords secret
  • Keep personal information private
  • Windows Password
  • Windows Passwords
  • Add Desktop Security

  • E-mail deleted

  • Educate your children about online safety
  • When children are using PCs

  • Restrict the computer

  • Destroy your cookies

  • Control access

  • Write-protecting

  • Make backups

  • Secure computers

  • Virus scanning software

  • CMOS Passwords

  • Protecting file

  • Password Basics

  • How Are Passwords Stolen?

  • How Often Should I Change My Password?

  • BIOS

  • Disable keys

  • Passwords are easy to forget. Many users therefore choose simple passwords.Organizations today have an average of three logon systems, usually each with different password rules. From the user's point of view, this creates a great deal of confusion. We know, as do the hackers, that 30-50% of users choose passwords like the name of their spouse, child, pet or car, or telephone numbers and dates of birth of family members. An IT administrator frequently like to place complex requirements on the choice of passwords, but then pays the price of having to deal with users forgetting their passwords more easily. The graph above will not come as a surprise, but it is important to bear it in mind. Why do users forget passwords when there are limitations on their structure? This is largely because users do not realize how important passwords are for security. A good password consists of between six and eight characters. One easy way of creating a good password, that is easy to remember, is to group together two and two or three and three (lower security) letter/characters, for example ‘BA SK 86 18’. This method is already used as a way of making telephone numbers easier to remember (grouping 2+2+2+2 or 3+5). The advantage of these passwords is that they remain strong even if the composition of only two characters is changed. The widely-used alternative is to place an extra character after a spouse's name: BILL, BILL1, BILL2, etc. It should be the responsibility of the system administrator to inform users of the rules governing passwords, and to ensure that the rules are followed. It is difficult for a logon system to detect every weak password. This needs to be compensated for by creating a positive general atmosphere surrounding passwords and data security.

    Home page