Security

Password Strengths

Today, everyone creates a password for a variety of services but in our growing digital age it’s imperative that your passwords be created strongly.

Your passwords will act as your first line of defense for Logging into your Server in root access ,email access, EZpanel login,and much more. Here at Webair we strive to have a complex password requirement to better protect our clients sensitive data from possible intruders but also insure that the right people are logging into your servers or services.  When creating a password there’s a few fundamentals principals everyone should be practicing  .

password

DO

  • Choose a password that is at least six characters long. The goal is to discourage a brute-force attack or cracker scripts. Presently the maximum password length on many Unix systems is eight characters, but adding mix of characters can make it harder to crack .
  • Have a mix of lower-case,upper-case characters, numbers, and special characters, and at least 6 characters long.
  • Its better not to chose anything that resembles a word but if you must , at least separate the word by marks or characters of some kind .Even placing symbols in place of an actual word increases security, example :  “S@ncti0n!”

DO NOT

  • Words in the dictionary or in ANY dictionary.
  • Your user name.
  • You real name,spouse’s name, or anyone’s name.
  • Any word in any “cracking dictionary.” or commonly used passwords that a lot of people use. Some of these lists include: brand name products, movie titles, novel titles, science terms, and etc.
  • Do not write your passwords down!

 

In any event you forget a password or passwords to one of  our [label color=”primary”] Webair services [/label], just contact us and we will be glad to help you in a password reset.

password reset

Related Articles

  • WordPress Security Tips

    Introduction While WordPress is a great tool to use to manage and update your website, it’s also a frequent target for hackers or other users with malicious intent- this makes...
  • Scanning for rootkits and possible exploits – RKHunter

    Rootkits are malicious softwares that are installed by intruders to gain access to your server once the security of the server has been breached.  Intruders can leave some malicious softwares...
  • Denial Of Service: iptables Defense

    Servers sometimes get hit with what are know as DOS attacks. The offending IP address is usually readily available in the logs for the server being hit. If your SSH...
  • Using Top [ $top ]

    What is Top? Top provides a live display of information on the CPU processes. Top gets updated periodically as it provides an output CPU level percentage, Memory size, Swap Info,...