Password Strengths

Today, everyone creates a password for a variety of services but in our growing digital age it’s imperative that your passwords be created strongly.

Your passwords will act as your first line of defense for Logging into your Server in root access ,email access, EZpanel login,and much more. Here at Webair we strive to have a complex password requirement to better protect our clients sensitive data from possible intruders but also insure that the right people are logging into your servers or services.  When creating a password there’s a few fundamentals principals everyone should be practicing  .



  • Choose a password that is at least six characters long. The goal is to discourage a brute-force attack or cracker scripts. Presently the maximum password length on many Unix systems is eight characters, but adding mix of characters can make it harder to crack .
  • Have a mix of lower-case,upper-case characters, numbers, and special characters, and at least 6 characters long.
  • Its better not to chose anything that resembles a word but if you must , at least separate the word by marks or characters of some kind .Even placing symbols in place of an actual word increases security, example :  “S@ncti0n!”


  • Words in the dictionary or in ANY dictionary.
  • Your user name.
  • You real name,spouse’s name, or anyone’s name.
  • Any word in any “cracking dictionary.” or commonly used passwords that a lot of people use. Some of these lists include: brand name products, movie titles, novel titles, science terms, and etc.
  • Do not write your passwords down!


In any event you forget a password or passwords to one of  our [label color=”primary”] Webair services [/label], just contact us and we will be glad to help you in a password reset.

password reset

Related Articles

  • Prevent hot linking of images.

    Hot linking is displaying an image on a website by linking to the same image on another website, rather than saving a copy of it on the website on which...
  • Patching The Ghost Vulnerability

    The Ghost vulnerability, also known as CVE-2015-0235, is an exploit in a library named glibc. This library is referenced by many applications which run on your server. The exploit is...
  • WordPress Security Tips

    Introduction While WordPress is a great tool to use to manage and update your website, it’s also a frequent target for hackers or other users with malicious intent- this makes...
  • Identifying malicious mail scripts on FreeBSD

    This article will help you identify an possible spam scripts that may be causing unwanted outbound mail which could cause your servers ip address to be blacklisted.There are many different...