Free Password Generator

Create passwords
Password length
Include symbols
e.g. @#$%
Include Numbers
e.g. 123456
Include Lowercase Characters
e.g. abcdefgh
Include Uppercase Characters
Exclude Similar Characters
e.g. i, l, 1, L, o, O, 0
Exclude Ambiguous Characters
{ } [ ] ( ) / \ ` ~ , ; : . < >
Generate On The Client Side
do NOT send across internet
select the password automatically
Save my preference
save all the settings above for later use
Your new password:
Remember your password:
Remember your password with first letters of each word in this sentence.

Thieves can steal your weak passwords and use your information. Be careful!

Thief can easy steal your weak password your are using!
Thief is sad, because he will not be able to steal your strong password.
Thief is desperate, because it would take ages to crack your password!
Golden tips to prevent passwords hacking. Hacking can be done using three main methods i.e. Brute force, dictionary attack or even social engineering. Avoid falling prey to the tricks highlighted using the following tips:
Avoid using similar passwords, questions, and answers to security questions for your multiple accounts.
Ensure that your watchword contains at least 16 characters which should include a number, an uppercase letter, a lowercase letter, and a special symbol.
Avoid use of family, friends or pet names.
Avoid use of postcodes, birthdates, ID card numbers, phone numbers or even social security numbers.
Stay safe from dictionary attack by avoiding the use of direct dictionary words.
Avoid the use of similar phrases containing a lot of similar characters. For example, imawinnerApple, imawinnerMac, because if one gets into the hackers, it means all have been hacked.
Avoid the use of things which can be cloned such as your finger prints.
Avoid the use of web browsers as storage options for your security information. Since once saved within browsers, they can be easily revealed. Sometimes random password generators will ask you to save within the browser.
Avoid logging in to important accounts using other people’s computers. Internet café computers should be avoided at all costs as well as public Wi-Fi hotspots, Free VPN, Tor or web proxy.
Avoid sending any important information via HTTP or FTP connections. Information sent through these means can be easily hacked. Always use recognized and encrypted connections such as HTTPS or SFTP.
Ensure that you make a change every 10 weeks. The process of creating or updating your security information is much fast.
Always remember a few master countersigns. Store others as plain text and encrypted within disk encryption softwares such as BitLocker. You can also enhance their management with a password management software.
Whenever possible, encrypt and backup your passwords remotely. In case you lose your computer, it can be easy to retrieve your passwords.
Always turn on 2-step authentication. Create a way to secure your accounts by use of this technology.
Avoid storing your critical security information in the cloud.
Important websites require proper authentication. Always access their domain names or their bookmarks directly. If possible, it is advised that you verify the popularity of a website using Alexa toolbar to keep free from phishing sites.
Protect your computer with firewall and any additional good antivirus software. See to it that you block all incoming connections and any unnecessary outgoing connections. Download your softwares from sites with a considerable reputation. If in doubt, verify the GPG signature of the softwares you use.
Always update your computer operating systems updated. Operating systems refer to (windows 7, windows 8, windows 10, Mac OS X, iOS, Linux). It is advised that you regularly check for web browsers updates of your devices as well.
Secure your working environment whenever necessary by checking for the presence of hardware key loggers, software key loggers and any hidden cameras around you.
Use virtual keyboards whenever using WIFI routers at your home. Your hand gestures can be detected by your neighbors since the WIFI signal they receive, changes every time you move your fingers and hands. For added security, always change the keyboard layouts.
Always lock your mobile phone and computer whenever leaving them.
Use LUKS or any similar tools to encrypt your hard drive before putting important files on them. Always destroy the entire old drives physically if it’s necessary.
Increase your security while accessing private websites by enabling the incognito mode. You may also make a differential use of the web browsers by using one web browser for important websites and the other for accessing other websites.
If you can, acquire 3 different email addresses to access your online information. You may allocate the email resources this way: The first one to access very important commercial websites like PayPal. The second one to access other sites unimportant to you. The third one should be linked to the first as a recovery email address incase hacking occurs to the former. You can use the third email address option to take care of your Gmail, outlook and yahoo needs. Always use strong password generators like for your needs.
Use at least 2 different phone numbers, AVOID sharing your contact information to anyone especially about the receiving of verification codes.
Only click reset emails that are deemed original. Do not click any links in your emails or sms message which you cannot verify of their authenticity.
DO NOT share your email security information to anyone.
Use web based apps to avoid hackers modified programs. Whenever possible, avoid downloading software from illegitimate websites around the world. While using an online strong password generator, be careful not to save it on the browser.
Avoid allowing online paste tools and screen capture systems to upload your information to the cloud. This is more prevalent for those who use random password generators.
For webmasters, keep no user security information as plain text within the database. Instead, store them in their encrypted format. Use free password generators to assign individual members strong and secure security details.
Whenever travelling; encrypt all internet connections before they leave your mobile phone, laptop or even the router. Set up a private VPN (with MS-CHAP v2 or any stronger protocols) on your personal server (dedicated server, home computer or VPS) and connect to it.
Test how secure you are. You may be tempted to trust your already set passwords, but if a hacker steals them and their encrypted md5 hash equivalent, they can be easily cracked. Use MD5 decrypting and encrypting websites to see how long it would take to crack your security information. The longer time taken, the better the security and you can have. The use of random choice security data is of inestimable importance since ones private information cannot be got.