Free Password Generator

****************
Create passwords
Password length
Include symbols
(
e.g. @#$%
)
Include Numbers
(
e.g. 123456
)
Include Lowercase Characters
(
e.g. abcdefgh
)
Include Uppercase Characters
(
e.g. ABCDEFGH
)
Exclude Similar Characters
(
e.g. i, l, 1, L, o, O, 0
)
Exclude Ambiguous Characters
(
{ } [ ] ( ) / \ ` ~ , ; : . < >
)
Generate On The Client Side
(
do NOT send across internet
)
Auto-select
(
select the password automatically
)
Save my preference
(
save all the settings above for later use
)
Your new password:
Remember your password:
Remember your password with first letters of each word in this sentence.

Thieves can steal your weak passwords and use your information. Be careful!

Thief can easy steal your weak password your are using!
Thief is sad, because he will not be able to steal your strong password.
Thief is desperate, because it would take ages to crack your password!
Golden tips to prevent passwords hacking. Hacking can be done using three main methods i.e. Brute force, dictionary attack or even social engineering. Avoid falling prey to the tricks highlighted using the following tips:
1
Avoid using similar passwords, questions, and answers to security questions for your multiple accounts.
2
Your watchword should have a minimal of 16 characters. Use a special symbol, uppercase letter, lowercase letter and a number as password characters.
3
Avoid use of family, friends or pet names.
4
Do not include social security numbers, phone numbers, ID card numbers, birth dates and postcodes in your password.
5
Stay safe from dictionary attack by avoiding the use of direct dictionary words.
6
The watchword should not use phrases with similar characters. For example, imawinnerMac and imawinnerApple are examples of weak passwords that are easy to hack.
7
Avoid the use of things which can be cloned such as your finger prints.
8
When you use a random password generator you can save the security information within your browser. The truth is that it is not a smart idea to make use of the web browsers for storing the security information. The reason is that once the browser saves the security information, then anyone can access the information with ease.
9
Avoid logging in to important accounts using other people’s computers. Internet café computers should be avoided at all costs as well as public Wi-Fi hotspots, Free VPN, Tor or web proxy.
10
Avoid sending any important information via HTTP or FTP connections. Information sent through these means can be easily hacked. Always use recognized and encrypted connections such as HTTPS or SFTP.
11
Ensure that you make a change every 10 weeks. The process of creating or updating your security information is much fast.
12
You should be aware of some master countersigns. The master countersign managers hide your information behind the countersigns that only you can recognize. You can use disk encryption software BitLocker to encrypt your plain text password. It will be a good idea to get hold of watchword management software as well to ensure the security of your account.
13
Whenever possible, encrypt and backup your passwords remotely. In case you lose your computer, it can be easy to retrieve your passwords.
14
Always turn on 2-step authentication. Create a way to secure your accounts by use of this technology.
15
Avoid storing your critical security information in the cloud.
16
Important websites require proper authentication. Always access their domain names or their bookmarks directly. If possible, it is advised that you verify the popularity of a website using Alexa toolbar to keep free from phishing sites.
17
Protect your computer with firewall and any additional good antivirus software. See to it that you block all incoming connections and any unnecessary outgoing connections. Download your softwares from sites with a considerable reputation. If in doubt, verify the GPG signature of the softwares you use.
18
Always update your computer operating systems updated. Operating systems refer to (windows 7, windows 8, windows 10, Mac OS X, iOS, Linux). It is advised that you regularly check for web browsers updates of your devices as well.
19
You should also scan your computers to check if software key loggers or hardware key loggers are installed on your computer. You should also check if there are any hidden cameras present in your vicinity.
20
Use virtual keyboards whenever using WIFI routers at your home. Your hand gestures can be detected by your neighbors since the WIFI signal they receive, changes every time you move your fingers and hands. For added security, always change the keyboard layouts.
21
Always lock your mobile phone and computer whenever leaving them.
22
Use LUKS or any similar tools to encrypt your hard drive before putting important files on them. Always destroy the entire old drives physically if it’s necessary.
23
Increase your security while accessing private websites by enabling the incognito mode. You may also make a differential use of the web browsers by using one web browser for important websites and the other for accessing other websites.
24
If you can, acquire 3 different email addresses to access your online information. You may allocate the email resources this way: The first one to access very important commercial websites like PayPal. The second one to access other sites unimportant to you. The third one should be linked to the first as a recovery email address incase hacking occurs to the former. You can use the third email address option to take care of your Gmail, outlook and yahoo needs. Always use strong password generators like freepasswordgenerator.com for your needs.
25
Use at least 2 different phone numbers, AVOID sharing your contact information to anyone especially about the receiving of verification codes.
26
Only click reset emails that are deemed original. Do not click any links in your emails or sms message which you cannot verify of their authenticity.
27
DO NOT share your email security information to anyone.
28
Make sure that you only opt for the web based applications. This way you can get adequate protection from programs modified by the hackers. You should also ensure that you download software from legitimate sites only. If you are using a password generator make sure that you do not save your watchword in your browser.
29
Avoid allowing online paste tools and screen capture systems to upload your information to the cloud. This is more prevalent for those who use random password generators.
30
For webmasters, keep no user security information as plain text within the database. Instead, store them in their encrypted format. Use free password generators to assign individual members strong and secure security details.
31
Whenever travelling; encrypt all internet connections before they leave your mobile phone, laptop or even the router. Set up a private VPN (with MS-CHAP v2 or any stronger protocols) on your personal server (dedicated server, home computer or VPS) and connect to it.
32
Test how secure you are. You may be tempted to trust your already set passwords, but if a hacker steals them and their encrypted md5 hash equivalent, they can be easily cracked. Use MD5 decrypting and encrypting websites to see how long it would take to crack your security information. The longer time taken, the better the security and you can have. The use of random choice security data is of inestimable importance since ones private information cannot be got.