Do More Web & Search Examples of Weak and Strong Passwords These are the best passwords to secure your account Share Pin Email Print Web & Search Safety & Privacy Best of the Web Search Engines Running a Website By Paul Gil Writer Paul Gil, a former Lifewire writer who is also known for his dynamic internet and database courses and has been active in technology fields for over two decades. our editorial process Paul Gil Updated November 09, 2019 1,213 1213 people found this article helpful A good password isn't necessarily synonymous with one that's easy to remember. Good, in this context, is strong. You want a super-strong password so that it's more resistant to guessing and so that it's unlikely to be found in a brute force dictionary hack. To keep your accounts secure, make a strong password that's difficult to guess and store it in a password manager so you won't forget. Examples of Bad Passwords Hackers and computer intruders use automated software to submit hundreds of guesses per minute to user accounts and attempt to gain access. These tools use lists of dictionary words to sequentially guess the password. Some tools add common symbols, numbers, or signs that may be added to the password to make it more complex. Lifewire / Alex Dos Diaz Never use password as your password. A surprising number of people make this mistake. Dictionary hacking tools that use an English dictionary list easily find words that are contained in that dictionary. If the simple word doesn't give access to an account, the tool modifies the submission and tries other iterations of the same word. For example, a Dictionary hacking tool would attempt these iterations of the word Dog: DogDogsDogcatcherDogcatchersDogberryDogberriesDogmaDogmaticDogmatizedDog1Dog2Dog3Dog4 Password-guessing tools submit hundreds or thousands of words per minute. If a password is anything close to a dictionary word, it's extremely insecure. When a password does not resemble any regular word patterns, it takes longer for the repetition tool to guess it. Passwords with personal information, such as the user's birthdate or street address, are easy targets for hackers, as well. How to Make Your Password More Secure The best way to create a secure password is to start with a simple password and turn it into one that's much more complex. The table below shows examples of a simple password that is progressively made more complex. The first column lists simple words that are easy to remember and are found in the dictionary. The second column is a modification of the first column. The last column shows how the simple password is converted into one that is harder to figure out. OK Password Better Password Excellent Password kitty 1Kitty 1Ki77y susan Susan53 .Susan53 jellyfish jelly22fish jelly22fi$h smellycat sm3llycat $m3llycat allblacks a11Blacks a11Black$ usher !usher !ush3r ebay44 ebay.44 &ebay.44 deltagamma deltagamm@ d3ltagamm@ ilovemypiano !LoveMyPiano !Lov3MyPiano Sterling SterlingGmal2015 SterlingGmail20.15 BankLogin BankLogin13 BankLogin!3 Here are other examples of password variations that purposely avoid using complete English word patterns: Dog.lov3rdOG.lov3ri7ovemydog!!d0gsaremybestfr13ndssn00pdoggyd0GKarm@beatsDogm@C@ts-and-Dogs-Living-together By injecting numbers and special characters instead of letters, these passwords take exponentially longer for a dictionary program to guess. Continue Reading Make Your Passwrod Hard to Crack How to Encrypt Your Access 2013 Database With Password Protection Keep Your Online Accounts Secure With These Password Techniques How Do You Add a Recovery Email Address to Your Microsoft Account? How to Make a Killer Password Have You Changed Your Router Password? Here's Why You Should How to Choose an Unhackable Email Password How to Store and Remember Passwords Securely Is Your Password Strong Enough? What Does Case Sensitive Mean? Change Your AOL Mail Password Regularly Protect Your Passwords From Hackers How to Beef Up Security on Your Home Wireless Network What Is a Password Manager and Why You Need One What Is a Cryptographic Hash Function? 4 Security Lessons We Can Learn From 'Mr. Robot'