SlideShare uma empresa Scribd logo
1 de 7
The worst passwords of 2012
It’s getting difficult these days to be a
technology user. You need passwords for
everything, and you can’t use the same
one for everything. Also, IT departments
are increasingly enforcing policy around
how often you must change passwords,
and well as their composition.

One can feel the user’s pain, but still,
there’s no excusing these selections from
SplashData’s “Worst Passwords of 2012”
list. Frankly, if one of these was your
passwords, you’re the reason IT policies
exist.
                                            Image courtesy of digitalartat FreeDigitalPhotos.net



              By Jeff Jedras
#17: welcome (new)
The top newcomer to this year’s worst
passwords list is, appropriately enough,
welcome.

So first of, welcome to the list, welcome. And
second, you’re a horrible password.

You may as well just be saying “welcome to
my computer and its confidential data, evil
doers.”

To look at it more positively, while we may be
a less welcoming society in general these
days, apparently that trend doesn’t apply to     Image courtesy of John Kasawa FreeDigitalPhotos.net

our computers.
#14: sunshine (up 1)
                                                          It’s comforting on one level to know
                                                          that there are happy, cheerful people
                                                          out there that put bright and positive
                                                          words such as sunshine as their
                                                          passwords.

                                                          But while sunshine may be the best
                                                          disinfectant (other than bleach), it’s not
                                                          the best password for your confidential
                                                          accounts.

                                                          For those, a little less sunshine and a
                                                          little more security is probably in order.

Image courtesy of Salvatore Vuono FreeDigitalPhotos.net
#12: trustno1 (down 3)
First of all, kudos for the X-Files
reference (if it’s a reference to Dave
Navarro’s solo album, kudos withdrawn).

And trusting no one is the right attitude
to have when it comes to picking your
password and IT security.

Perhaps you’re still trusting too many
people though, as trustno1 finishing
fairly high up the worst passwords list.

Heed your own advice, and pick a
stronger password.
#11: iloveyou (up 2)
While it is nice to see that the love is
growing, with iloveyou moving two spots up
the worst passwords list this year, the
people that really love it are the password
crackers and hackers.

When it comes to IT security, there’s no
place for love. Not unless you throw in
random capitalization and a random symbol
or two.

That would be a password an IT manager
could love.


  Image courtesy of Stuart Miles FreeDigitalPhotos.net
#7: letmein (up 1)
This is the default password for many IT
shops.

When policy isn’t enforced though, many
users never change it from the default,
which is why it’s so high up on the worst
passwords list and is up one spot over last
year.

At least it’s truth in advertising though: with
letmein as your password, you are proffering
an open invitation for your account to be
hacked.
                                                  Image courtesy of graur codrin FreeDigitalPhotos.net
#1: password (unchanged)
Honestly, if you put password as your
password you should just do yourself a favour
and wire your life savings to Nigeria now.

Perhaps you thought you were being clever.
Maybe your theory was that password is an
easy password to remember, and no one
would think people would be foolish enough
to make password their password, so you’ll
be safe.

Well, you’re crazy. And you have the worst
password of 2012.

                                                Image courtesy of Stuart Miles FreeDigitalPhotos.net
And probably the worst of every other year
too.

Mais conteúdo relacionado

Mais de JeffJedras

The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading listJeffJedras
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoidJeffJedras
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travelsJeffJedras
 
Five embarrassing mobile device thefts
Five embarrassing mobile device theftsFive embarrassing mobile device thefts
Five embarrassing mobile device theftsJeffJedras
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environmentsJeffJedras
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phonesJeffJedras
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)JeffJedras
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PCJeffJedras
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?JeffJedras
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013JeffJedras
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackersJeffJedras
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxesJeffJedras
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designsJeffJedras
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computersJeffJedras
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twistJeffJedras
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product namesJeffJedras
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographicsJeffJedras
 
Five Apple failures to launch
Five Apple failures to launchFive Apple failures to launch
Five Apple failures to launchJeffJedras
 
Six weird iPhone apps
Six weird iPhone appsSix weird iPhone apps
Six weird iPhone appsJeffJedras
 
Six new products we couldn’t possibly need
Six new products we couldn’t possibly needSix new products we couldn’t possibly need
Six new products we couldn’t possibly needJeffJedras
 

Mais de JeffJedras (20)

The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading list
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
 
Five embarrassing mobile device thefts
Five embarrassing mobile device theftsFive embarrassing mobile device thefts
Five embarrassing mobile device thefts
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twist
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographics
 
Five Apple failures to launch
Five Apple failures to launchFive Apple failures to launch
Five Apple failures to launch
 
Six weird iPhone apps
Six weird iPhone appsSix weird iPhone apps
Six weird iPhone apps
 
Six new products we couldn’t possibly need
Six new products we couldn’t possibly needSix new products we couldn’t possibly need
Six new products we couldn’t possibly need
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

The worst passwords of 2012

  • 1. The worst passwords of 2012 It’s getting difficult these days to be a technology user. You need passwords for everything, and you can’t use the same one for everything. Also, IT departments are increasingly enforcing policy around how often you must change passwords, and well as their composition. One can feel the user’s pain, but still, there’s no excusing these selections from SplashData’s “Worst Passwords of 2012” list. Frankly, if one of these was your passwords, you’re the reason IT policies exist. Image courtesy of digitalartat FreeDigitalPhotos.net By Jeff Jedras
  • 2. #17: welcome (new) The top newcomer to this year’s worst passwords list is, appropriately enough, welcome. So first of, welcome to the list, welcome. And second, you’re a horrible password. You may as well just be saying “welcome to my computer and its confidential data, evil doers.” To look at it more positively, while we may be a less welcoming society in general these days, apparently that trend doesn’t apply to Image courtesy of John Kasawa FreeDigitalPhotos.net our computers.
  • 3. #14: sunshine (up 1) It’s comforting on one level to know that there are happy, cheerful people out there that put bright and positive words such as sunshine as their passwords. But while sunshine may be the best disinfectant (other than bleach), it’s not the best password for your confidential accounts. For those, a little less sunshine and a little more security is probably in order. Image courtesy of Salvatore Vuono FreeDigitalPhotos.net
  • 4. #12: trustno1 (down 3) First of all, kudos for the X-Files reference (if it’s a reference to Dave Navarro’s solo album, kudos withdrawn). And trusting no one is the right attitude to have when it comes to picking your password and IT security. Perhaps you’re still trusting too many people though, as trustno1 finishing fairly high up the worst passwords list. Heed your own advice, and pick a stronger password.
  • 5. #11: iloveyou (up 2) While it is nice to see that the love is growing, with iloveyou moving two spots up the worst passwords list this year, the people that really love it are the password crackers and hackers. When it comes to IT security, there’s no place for love. Not unless you throw in random capitalization and a random symbol or two. That would be a password an IT manager could love. Image courtesy of Stuart Miles FreeDigitalPhotos.net
  • 6. #7: letmein (up 1) This is the default password for many IT shops. When policy isn’t enforced though, many users never change it from the default, which is why it’s so high up on the worst passwords list and is up one spot over last year. At least it’s truth in advertising though: with letmein as your password, you are proffering an open invitation for your account to be hacked. Image courtesy of graur codrin FreeDigitalPhotos.net
  • 7. #1: password (unchanged) Honestly, if you put password as your password you should just do yourself a favour and wire your life savings to Nigeria now. Perhaps you thought you were being clever. Maybe your theory was that password is an easy password to remember, and no one would think people would be foolish enough to make password their password, so you’ll be safe. Well, you’re crazy. And you have the worst password of 2012. Image courtesy of Stuart Miles FreeDigitalPhotos.net And probably the worst of every other year too.