Supplied the number of different teams of sign in credentials we need, specifically online, managing strong password policy for ones whole computing life may go through like an impossible challenge. Unfortunately, many people are unaware of the importance of using strong passwords that are unique in each context where a password is needed. Such as they just create the one same password for every login account. Even if they are aware of these measures to protect their private data and login credentials, many of themjust easily lost or frogot their password accidentally. That is why so many people work with their personal PC everyday, but they are still forgot Windows pasword, lost RAR password and even lost their database doxument password frequently. Yes, these problems happened everyday for every people. More and more people will get this kind of questions repeatedly.
So select a suitable password manager is a very nice idea to secure your compter. Many people do not consciously think through all the implications of the design and feature set of a given password manager when they select it, beyond the basics of ensuring that it encrypts stored passwords.
A number of key characteristics of a password manager are very important for securely managing passwords:
- Encryption: Stored login credentials should always be stored in an encrypted form, using peer reviewed, heavily tested, strong encryption, so that even if the device used to store the passwords is stolen the thief is unlikely to be able to recover passwords.
- Secure resource usage: A number of possible vulnerabilities involving unsecured resource usage are possible. For instance, using secure memory that will not be written to a pagefile or swap partition on disk guards against the danger of a decrypted password being dumped onto the disk where it can be recovered later by a malicious security cracker.
- Self-contained functionality: A lot of software is not written with absolute data security in mind, and it often should not be written that way if the intended functionality of the application presents no need for such security. This does mean, however, that any password management software should not trust the security of outside applications. What good is using secure memory if the decrypted passwords will just be passed directly through another application that stores everything in tempfiles that may never be explicitly deleted?
- Usability: Quick, simple, and easy use of the day-to-day functionality of the password manager is important for ensuring that the password manager actually gets used regularly. If it is not at least nearly as easy to use for all of a user’s common password needs, it may get neglected in favor of less secure options.
- Verifiable design: Just as encryption that does not trust the user is not trustworthy, the same is true of software that handles any part of one’s secure data management needs. This is especially true of something like a password manager, which manages the data used to access other applications that also need to manage data securely. To ensure that the software is trustworthy, it should be verifiable — which means that the source code is not only available for scrutiny, but verifiably the same as the source code used to produce the actual executable program itself.