I confirm that I have read and understood the
terms of use.
DON'T INSERT ANY OF YOUR REAL PASSWORDS!
Provide new passwords that are similar in complexity to your usual ones instead.
This website should help you to improve your knowledge about password security so
you can choose stronger ones in the future.
How to choose a strong password:
Multiple char-sets (character types):
uppercase/lowercase letters
numbers
special characters
Length! A long and easy to remember password is stronger than an short but complex one.
Don't use words, which could be listed in a dictionary.
Use made up words instead e.g. "hoonicorn" or "dogastrophic". By doing so you are able to memorize your password more easily and it is still very strong.
No dates of birth or names of people, pets, locations, movies, tv-shows, music.
No obvious number/letter swap like 3 instead of E or 0 (zero) instead of O. Use random numbers at random positions.
You can use e.g. two or more dice to get random numbers.
Put special characters at random positions. Don't put them at the start/end of your password and not between words.
What you should do:
Use a password manager software, e.g. KeyPass.
It stores your passwords encrypted and in a secure manner on your computer.
With this password manager you can automaticaly generate for every user account a separate and very complex password
with the maximum length. In addition you don't have to remember it anymore.
You have to choose a very strong master password to decrypt and access your password database.
This password you still have to remember, but now it's only one instead of many.
Change all your passwords on a regular basis (3-4 years).
Is this website safe?
To check your password for vulnerabilities of attack two, listed on the "How we check your password" page, we send parts of your
submission that contain letters to the following online dictionary over a encrypted connection.
https://dictionaryapi.dev/
To check your password for vulnerabilities of attack three, listed on the "How we check your password" page, we send it
to the following API over a encrypted connection.
https://haveibeenpwned.com/
DO NOT enter your username and/or password on any website other than the authentic and official website of that corresponding user account.
This still holds for this website.
You could become a target of an "Phishing Attack". You can learn more about "Phishing Attacks" and how to resist them on
Phishing Resistance
This website uses state of the art security technologies and does not store your input in any way. You could therefore
enter passwords at your own risk.
Enter passwords, following the same scheme instead:
with the same length
the same amount of uppercase/lowercase letters, numbers, special characters
the same amount of words, names
How we check your password:
complexity of your passwords
resistance against "bruteforce attacks"
whether your passwords contain english/german words
vulnerability check for "dictionary attacks"
whether your password was leaked
vulnerability check for "dictionary attacks"
Bruteforce Attacks:
Passwords gain their strength through their complexity. With complexity we don't mean how random you chose your characters, but
we mean the amount of permutations the used character sets and the password length it creates.
The most simple attack is the "bruteforce attack", the attackers have to try until they find your password.
This attack has a success rate of 100%, because every permutation in all possible permutations is tried.
When defending against this attack, you try to increase the number of permutations(character combinations) the attacker has to try until he finds our password.
Increasing the number of permutations only buys you time until the attack succeedes and that is why you need to change a password on a regular basis.
Dictionary Attack:
Similar to the bruteforce attack, but with this one the attacker tries a combination of words from a dictionary.
The source dictionary can be an ordinary dictionary of any language, but also a list of common or even leaked passwords.
Therefore, never use the same password twice.
In following terms of use, the author is mentioned as "I", "me", this website as "web application" and the user as "you".
This web application was created exclusively for educational purpose regarding "serverless computing"
and should visualise my skills as a software engineer as part of my portfolio.
In no event will I be liable to you for damages, including any
general, special, incidental or consequential damages arising out of the
use or inability to use the program (including but not limited to loss of
data or data being rendered inaccurate or losses sustained by you or third
parties), even if you or other party have been advised of the possibility of
such damages.
The web application is provided "As is" without warranty
of any kind, either expressed or implied, including, but not limited to,
the implied warranties of merchantability and fitness for a particular
purpose. The entire risk as to the quality and performance of the web application
is with you. Should the web application prove defective, you assume the cost of
all necessary servicing, repair or correction.
By using the web application you confirm that you understood and accept the terms of use.