Password entropy describes how difficult a password is to predict. It does not arise from deco complexity, but from real search space.
Password Magazine
Practical guides on strong passwords, password managers, data breaches, hashing, MFA, and passkeys.
Recommended articles to start with
Start with these pieces if you want to get the basics quickly and see what is worth reading next.
How does a password generator work?
A password generator creates random strings or passphrases that are much harder to guess than manually thought-up passwords.
What is a strong password?
A strong password is long, unique, and random enough that it cannot be guessed or efficiently reused with leaked data.
Store passwords securely: This is how to do it correctly
Passwords shouldn't end up in notes, browser text files, or reused patterns. The safest way is clean administration with a password manager.
All magazine articles
Browse guides on creating, storing, and protecting passwords.
Password generator
Basics of strong passwords, length, passphrases and entropy.
Passwords and passphrases can both be secure. The difference lies primarily in length, randomness and practical memorability.
Password length is one of the strongest levers for security. For important accounts, 16 characters or more is a good standard.
A password generator creates random strings or passphrases that are much harder to guess than manually thought-up passwords.
Password security
Typical mistakes, safe patterns, rules and practical examples.
Good password rules protect users without forcing them into unsafe workarounds. Bad rules only breed frustration and weaker practice.
Insecure passwords can often be identified by predictable patterns, reuse and an attempt to meet minimum rules with as little effort as possible.
Good password examples do not show exact copy templates, but rather the differences between weak patterns, usable passwords and strong, random variants.
The most common password mistakes are predictable patterns, reuse, and passwords that are too short. It is precisely these mistakes that make real takeovers possible.
Special characters can help, but are not the core of password security. Length and randomness are almost always the stronger levers.
A strong password is long, unique, and random enough that it cannot be guessed or efficiently reused with leaked data.
Storage
Password managers, master passwords and secure storage.
Password managers are not risk-free, but they are significantly safer for most users than reuse, browser chaos, and manually managed password lists.
A master password protects the entire vault. Therefore, it should be longer, more unique and chosen more carefully than ordinary login passwords.
Browser storage is convenient, but not always equivalent to a dedicated password manager with clear security architecture and better management.
A password manager stores, organizes and generates credentials so that each account can have its own strong password.
Passwords shouldn't end up in notes, browser text files, or reused patterns. The safest way is clean administration with a password manager.
Data Leak & Attacks
Leaks, reuse, credential stuffing and attack scenarios.
Brute force and password spraying are both login attacks, but they differ in whether they test many passwords against one account or a few passwords against many accounts.
Credential stuffing doesn't use magic, but mass: leaked credentials are automatically tried out on many other services.
Password reuse is one of the biggest damage multipliers. Otherwise, a single leak can immediately endanger several accounts at the same time.
A leak check shows whether a password or associated data has appeared in known databases of compromised credentials.
If a password has been leaked, speed matters: change password, check reuse, end active sessions and activate MFA.
Authentication
MFA, passkeys, rotation and password security for teams.
Not every account is equally critical. Email, banking and social media each require slightly different priorities, but uniqueness and strong passwords are the basis for each.
Companies don't need an overly strict password policy, but one that supports secure habits, MFA and clear processes.
Passkeys move authentication away from the classic password. However, they do not solve all security questions and do not eliminate passwords overnight.
MFA does not replace good passwords. It reduces login risk, but weak or reused passwords remain an attack vector.
Passwords should not be constantly changed without reason. The decisive factor is the change after specific risks, leaks or if there is weak legacy.
Cryptography
Hashing, Salt, Pepper and secure password storage on websites.
If a service can decrypt passwords, that's a red flag. Good password systems usually don't need this capability at all.
Argon2, bcrypt and scrypt are password hashing methods with different strengths. Modern systems often rely on Argon2 if the environment supports it properly.
Salt and Pepper are additional protection mechanisms for password hashes. They make mass attacks more difficult and improve resilience in the event of leaks.
Hashing and encryption are often confused. For passwords, hashing is the right approach because the server should not be able to recover the original password.
Reputable websites do not store passwords in plain text, but rather as hashed values with additional protection mechanisms such as salt and modern password hashing procedures.