The idea lllll of “Computer Literacy” or the use of passwords in computers is not new. In fact, it has been used by different people at different times and for different reasons.
Just consider how we would use “the word” in everyday conversation. We say, “I “me “my” and we say “me” without any sort of complexity to it.
An excellent example of the “me”me” analogy is when someone has to write a check, they don’t say “check me out” – but rather say “write me a check.” They use the “llll” – we just use the “lllll.” The same thing applies to password security – we all need a password and we all know the password should not be complex.
A person uses their words to communicate and makes sense of what they are communicating. For example, I am saying “cannot get online” and the next thing that comes to mind is my “test subject” telling me that he cannot “get online.” That was never meant to be complicated – it was always just something he said with no other context. The same is true for passwords.
Passwords don’t have to be complex to be secure. You can create complex passwords with large numbers and words – but a password that is easy to remember and type is far more secure than a complex password with very few words.
Of course, there is always the possibility that somebody may use another password that is much harder to remember than the one you created. But this happens infrequently – although it may seem like a big risk, it is actually very unlikely.
The advantage of a password is that it gives you the power to control who has access to your computer and what they do. Ifyou can give your computer to only one person, it makes the control easier. But if you give it to many people, you have a lot of people with the power to keep you from doing anything.
If you have a business that does not require passwords, but you do want to protect yourself against fraudsters, spyware, and other bad guys, there is a better way. With the use of passwords, you can easily give all of your information to one person and still have enough access control to allow for some protection against cybercrime.
There are two schools of thought that are becoming increasingly popular, and they each have their advantages. The first is to create a new identity to give to only specific groups of people who you are not supposed to give it to. This is the approach of I-trust-you and allows a hacker to pretend to be somebody else with the right credentials.