Passwords & Identity

How to Password-Protect Your USB Drive (Everything You Need to Know)

How to Password-Protect Your USB Drive (Everything You Need to Know)

How to Encrypt a USB Stick with VeraCrypt

How to Encrypt a USB Stick with VeraCrypt

Make Your Own Cold Storage USB Crypto Wallet

Make Your Own Cold Storage USB Crypto Wallet

How to Safely Migrate from Lastpass to KeePassXC

How to Safely Migrate from Lastpass to KeePassXC

What Backup Strategy is Best for You?

What Backup Strategy is Best for You?

Canadian Guide: How to Buy, Store, & Spend Private Crypto (Monero XMR, Pirate Chain ARRR)

Canadian Guide: How to Buy, Store, & Spend Private Crypto (Monero XMR, Pirate Chain ARRR)

Is Cryptography Math, Or Computer Science?

Is Cryptography Math, Or Computer Science?

Is Cryptography Hard To Learn? (Skills, Requirements, Salary, Free Courses)

Is Cryptography Hard To Learn? (Skills, Requirements, Salary, Free Courses)

How Many And What Keys Are Used In Asymmetric Cryptography?

How Many And What Keys Are Used In Asymmetric Cryptography?

Three Types of Cryptography Methods & When to Use Which

Three Types of Cryptography Methods & When to Use Which

Blowfish vs. AES: What Is the Difference?

Blowfish vs. AES: What Is the Difference?

Is Your Dumb Password on This List?

Is Your Dumb Password on This List?

Here is an updated list of common passwords discovered in data breaches. This file contains the top 100,000 passwords from the Have I Been Pwned data set. If you see a password that you use in this list you should change it immediately.