RE: OT: LinkedIn Hacked

Subject: RE: OT: LinkedIn Hacked
From: "Dan Goldstein" <DGoldstein -at- riveraintech -dot- com>
To: <techwr-l -at- lists -dot- techwr-l -dot- com>
Date: Thu, 7 Jun 2012 11:00:33 -0400

"A pet I often use for passwords" might be a mistake.

Whenever a web site requires a favorite pet's name, town I was born in,
first-grade teacher, etc., I always make up a unique answer for just
that web site, and I store it along with the password. I try not to let
passwords have *anything* in common with each other - heck, they're
already sharing my user name!

-----Original Message-----
From: Mike Stockman
Sent: Thursday, June 07, 2012 10:55 AM
To: TECHWR-L Writing
Subject: Re: OT: LinkedIn Hacked

A method I use to remember passwords is to store obscure password hints
in plain text, and keep that file wherever it's convenient (Evernote is
my cloud service of choice). The hints should be something you can
figure out but that are unlikely in the extreme for anyone else.

For example, my LinkedIn password hint is "snackfood,pet1", meaning that
the password is my favorite junk food at the time, with a comma, a pet I
often use for passwords, and the number 1 at the end. (To be fair,
LinkedIn isn't on my list of vital services to protect with two separate
keys and some launch codes. It's just a social networking service. So
some of my reminders are more complex.)

The benefit of this is that a file full of mnemonic devices is useless
to anyone else, but it's never failed to give me the password I need
after months or years away from an account.

For what it's worth.

This message contains confidential information intended only for the use of the addressee(s). If you are not the addressee, or the person responsible for delivering it to the addressee, you are hereby notified that reading, disseminating, distributing, copying, electronic storing or the taking of any action in reliance on the contents of this message is strictly prohibited. If you have received this message by mistake, please notify us, by replying to the sender, and delete the original message immediately thereafter. Thank you.

Create and publish documentation through multiple channels with Doc-To-Help. Choose your authoring formats and get any output you may need.

Try Doc-To-Help, now with MS SharePoint integration, free for 30-days.


You are currently subscribed to TECHWR-L as archive -at- web -dot- techwr-l -dot- com -dot-

To unsubscribe send a blank email to
techwr-l-leave -at- lists -dot- techwr-l -dot- com

Send administrative questions to admin -at- techwr-l -dot- com -dot- Visit for more resources and info.

Looking for articles on Technical Communications? Head over to our online magazine at

Looking for the archived Techwr-l email discussions? Search our public email archives @


OT: LinkedIn Hacked: From: Ron Hearn
Re: OT: LinkedIn Hacked: From: Lauren
RE: OT: LinkedIn Hacked: From: Dan Goldstein
RE: OT: LinkedIn Hacked: From: Lauren N. Hart
Re: OT: LinkedIn Hacked: From: Mark Giffin
Re: OT: LinkedIn Hacked: From: Lauren
RE: OT: LinkedIn Hacked: From: Will Husa Documentation Solutions
Re: OT: LinkedIn Hacked: From: Bill Swallow
Re: OT: LinkedIn Hacked: From: Mike Stockman

Previous by Author: RE: OT: LinkedIn Hacked
Next by Author: RE: OT: LinkedIn Hacked
Previous by Thread: Re: OT: LinkedIn Hacked
Next by Thread: Re: OT: LinkedIn Hacked

What this post helpful? Share it with friends and colleagues:

Sponsored Ads