password depot brute force  - Crack Key For U

When you give Android the correct PIN or password, it can decrypt the DEK keys, allowing the file system to be unlocked by brute force. It's no wonder algorithms are so good at cracking passwords. That's why so many websites force you to use special characters. Additionally, you can choose to protect your data by means of a key file that Password Depot Crack Protection against brute-force attacks: After every.

youtube video

See How Hackers Crack Passwords in Real Life - Password Security - F-Secure

: Password depot brute force - Crack Key For U

FOLDER LOCK CODE - CRACK KEY FOR U
Audials 2019 download - Crack Key For U
License code for easeus partition master
WINDOWS DATA RECOVERY STELLAR PHOENIX
X Mirage 2.5.2 Crack with Full Version Key 2021 Latest Free Download
password depot brute force  - Crack Key For U Whonix ™ Wiki


Follow: 1024px-Telegram 2019 Logo.svg.pngIconfinder Apple Mail 2697658.pngTwitter.pngFacebook.pngRss.pngReddit.jpg200px-Mastodon Logotype (Simple).svg.png

Support: Discourse logo.png

Donate: DonateBank WirePaypalBitcoin accepted hereMonero accepted hereContribute

Whonix donate bitcoin.pngMonero donate Whonix.pngUnited Federation of Planets 1000px.png

Twitter-share-button.pngFacebook-share-button.pngTelegram-share.pngIconfinder Apple Mail 2697658.pngReddit.jpgHacker.news.jpg200px-Mastodon Logotype (Simple).svg.png

We are looking for video makers to help create demonstration, promotional and conceptual videos or tutorials.

https linkonion linkPriority Support

Dan has woefully abused creative liberty here

.as the deciding factor in determining the time necessary to decrypt a code by bruteforce. Unfortunately, he then proceeded to mix up Bits and Bytes. That one's excusable for a novice, but if your plot revolves around a password depot brute force - Crack Key For U subject, you.Read more

BS can get you to the top, but it can't keep you there. This is what goes through my mind while reading this book.

Maybe it's because I'm a computer science graduate, like how the high clergy of the Catholic church must have tasted bile when they read The Da Vinci Code, but I couldn't stomach the glaring inadequacy of Dan's technical research.

Like what, you ask? Well, let's see what we have here:

Encryption algorithms like ZIP, Diffie-Hellman, and PGP? Sorry, wrong, and nope. 0 for 3. Try again, please. I would accept AES, [Triple-]DES, SHA-1, and even MD5. Just Google the words, Dan, and you'll find you named a compression format and/or utility; a protocol for exchanging encryption keys -- hey, that one was close; and an encryption utility -- also close, but unfortunately, it is not an encryption algorithm itself.

Obviously he tried to understand. He got the concept of key length as the deciding factor in determining the time necessary to decrypt a code by bruteforce. Unfortunately, he then proceeded to mix up Bits and Bytes. That one's excusable for a novice, but if your plot revolves around a technical subject, you should probably make an effort to get this right. You're off by a factor of 8 every time you say "64 characters" while discussing a 64-bit key.

To make it worse, he says the TRANSLTR can't tell the difference between encryption algorithms -- a key is just a key. No. No, no, no, no. A key is not "just a key". It is keyed to a particular type of lock that must match just as your car key won't fit into the front door of your house, regardless of the tumblers inside. Commander Strathmore goes on to warn our heroine that the source code to this unbreakable encryption algorithm is freely available, but encrypted by itself, so no one can open it until they have the key. But in reality, even the key is only useful if you have the DEcryption algorithm that knows how to use it. FAIL, Dan.

But then. the grand daddy of all verbal excrement: (Are you ready for this?) The villain has written a rotating cleartext algorithm -- *GASP* that sounds bad! -- whereby, the data within a file can magically transform itself over time, with no outside influence. THEREfore, a computer won't know even if it HAS found the right key since the cleartext within shifts while being decrypted! Um. I have a question, sir. All encrypted data is cleartext? Wouldn't that mean I could theoretically foil the NSA by sending -- I dunno, lemme think -- a binary image file instead of a text document? But that would make this a way less interesting story!

Oh, I so wanted to believe that intangible data could mysteriously alter itself on the physical media on which it was written. If that were even remotely conceivable, I could hope that, by shutting the book and waiting a while, maybe the words on the page would have rotated to form a better novel!

Alright. I admit, these are the grumblings of a know-it-all computer geek. But if you don't know your TCP from a hole in your firewall, the story itself is still good, yes? No. No, not really. You ever watch South Password depot brute force - Crack Key For U You know when they relay bad news that's completely ridiculous, and someone says "Oh. Oh god. Oh god, no.", and starts weeping? That was the whole chapter where The Commander informs Susan of the downfall of NSA's intelligence gathering ability.

I just can't do this. I can excuse technical ineptitude OR poor writing. Not both. It is still fast-paced, and if you're stuck in an airport on a 10-hour layover, there are far worse ways to pass the time. But I just read Deception Point, and the characters Allavsoft Video Downloader Features their reactions follow precisely the same tiring formula, except the premise is also crap.

What the eff, Dan? I remember your Robert Langdon novels being pretty good.

Источник: https://www.amazon.com/hz/reviews-render/lighthouse/B0002P0C7E?filterByKeyword=brute+force&pageNumber=1

Passwords

Passwords2132341.jpg

Ambox warning pn.svg.pngWarning: In 2013, nation-state adversaries were supposedly capable of one trillion guesses per second when attempting to brute-force passwords. [1] Considering Moore's Law it could have only improved since.[2]

If weak passwords (passphrases) are used, they will be easily discovered by trying every possible character combination in reasonable time through brute-force attacks[archive]. This method is very fast for short and/or non-random passwords.

This chapter discusses:

  • How to calculate entropy for both pre-quantum and post-quantum strength;
  • Estimating the brute force time for passwords of different length;
  • Key-stretching measures which help to make password length manageable in a post-quantum world; and
  • Principles for stronger passwords.

Introduction[edit]

To generate strong passwords that are both easy to remember and have an easily calculatable large entropy, windows 7 manager v5 1.9 key is advised to use the Diceware package. Instead of generating a random sequence containing alphanumerical and special characters, Diceware selects a sequence of words equiprobably from a list containing several thousand that have been curated for their memorability, length and profanity.

Passwords that are long enough should be safe for millions or billions of years, even if the list chosen is known to the attacker. This relies on the fact that the time taken to try all possible combinations would be infeasibly large, even for a well-equipped adversary. [3][4]

Diceware Password Strength[edit]

When determining appropriate password length, ideally it should have at least as much entropy as the bit length of the symmetric key that is derived from it. [5] As will be explained later, one can deviate from this rule to have a shorter password while still having a realistically strong protection level. The entropy type referred to throughout this page is Shannon Entropy. The concept of Min-entropy[6] measures the worst case lower bound of passphrase entropy in case of diceware generating words that have semantic meaning as a sentence or short passphrases whose character length can be easily brute-forced. This in practice is extremely unlikely and is detectable by the user and in the latter case a recommended number of words is advised to mitigate this risk.[7]

Entropy[archive] per word is calculated by dividing log of number of words in list by log 2. List lengths vary.

EFF list:

log (7776) / log (2) = 12.92 bits

SecureDrop list:

log (6800) / log (2) = 12.73 bits

Total password entropy is:

number of words * entropy per word

There are 32 special characters on a standard U.S. keyboard:

log (32) / log (2) = 5 bits per character

Alternatively, an alphanumeric string using lower/uppercase will have 62 characters in the set:

log (62) / log (2) = 5.95 bits per character

The relationship between entropy and the length of the diceware password is outlined below.

Table:Diceware Password Strength[8]

Word TotalBits of EntropyEstimated Brute-force Time (Classical Computing)[9]Future-proof Safety[10]Post-quantum Secure[11]
Five ~64 ~165 days No No
Six ~78 ~3,505 years Maybe No
Seven ~90 ~27,256 millennia Yes No
Eight ~103 ~15 x age Universe Yes No
Nine ~116 ~119,441 x age Universe Yes No
Ten ~129 ~928,773,415 x age Universe Yes No
Fifteen ~194 ~26,405,295,715,806,668,059,525,829,264 x age Universe Yes Yes
Twenty ~259 ~750,710,162,715,852,378,145,230,792,130,183,941,981,164,925,924 x age Universe Yes Yes

Calculating Brute-force Time[edit]

Moore's Law[archive] predicts the doubling of number of on-die transistors every 24 months (two years). Other estimates by the industry put that at 18 months. It is expected that Moore's Law ends by 2025 because of physical constraints of silicon.

1 trillion guesses in 2013 = 240 operations.

Lower bound - Doubling every 24 months 2013-2025:

246

Upper bound - Every 18 months 2013-2025:

248

To gauge strength against adversary capabilities, an example 80-bit password versus an adversary capable of 1 trillion or (240 guesses per second):

2(80-40) = 240 seconds

Which is then divided by 31536000 seconds / year to get the number of years. [12][13]

Classical vs Quantum Computing[edit]

Classical Computing Attack[edit]

  • 7-word diceware passphrases are recommended, yielding ~90 bits of entropy against classical computing attacks. [14]
  • 10-word diceware passphrases provide 128 bits of entropy.

Quantum Computing Attack[edit]

  • Grover’s quantum search algorithm halves the key search space, so all entropy values in the table above are halved on quantum computers. For example, the cost of searching for the right 2128 passphrase drops to (very) roughly ~264. [15]
  • A 20-word passphrase with 2256 bit entropy today, yields 128-bit post-quantum protection.
  • Quantum computers do not impact the entropy provided by key-stretching algorithms. See below. [16]

Depending on how it is implemented, key-stretching introduces a major speed-bump for brute-forcing as it forces an adversary to undergo extra steps compared to processing vanilla, symmetric, master encryption keys. They allow passwords to be shorter while adding a certain entropy security margin. Note this does not help if bad passwords are chosen.

Passwords for LUKS FDE are secured using a key-stretching implementation known as a Password-Based Key Derivation Function (PBKDF). The older HMAC-SHA* algorithm is less effective against parallelization by GPUs and ASICs -- the same weaknesses suffered by Cyberlink powerdirector 14 free download full version with crack against dedicated mining hardware.

Argon2id is the winner of the Password Hashing Competition[archive] and the state-of-the-art hashing algorithm of choice when protecting encryption keys. Its memory-hard properties introduce a large penalty for brute-search on general computers and even more so on GPUs and ASICs.

Choosing Parameters[edit]

This is how to calculate entropy for Argon2id. An example [17] using arbitrary parameters is below:

  • 1 GiB RAM, 50 iterations and 4 threads
  • m=1GiB, t=50, p=4

The "20" comes from the exponent of 2 that gives the number of kibibytes that is used in 1 GiB RAM (220 = 1,048,576 kibibytes in this case). The number of 1 KiB block operations is most important. For 4 GiB, the exponent becomes "22" (222 = 4,194,304 kibibytes).

General Computers "Lower Bound"

20 + (log (50) / log(2)) = ~26 bits

GPUs and ASICs "Upper Bound"

20 + (20 - (log (8*4) / log (2))) + (log (50) / log (2)) = ~41 bits

Subtracting the parallelism (8x within a block and 4x thread-level p=4), because for this sort of attack the parallelism reduces the duration for which the memory has to be occupied.

Comments[17]

Then, I think t=50 is excessive. It isn't even the equivalent of a one word longer passphrase, but it takes more time than typing a word would. Perhaps you should consider t=3. That will be only "4 bits" less, giving you something like 22 to 40 bits (depending on attack hardware) of stretching relative to BLAKE2b. --SolarDesigner (OpenWall lead and cryptographer who participated in the Password Hashing Competition)

Migrating LUKS FDE to Argon2id[edit]

These steps migrate systems which are currently encrypted with LUKS first from a LUKS1 to LUKS2 header, then shift to Argon2id. Removable media migration should be straightforward, however the main running system will require extra pre-boot steps because an open encrypted volume cannot be modified. [18] Take precautions such as backing up your data and make a copy of the required steps since they will be inaccessible during part of the process.

1. Enumerate all devices to determine partition name.

2. Verify the partition in question is an encrypted one (typically on default, non-customized installs).

3. Inspect LUKS header details and confirm it was converted in the end.

# cryptsetup luksDump --debug /dev/sda5

4. Check kernel module availability.

Before rebooting, it is advisable to check the ‘algif_skcipher’ kernel module is included in the initramfs image, otherwise it might not be possible to open LUKS2 volumes. [19] To do so, run the following two commands:

# echo algif_skcipher © ENCRYPTED SUPPORT LP MetaGer
Imbox style.pngThis page needs some cleaning up to be presentable.

There are many examples missing the point of the trope. Delete any unfitting examples you find.

Cquote1.svg

By the way, the password was "password".

Simmons, Red vs. Blue

Cquote2.svg

Our security division would like to take this opportunity to remind you of the fact that a good computer password should consist of a mix of mixed-case letters and numbers. Avoid obvious and verbatim ones, such as birthdays or pets' names, or any single word in a dictionary. It should not include "clever" references to your favourite books, films, sports team etc. Ideally it should be chosen using a randomizing technique such asDiceware (or Fire Encrypter) to eliminate any association between you and your password.

Another good password, though not as strong as a random mix of numbers and letters, but far easier to remember, is a word or two strung together but with random capitalization, with some numbers replacing letters. For example, the common password dragon could be made into Drag0NsareC00l. Fairly easy to remember, but far harder to guess.

Or better yet, if your authentication provider allows it, a "passphrase" consisting of several random words that you can remember is much more secure than a (shorter) string of letters and numbers. (Add numbers and symbols in between if they're required.)

It seems that most characters in films and TV missed that memo. Passwords are almost invariably single words or names of significance to the character in question, which can be easily deduced using a little detective work: the clue is often right there on the desk, in the form of a picture or memento. Or simply spelled out in bold lettering on your commemorative plaque or a wall poster. This is common even in works that otherwise demonstrate great amounts of trope awareness.

Admittedly, a great many real people miss this memo too.[1]

A related trope in fiction is to have the password entry plain and clear — on the screen — for all to see. No sense in bleeping out the characters with asterisks or a mute prompt. Of course, scriptwriting-wise, a particularly amusing password can elicit a humorous response from the audience this way without dialogue exposition.

See also Override Command, Joe Sent Me.

Examples of The Password Is Always Swordfish include:

Swordfish

  • The Trope Namer is Horsefeathers. See the Quotes subpage.
    • Pinky (Harpo Marx) manages to get inside despite his muteness by pulling a large fish and a sword out of his coat, sticking the one into the other, and presenting it to the doorman.
    • The movie even subverts it later when Groucho manages to get inside and locks Chico out.
Cquote1.svg

Wagstaff (Groucho): You can't get in without the password.
Baravelli (Chico): Ah, you can't fool me! "Swordfish"!
Wagstaff: No, I got tired of that so I changed it.
Baravelli: Oh, well what's the password now?
Wagstaff: Gee, I forgot it. I better come out there with you!

Cquote2.svg
  • Even Wikipedia recognizes the prevalence of Swordfish as a password.
  • Spoofed again in The Adventures of Sam and Max Freelance Police. In "The Thing That Wouldn't Stop It", a character demands a password before adding: ".And if you say 'swordfish,' I'll lose it!" The password ends up being "haggis".
    • Later, in Sam and Max: The Mole, the Mob, and the Meatball, one of Sam's guesses for the password to the back room of Ted E. Bear's Mafia-Free Playland and Casino is "swordfish". The real password is the phrase "Leave the guns, take the cannoli."
    • And again in Sam and Max: Reality 2.0, where it's one of the guesses for the password to Bosco's bank account. However, the real password is Bosco.
  • Guess what it is in Swordfish. Go on, guess. To be fair, the Big Bad is a big movie buff as evidenced by numerous references he makes to various classics through the film, so it was probably supposed to be like that.
  • Joked about in A Dance With Rogues. The password to get into the sewer entrance is "stinkfish."
  • In the Star Trek: The Next Generation novel, I, Q the titular character Q was about to be attacked by a romulan who didn't know what he was getting into. After Q dished out his punishment, the romulan was begging for mercy by saying "Please" over and over. Q gave a snarky response by invoking this trope.
Cquote1.svg

Q: "I don't think 'Please' is the magic word today; you'll have to try again. How about Swordfish?"

Cquote2.svg
  • In Kingdom of Loathing, an adventure on the Poopdeck of the ship at the Obligatory Pirate's Cove has you randomly asked by a pirate "What be the password?" If you've read the appropriate quest item, password depot brute force - Crack Key For U correctly answer that the password is "swordfish", and unlock a new area to explore.
    • To further hammer the trope home, the adventure this happens in (which doesn't happen if you don't read your father's MacGuffin diary) is even titled "It's Always Swordfish."
    • If you haven't read the appropriate quest item, you'll try to guess that the password is "What".
  • Spoofed in Naruto: Sasuke gives a long, complex poem for the team's password; in dismay, Naruto suggests "swordfish" as an alternative. When a ninja impersonating Naruto gives Sasuke the correct password, Sasuke immediately attacks because Naruto would never remember something like that.
  • The Discworld novel Night Watch. Vimes thinks "Swordfish? The password wasalwaysswordfish!"
    • Also comes up in the first Discworld computer game, in which the password is "Blah Blah Blah spoons blah blah blah swordfish blah blah blah Simon says."
  • "Schwertfisch" in the Quest for Glory 1 VGA remake.
  • In Kerry Greenwood's Phryne Fisher mystery Queen of the Flowers, the password to get onto the gambling boat is "swordfish" and Phryne commented that as she gave the password she "felt like an extra in a Hollywood film".
  • Infocom's Sherlock: The Riddle of the Crown Jewels
  • Recess: "The Secret Life of Grotke". Used as the password for a magic society.
  • In Return to Zork the lighthouse keeper's first words to you are: "What's the password? Can't let you in without the password. And don't try swordfish, I know its not that. I tried it myself, I couldn't get in."
  • ThisMad Men episode has it as half of the password to an illegal gambling den.
  • ThisThe B Movie Comic strip and the associated rant.
  • In the computer game Impossible Mission, the goal of the game is to collect microfilm which, when reassembled in your PDA, delivers the villain hideout door's nine letter password. One of the passwords that can be generated this way is of course 'Swordfish'.
  • On Fetch! with Ruff Ruffman, Ruff chooses this as his password to his security system. He actually has trouble remembering it.
  • In The Muppet Show Comic Book, two characters meeting have a call-and-response password. The response is "Swordfish swordfish swordfish swordfish swordfish."
  • In the FPS Cold Winter, guess what's the password needed to enter the Golden Narguile Club?
  • This was the password Boddy used once in the book series for Clue.
  • Used in No Reservations as the password to a private poker game.
  • This from I Can Haz Cheezburger.
  • Harry Potter and the Methods of Rationality has a password be "Sword fish melonfriend."
  • Scooby Doo Mystery Incorporated episode 16 "The Wild Brood" Both the password and the program/Macguffin
  • Code MENT: Lelouch mentions in passing that Suzaku's password for everything is, indeed, "Swordfish".
  • A variant in Brink: In one of the Agents of Change missions, a member of the Security confirms that he's an ally by reciting "swordfish114" to them.
  • The English dub of one episode of Lupin IIIlampshades this with Lupin's unlikely password of "Aye-ahh! Swordfish, open sesame, and other crap like that!"
  • In the episode "Kennel Kittens Return" of the 2010 version of Pound Puppies, the password for entering the gated community of the target adoptive family is "swordfish".

Anime and Manga

  • In Tenchi in Tokyo Ryouko is confronted by a holographic humanoid interface demanding a password while breaking into a bank. She grabs the interface and brutally slaps it around in frustration. She is immediately granted access as the password is entered by slapping the interface in a certain sequence which Ryouko just happened to duplicate.
  • Similar to the aforementioned Tenchi example: In one episode of Lupin III, Lupin and Jigen break into NASA using a series of stolen voice-command passwords. When they encounter one more password than they expected, the pair panics and Lupin swears in frustration — which turns out to be the final password. (Extra note: In the English dub, all the passwords are Star TrekCatch Phrases.)
  • The password that Barnette uses to protect the systems of the Nirvana in Vandread is ridiculously simple, yet it proves to be a big hurdle for the Mejale forces — and to the heroes, who try to get away with the ship.
    • What about the alien computer virus that wreaks havoc on the ship as the enemy approaches, only to be shut down when the accidentally enter the verbal password- the cry of a newborn baby?
  • In an episode of Shaman King, Len logs into his family's database to get some information. He allows his friends to watch him enter the super-secret password, which, after a moment of intense anticipation, turns out to be Enter. Not the word, but the key. Everyone promptly pratfalls as Len brags that it's the greatest password ever.
  • In School Days, Setsuna is able to reconfigure Makoto's cell phone by guessing correctly, at the very first try, that he used his birthday as password.
  • In New Getter Robo, the password to documents about the use of Getter Rays as weapons was in factCutie Honey.
  • Averted and referenced in Chobits. When Hideki tries to set a password on Sumomo, the first thing he tries to set it as is his last name.which is immediately rejected because it's so easy. Then he changes it to Chobits, and Sumomo even suggests that he uses a mix of hiragana and katakana (and English letters and numbers, but he doesn't use any of those).
  • Played with in Black Lagoon. A two-part password to identify a hired bodyguard as genuine is "May the force be with you" ("The Triad is super cool." in the japanese version). The lack of creativity behind this password is Lampshaded by both courier and bodyguard. The trick is that it's not the real password. The real password was handed out in sealed envelopes to the courier and bodyguard beforehand, and having anyone complete the fake one would identify an impostor and also implicate a leak in the organization.
  • In the Neon Genesis Evangelion episode with Jet Alone, the password to its main computer is "hope" (希望, displayed on a screen, using a Japanese IME to type it in). This is a word you would likely learn in your first semester of Japanese study if you take a class.
    • The password for accessing Eva-02's "beast mode" in Rebuild of Evangelion--"za beasto"—isn't all too creative, either. It seems to use voice recognition.
      • Though there are two voice commands before you enter the code specifically for this mode. Its doubtful the other pilots are even aware of inverting controls or a backdoor code to an EVA so at least it has some level of security.
  • In order to shake a suspicious Ran off his trail, Conan deliberately picks a password for his cellphone that is a Homage to Sherlock Holmes, as that's the only password that would be logical for both Conan and Shinichi (who Ran thinks the phone really belongs to). Still, before Ran figures this out, she attempts his birthday, hers, and then just goes straight for the brute force method.
  • Seto Kaiba of Yu-Gi-Oh successfully hacked into Pegasus J. Crawford's system because he accurately guessed that Pegasus was so vain as to believe no one would get that far. Password? Pegasus. Interestingly, the password in the Japanese version is a tidy bit harder — since, according to Kaiba's logic, the Duelist Kingdom is a metaphorical prison island from which none can exit, the password is a reference to that — "Alcatraz".
  • In Mega Man NT Warrior (RockMan.EXE), the cyber door to the room with MegaMan's "frame" in it had a single-digit password (looked to be "2"). Like the word "password," it's a good and bad password at the same time.
  • Subverted in the first Patlabor movie. When the protagonist just tries the name of a brilliant programmer as the password to the man's source-code disk, he gets a biblequote from Genesis 11 for his trouble. Oh, and every electronic piece of equipment connected to the computer he was using gets infected with a virus and displays/prints nothing but the word Babel in an endless loop.
  • Averted with the knightmares in Code Geass; each has a random sequence of letters and numbers to start each one up. Lloyd plays it straight with access to a weapons system on the Lancelot, telling Suzaku it's his favorite food.
  • In both Japanese and English versions of Wolverine, the password on Logan's handheld computer is simply his name. Granted, it was a voice-activated password, but Yukio's "Seriously?" reaction is still the same.

Comic Books

  • Used in Gold Digger, by Gina Diggers. User: Password, Pass: User. Even Gina couldn't figure it out, since she couldn't remember WHAT stupid thing she did!
    • She did know the problem was that Madrid had stole her memories and had started to change the passwords in her system and left herself logged in through the back door she left in the system. Her systems also has other built in safeguards such as voice print and bio scan patterns
    • Gina Diggers continued the poor passwords with her personal laptop's password "Studpants", which for Gina is no surprise at all — and caused trouble when one of her sister Brianna's AIs did get access to it. To make matters worse for Gina's precious computer security, two other characters share much of her memories (sorta three, but it's hard to imagine a password that would keep out a time traveling future self) and would have an extra-easy time guessing.
  • Lampshaded in an early issue of Runaways:
Cquote1.svg

Chase: The name of their little club? Isn't that sorta obvious?
Karolina: Well, my mom's AOL password is "password". Old people aren't exactly good at this stuff.

Cquote2.svg
    • Partly subverted near the end, where the password to shut down a rampaging golem is the Greek word for parental love.
  • In Watchmen, Nite Owl correctly guesses Ozymandias's password: "Rameses II", the pharaoh of which "Ozymandias" is the Greek name. This is a commonly-used Real Life teaching example of "how not to choose a password." However Ozymandius wanted them to guess the password and find his secret lair to complete his grand scheme.
  • Near the end of one Blue Beetle arc, Jaime is captured by the aliens who built the suit and locked in a cell. After he slips his cuffs, he tries poking at the door and wall until he realizes it's voice-commanded.
  • In one of the last issues of Nightwing, Oracle is dicking around with Dick Grayson's computer and asks if he wants her to change his password while she's at it. Dick, being an ex-carny, naturally asks her to change it to "big top." Even though Oracle's entire shtick is being good with computers, she does it without telling him what an idiot he is.
  • In Cavewoman the phrase needed to open a magical portal is "Oh my God! I don't want to die!". As the portal is guarded by flesh eating yetis, this has resulted in a lot of intruders accidentally saying the activation phrase.
  • In one issue of Steel Natasha Irons successfully activates her uncle's Powered Armor with the password "Rosebud".
  • Robin III, in Robin Annual #1 (noteworthy for actually predating the first issue of his ongoing series by several months), broke into Anarky's home and tried to crack into his computer. After trying every prominent anarchist he could think of, he looks at the screen, which instructs him to "enter passcode." He does, and it works.

Fan Works

  • Kyonko should have known that setting the password to the "MITSURU" folder as her little brother's name was a bad idea. How the blue fuck could Haruki have not guessed that?
  • In the Higurashi no Naku Koro ni fanfic Redemption, the password to some information so important that its original finder died for it is. "Umi" (Japanese for "ocean"). Taking this to real Idiot Plot levels, the team attempting to crack the password are stuck for months because they only guess English words. And they know the password is three letters, but no-one points out that 26^3 possibilities could be brute-forced by hand in less than a day.
  • In Those Lacking SpinesXaldin, Vexen and Lexaeus needs to hack into Mansex's computer in order to stop his and his masters plan. Of course, in order to do so they need a password. After Lexaeus and Xaldin guesses on Xiggykun Akuchan Marleydono HomieXLuxory Secks DemykinsOMGWTFBBQVCR Zexypoo Mansex (which is all the Seme's names in order), Vexen points out that it's both too many letters as well as incredibly stupid and asks what kind of idiot would use such a password. Xaldin answers that Mansex would, since he's the seme of Xemnas whose somebody Xehanort was known for his dumb passwords (see the Video Games folder for more information).
    • Of course, the password's correct.
  • In the Catwoman/Batman fanfic series Cat-Tales the password into Bruce's extra-secret partition of the Batcave mainframe is his father's first name, his mother's first name, and "justice." Noted here because once you sit down at the keyboard of a terminal hidden in the cave under the man's Stately Manor.
  • In a Hetalia fanfic America's password was 'fuck!Russia!fuck' during the Cold War, which Russia guessed. He then started to change his passwords from time to time. The one he currently uses is 'fuck!China!nooo'. Yeah.

Film

  • Batman and Robin: Alfred protects a CD (containing Batman and Robin's secret identities, the location of the Batcave, and other such trivial little stuff) with the password "Peg", which is too short, both a dictionary word and a relative's name, and written on an autographed photo right on his desk. This enables another character to easily access the disk. Admittedly, the disk was intended to be accessed by Alfred's brother (as designated heir to Alfred's position), and it's hinted that Alfred expected Barbara to disobey his request to leave the disk alone but really.
    • And in Batman Returns, Selina Kyle breaks into Max Shreck's protected files by guessing that his password is the name of his dog.
Cquote1.svg

Max: How industrious. And how did you open protected files, may I ask?
Selina: Well, I figured your password was "Geraldo", your Chihuahua, and it was.

Cquote2.svg
Cquote1.svg

Dark Helmet: So the combination is 1 2 3 4 5? That's the stupidest combination I've ever heard in my life! The kind of thing an idiot would have on his luggage!
[Later.]
President Skroob: What's the combination?
Colonel Sandurz: 1 2 3 4 5.
President Skroob: 1 2 3 4 5? That's amazing! I've got the same combination on my luggage!

Cquote2.svg
  • WarGames. This movie took place in the early eighties, when password security issues were not as cliché as they are now, but this movie demonstrates both simple passwords and the habit of writing them down in a nearby list.
    • The backdoor password for NORAD's "War Operation Plan Response" program on the computer that controls the entire nuclear missile arsenal of the United States is "Joshua", the name of the programmer's dead son. The same name that the programmer has given the computer itself, in fact. Just before trying "Joshua", David says "It can't be that simple!" Way to go, Professor Falken. In the book, Falken's backdoor was Joshua5, five being his son's age when he died. Not much better, but at least it had a number in it.
    • The school teacher uses simple words for passwords, like "pencil". It was implied the school computer system's password field could only accept alphabetical sequences of exactly six characters.
    • It's very obvious from the tones how easy the padlock passcode is. It appears to be two different digits each repeated three times.
  • In National Treasure, Abigail's password to enter the National Archive vaults is "VALLEYFORGE". (That's Fridge Logic for you.)
  • Lois Lane's computer password in Superman Returns is "Superman". Somewhat of a plot point, however.
  • In Overdrawn at the Memory Bank, the password to access the HX 368 computer is "IY 479" — in other words, "HX 368" with each characters shifted up by one. After it's cracked, they add another level of security to the system.which turns out to be nothing more than reversing the code. With predictable results.
Cquote1.svg

Crow: You know, if this works, I am going to spank you, Movie.

Cquote2.svg
  • Leslie Nielsen, in Wrongfully Accused, opens up a computer system with a Viewer-Friendly Interface which prompts him for the user and the password. For the user, he enters user and for the password, password. And it works!
  • Justified in The Departed. The password to a file about an undercover police operation is the first and last name of the cop that is undercover. Since if anybody who wasn't supposed to know the agent's name were to find it out, the operation would be ruined anyway, why not?
  • In The Infernal Affairs Trilogy, the password is the Morse code for undercover.
  • In Battlefield Earth the combination to Terl's secure vault is his employee ID number, typed in backwards.
  • In Catch That Kid, the password Maddie needs to get into her mother's bank is her own name, Madeline.
  • In the 2006 Casino Royale, Bond uses the numbers corresponding to "Vesper" as a password—the name of the woman he's got on his side.
  • In GoldenEye Boris, supposedly one of the greatest hackers in the Soviet Union and able to crack the United States' government databases, uses simple, one-word passwords and dares his rival, Natalya, to guess them by giving her simple riddles. It obviously backfires when he gives her the riddle "You sit on it, but you can't take it with you," for his personal password. Bond determines that the answer is "chair" in less than a second, allowing Natalya to track Boris's position and find the terrorists' secret hideout. Semi-Justified in that up until this point all the answers were "dirty words" (usually female anatomy). Natalya kept thinking dirty and failing, whereas Bond, not having known Boris gets it on the first try.
  • In TronDillinger's password for access to the Master Control Program is apparently "master". Flynn, a superior programmer, uses a better password, the apparently gibberish "reindeer flotilla."
  • Hackers, though a white hat hacker points out that he had made a list of passwords that are overly easy to guess (the one used was "God") and thus should be avoided. He neglects to mention "password," however.
  • In Doctor Strangelove, the crucial recall code that will prevent nuclear war involves the letters P, O, and E, stemming from General Ripper's obsession with "purity of essence." Fortunately, Peter Sellers figures this out in time. Sort of.
  • Star Trek II the Wrath of Khan showed us that one Federation starship can use a "prefix code" to get another Federation starship to lower its shields. This very dangerous trick is protected by five-digit (non-repeating judging by the switch mechanism used to enter it), numbers-only sequence a modern-day computer could break in almost no time. The only saving grace is that there is an Override Command in place specifically designed to keep starships from doing this to each other at will; the system was designed to take out captured vessels, under the assumption that any boarding parties would be unlikely to locate it. Also, it could be that the ship would only get one crack at the code, so a brute force password attack would fail.
  • Zed-10, the Master Computer in Fortress (1993 film with Christopher Lambert) has not a password, but a passphrase. Trope averted? Not at all: the passphrase is "Crime does not pay", the motto Zed-10 repeats every now and then (oh, and let's forget the Hollywood Hacking involved here.)
  • Alvinandthe Chipmunks: The Squeakquel: Simon is helping Jeanette crack Ian's padlock over the phone
Cquote1.svg

Simon: Okay, Jeanette, the third number is notoriously the hardest to crack. It's most likely a prime number, but we can't assume that.
Jeanette: Simon, the first two were one. I'm going to have to go with one.
* click*
Jeanette: It worked!

Cquote2.svg
  • In Night at the Museum: Battle of the Smithsonian, the ancient Egyptian tablet has the added ability to open a portal to the underworld and summon an army of demons if you punch in. the value office 2013 download iso - Crack Key For U Pi, to about eight decimal places. The tablet isn't a computer, obviously, but the riddle to get the password is written right on the front. Something of a subversion, as not many people can remember that entire sequence.
  • Subverted in Watchmen: the password to Adrian Veidt's personal data is Rameses, who is one of his preferred historical figures (his alter ego's name, Ozymandias, is just a Greek version of another name for Rameses II). A book about him is conveniently set near the desk. It's all a trap for the heroes to go to the Antarctica and keep them away from the device that Veidt has prepared to settle his plan.
  • Pulp Fiction: The combination 666 for Marcellus Wallace's suitcase.
  • In The Ninth Gate, the combination of the door to the private library of an occult scholar obsessed with Satanism is also 666. He must have thought he was very clever.
  • There was The Three Stooges short Studio Stoops where Moe and Larry are trying to think of a password. Larry suggests "Open the door!" Moe smiles and compliments him on his idea, then promptly hits him in the face.
  • In The Fly II, the protagonist's computer is protected by the "magic word" password of Dad. Unusual in that the villain apparently suspected this might be the password, he just didn't trust the hunch enough to password depot brute force - Crack Key For U setting off a drive-wiping trap if it turned out to be wrong.
  • In one of the Spy Kids flicks, Carmen's own name turns out to be an important password. Granted, it's her fullseven-word name, so it's not as easy a guess as one might think.
  • Jumping Jack Flash. The key is in the song Jumping Jack Flash. Terry racks her brains at which of the lyrics is the password, til she realizes that the key is the key — that is, the musical key of the song. Later, when under truth serum, when asked what the password is, she burbles, "The key is the key!", confusing the antagonists.
  • In Clear and Present Danger, a CIA hacker is given the assignment of cracking a person's password. He begins by trying various combinations of family birthdays and gets the password before his superior has even left the room.
  • In Police Academy IV, the villain uses GREED as his password. The same word he has on his bracelet.
  • In Lord of War, the code to unlock Yuri's secret container where he hides his gun running documents and items is the date of his son's birthday, which his wife Ava realizes within less than a minute.
  • In Kuroshitsuji, the PIN to open the suitcase containing the terrorist time bomb is a date important to the person who set the bomb. Shiori guesses correctly on the third attempt.

Gamebooks

  • Inverted in the Fighting Fantasy book House of Hell, where the password needed to get the Kris Knife (essential to defeating the Final Boss) is very hard to obtain. You can Windows 10 ISO Download Tool 8.46 With Crack Full [Latest] Free passwords written down in a password depot brute force - Crack Key For U places, but the villains tend to change the password regularly, so these clues are mostly Red Herrings. In order to get the essential clue to get the true password, you have to find Shekou the hunchback and give him brandy so he gets drunk and reveals that it's "the name of the House, but mixed up".

Jokes

Literature

  • In The Lord of the Rings, a door has an inscription above it, which Gandalf interprets as "Speak, friend, and enter." After trying a few things, he (or, in the movie, Frodo) realized that he assumed the wrong punctuation — the inscription actually read "Say 'friend' and enter." The password was "mellon", the Elvish word for "friend". Justified, it isn't actually a password, merely a test if the reader knew elvish (as if someone knew elvish, they were assumed to be of no threat).
    • Not even that. The gate was specifically built to trade only with elves in the first place, who could be considered friends by default; the word was more like a trigger to open the door than an actual password.
    • In the parody of this scene in Bored of the Rings, Goodgulf tries all sorts of magic words to open the door. Then he notices the knob.
    • Also parodied in Dmitry Puchkov's Gag Dub of the LOTR movies, where the password in this scene is the word "password". The exchange (translated from Russian) goes like this:
Cquote1.svg

Fyodor: Wait a minute, is that some kind of puzzle? "Say password and enter". What is Elvish for "password"?
Pendalf: Der Parole.

Cquote2.svg
Cquote1.svg

Then she stood back, hit the rock sharply with her broomstick and spake thusly: "Open up, you little sods!"

Cquote2.svg
    • There is a joke on the net where Gandalf turns his cloak inside out (with the inner side being black) and demands to "Open, in the name of Mordor".
      • Probably based on an incident in the actual book (Fellowship of the Ring) in which the Nazgul, who wear black cloaks, knock on a door and say this line. Ignoring them doesn't make them go away, of course, it just invites them to break the door down.
    • Hilariously parodied in this page of DM of the Rings, where the party (with Gandalf -being completely ignored- as an NPC controlled by the DM) thinks of ways to open the door, such as: picking the hinges off, burning it, pouring water on it so it freezes and shatters the stone by expanding, blowing it up, tunneling the way in, and so on. Much later:
Cquote1.svg

Party Member 1: So we're agreed. You guys go find a tree, cut it down, and haul the trunk back here. Dave and I will assemble the scaffolding, and Frank will tie all of the ropes together.
Party Member 2: Now all we need is a pulley.
Gandalf (the DM): Oh for crying out loud! The password is "Mellon," you lunatics!
Party Member 2: Was that supposed to be in-character?
Party Member 1: Who cares? At least we got the door open.
Lesson of the Day: No matter how difficult or absurd you make a puzzle, your players will find an even more impossible and preposterous way of solving it.

Cquote2.svg
  • The password to Senator Sedgewick Sexton's computer is only a little complex in Dan Brown's book Deception Point; His initials are SSS (which he actually used as his previous password only to change it after he lost an expensive dinner to his assistant as a result of her betting she could guess it in 10 seconds), and constantly talks about wanting to be the POTUS (President of the United States). Put them both together and you get POTUSSS (which said assistant also manages to guess).
  • In Dan Brown's Digital Fortress:
    • The password that stops the deadly virus from destroying US intelligence firewalls and opening their secrets to the public is 3, the number. That's it. The villain even leaves a clue to the password in the coding for the virus program for no clearly defined reason: "What is the prime difference between the elements responsible for Hiroshima and Nagasaki?" A team of NASA scientists have to go through a whole scene of completely missing the point of the clue to make it seem more clever.
    • Susan Fletcher agonizes over a five letter password, after being told that the person who set it had been clingingly obsessing over her since their first meeting. Despite being a cryptanalyst, and it being her own name.
  • Animorphs #27:
Cquote1.svg

Jake:(tone sardonic) Mr. King gave us an access code that'll get us into the main computer. Everybody memorize it: Six.
Rachel: Six?
Jake: Six.
Rachel:(sighs) You know, I'm sure the Pemalites were wonderful people and all, but password depot brute force - Crack Key For U a single-digit security code? I mean, good grief. What a bunch of idiots.
Cassie: They trusted.
Rachel: They're dead.

Cquote2.svg
  • Whether intentionally or not, the title of this page is a practically verbatim quote from Pratchett's Discworld novel Night Watch, in which Sam Vimes accidentally discovers the hidden password for a meeting of rebels and remarks on their lack of imagination.
    • And in the Discworld novel Guards Guards, the doorkeeper for a secret society trades complicated pass-phrases with a new arrival, only to discover the newcomer is looking for a different secret gathering when the sixth phrase fails to match. (Apparently there are a LOT of secret societies in Anhk-Morpork.)
      • It gets worse when it's revealed that someone got into that meeting, only to realize later they were in the wrong place.
    • Subverted in an enchanted door in the Discworld novel Mort, which harangues a character with a demand for "the magic word" before it will open. Only it's not asking for a password—as your mother told you, the magic word is "please". Subverted further in that she doesn't catch on; the door only tells her the answer after its owner hears her fighting with it and lets her in himself.
      • The character in question was Princess Keli, trying to get in to see a Wizard named Cutwell:
Cquote1.svg

Door: "You could try using The Magic Word. Coming from an attractive woman it works nine times out of eight."
Keli: "And what is the magic word?"
Door: "Have you been taught nothing, miss??"
Keli: "I have been educated by some of the finest scholars on the disc!"
Door: "Well password depot brute force - Crack Key For U they didn't teach you the magic word they couldn't have been all that fine."

Cquote2.svg
  • In Along Came a Spider, the villain mentions the significance of the phrase "Aces & Eights" to her, when she's using it as her password.
  • The outlaws in The Last Unicorn have the opposite problem. Their passwords are so complex and change so often that they can't remember them.
    • They solve this by making the new password a giraffe call. But giraffes don't make any noise . ah, that's the genius of it. You have to give the call three times: two long and one short.
  • In Foucault's Pendulum, one character's computer has an ultra-complex security system which would take years to pass via random guessing, as the protagonist calculates. It asks the question "Do You Know The Password?". The correct answer is No. Yes, just the word "No". (There's a deeper reason for this: In order to gain knowledge, you have to admit that you don't know a specific thing.)
  • Lampshaded and averted to the extreme in Von Neumann's War wherein a character notes that most people are uncreative with their passwords, using birthdays, names, etc. His own password? 189 digits of random high ASCII.
  • Frequently comes up in Bastard Operator From Hell, where a character might mention their password as being something stupidly easy or complain that their old password is no longer valid. One story had a boss complain that his password of "X" doesn't work any more.
  • Inverted in Harry Potter: Sir Cadogan's ridiculously complicated and often-changing passwords prove to be too much for Neville Longbottom's notoriously poor memory, so Neville writes them down. and Sirius Black steals them. This is another chronic problem in Real Life.
    • Dumbledore's passwords to the Headmaster's Office tended to be his favorite candies (knowing this, in Harry Potter and the Goblet of Fire, Harry gets into the office with a brute force attack)
      • Although he does use ones that wizards won't be familiar with (muggle sweets like Sherbet Lemons), and ones that they won't expect (cockroach cluster).
    • The Slytherin password at one point in Chamber of Secrets is "pure blood". Yeah.
    • The Ravenclaw dormitory bypasses this problem entirely by not using a password to enter. Instead, people have to solve a riddle to get in, ensuring that whoever wants to get in will get a little smarter each time. It does bring up the fact that those not in Ravenclaw can enter the dormitory, if they are smart enough to solve the riddle. Since smarts is Ravenclaw's speciality, yeah.
      • Of course, this means that if you're tired, or upset, or just having an off day, or just happen to be smart in ways other than clever word tricks (i.e, mathematical smarts) you'll just be SOL in Ravenclaw.
    • The Marauder's Map has a passphrase that admittedly may not be incredibly easy to guess, but Word of God says that Fred and George were able to make it work because the map reveals more and more of itself, the closer you get to the correct phrase.
      • Considering that the Map demonstrates at least some elements of the Marauders' personalities, it's possible that it only provides such hints if it likes the person who's guessing.
  • Lampshaded in the Doctor Who novel The Last Dodo. The Doctor says an android's computer password will be something mindbogglingly complex that only an android could remember, not her favourite soap star or her first pet. It's her first pet.
    • Actually, they just think it's her pet at first. It actually turns out to be her creator.
  • In a parody of Smiley's People in The Little Book of Mornington Crescent, the password to enter the MI 7 safe house is "I am a Jehovah's Witness." When Smirkey arrives for his secret meeting, there are two men in dark suits with copies of The Watch Tower already there.
  • In the Michael Connelly novel Angels Flight, the password to a dead lawyer's computer is "VSLAPD". The lawyer had a particular habit of civil rights lawsuits against the LAPD, which would be titled "Elias vs. LAPD". The password was written down on a secretary's notepad.
  • In Olivia Joules and the Overactive Imagination by Helen Fielding the terrorists have two electric keypad protected doors which she must get through to escape from their under-water-cave-lair. When threatened the bad guy confesses that the first doors have a numerical sequence of 2468 that Olivia immediately lampshades with a comment of "Isn't that a bit obvious?" Unfortunately that is promptly followed by the second set of doors' code being the even more horrifically predictable 0911, which is rewarded by a roll of the eyes.
  • In Robert A. Heinlein's Stranger in A Strange Land, Ben Caxton's girlfriend Jill has kidnapped the Man From Mars and needs to hide out in Ben's apartment, which has a sound lock. She tries the old password, which doesn't work. Then she thinks, maybe see if Ben is home, so she presses the announce button and says, "Ben, this is Jill" and the door opens. She's about to complain to him that he didn't open the door when she tried the first time, only to discover he's not there; she had accidentally guessed the access code!
    • This is arguably an important plot device: Ben knew already that he was in trouble, and supposedly altered the code purposefully to protect Jill. He could have left it the way it was and Jill would have still had access, but she might also have (purposefully or accidentally) betrayed it to others, so the new code allowed her access accidentally. on purpose.
  • Played with in the fourth book of The Pendragon Adventure series. The characters go on a massive manhunt for the guy that created a huge virtual paradise that is threatening to collapse at any moment, and who also went into seclusion IN his own said paradise, to stop a huge virus initially made by the Meganekko to stop the Big Bad's Evil Plan to topple the world (and by doing so, help his plan all along), almost lose life and limb, AND have to convince the guy to give up the password to get into the main code to purge the virus. The password? Zero. Just.zero.
    • He actually justifies this saying that he knew people would expect it to be a complex password, instead he made it a single digit, throwing off anyone attempting to hack the system.
  • Sort of subverted in a novel by C.J. Cherryh, the protagonist is mildly tortured for access to his laptop. Once he tells them the 'password' (giving the date where it asks for 'date') they access information deliberately designed for such an eventuality which looks good, but is useless.
  • Played around with in A Series of Unfortunate Events, the passwords to get into the VFD headquarters is a mixture of the easily guessable kind (sirisaacnewton) and the ridiculously difficult (a page long thesis on the themes present in the novel Anna Karinina)
  • The Millennium Trilogy : The Girl Who Played With Fire has Lisbeth Salander's home security password set to WASP, which is the very conspicuous tattoo she had on her neck. Didn't take much for much for Blomkvist to figure that out.
    • Somewhat justified in that she never expected anyone who knew her to be able to find the place, that it was a standard anti-intrusion alarm which doesn't allow for huge passwords, and regardless of whether or not someone enters the password it alerts Lisbeth to the intrusion.
  • In Artemis Fowl: The Opal Deception, Artemis correctly deduces that the henchmen didn't change the password virtual dj pro serial number - Crack Key For U the cuffs on him and Holly Short from its factory default. However, it's not one digit repeated three times. It's the LEP equivalent to 911, which is on every billboard in Haven and Holly has memorized. This was possibly done deliberately kaspersky total security 2020 activation code free - Free Activators Opal could have more fun watching them try to survive against impossible odds.
    • An example more demonstrative of the trope, although still not exactly straight, is also in The Opal Deception, when Artemis's password for an encrypted disc is the family motto, Aurum est potestas. However, here he wanted Butler to guess the password, and it is arguably a password that you could only guess if you knew Artemis well.
    • In The Time Paradox, Foaly the centaur (who is one of the few people Artemis feels is on the same intellectual level as himself) asks Artemis the password to get into the manor's system. The password is CENTAUR, all caps.
  • Averted and subverted in Sewer, Gas And Electric, when the heroine hears a supercomputer's complex administrative-level password on a video clip. When she tries to use it herself, it fails to work, as the video clip was prepared by the supercomputer itself, giving her false information.
  • In Stephen King's novel Firestarter, the personnel at the secret government agency "The Shop" apparently all use four-letter TLex Suite Crack - 4SoftPC - Free Activators words as passwords.
  • In the Sten series of novels by Allan Cole & Chris Bunch, the secret network for automated mining and distribution of the Unobtainium that was the monopoly of the Eternal Emperor's power had its several command stations guarded by no password at all. As the stations had to be dirt-simple in their circuitry (due to the requirement of possibly needing to run decades or centuries without maintenance) and could not use complex physical locks or passwords (due to the requirement of possibly needing to be accessed by a man on the run without the resources to reconstruct complex electronic keys and who might not be in possession of all, or any, of his memories), the security system was simply set to self-destruct the installation if more than one person ever entered the control room at a time. The Eternal Emperor's reasoning was that no intruder with the remotest amount of sense would enter a hidden base that was heavily booby-trapped and could contain any number of potential ambushers without taking along armed backup or a bomb squad, and that only the legitimate owner would dare to walk in by himself. The theory fell down when the protagonist, a black-ops qualified demolitions expert commando, did a one-man ninja run on the base—although the titular Sten did muse at his exceptional luck in that his partner Alex was unavoidably busy doing something else in another star system at the time, as if he'd been available Sten would have brought him along.
  • There's a short story called Mousetrap which thoroughly averted this trope in an unusual way. Simply knowing the password to a character's computer account proved insufficient to gain access to it, you also had to type it with the correct rhythm, as the computer timed the keystrokes.
  • In The Man Who Was Thursday by G.K. Chesterton, when entering the guarded anarchists' lair, you knock five times and then are asked who you are. The correct response is "Mr. Joseph Chamberlain", an influential British politician of the time. So, a celebrity, but an odd choice for the anarchists!
  • In Sammy Keyes adobe photoshop cc 2018 - Free Activators the Sisters of Mercy, the titular character asks a friend for advice on safecracking and he tells her how most people choose to use numbers corresponding to birthdays or anniversaries or other important events rather than random numbers (she needs to help some people open a safe so her friend won't have to shift through dog poop for the key, long story). Later, Sammy uses this information to crack open a safe in her church and solve a mystery (it used the Father's birthday).
  • Justified in Eric Idle's sci-fi novel The Road to Mars. Carlton, the robot, is trying to break into a computer using the most advanced hacking algorithms possible. Eventually he thinks of looking for a simple word as the password. He explains that password breaking programs have become so complex that it's possible to fool them by going under their level of complexity with very simple passwords.
  • In Lullaby, everyone's password is "password," which is indicative if society's laziness and lack of imagination.
  • In Octagon, two programmers responsible for their universe's version of MS-DOS programmed an Override Command into the code, so they could take control of any system with two passwords. Each programmer only knows one of these passwords, to prevent abuse. The problem arises when AI becomes a crapshoot, with one of the passwords programmed into it from the start, and it turns out both programmers used the same password, giving Skynet Lite access to everything that uses an operating system based off of MS-BOS.
  • Played with in Temple. William Race comments fairly early on that his brother's passwords are always Elvis's army serial number. Later on, when trying to defuse an Earth-Shattering Bomb set up by a thought-executed scientist, Race and a friend attempt to guess the password. Race realizes that, thanks to the scientist's pride, he would want to stick it to the world in some way with his last act, and punches in the execution date. It works. Later, Race is defusing another bomb of the same type. However, his brother designed the codes on this one, and so it's Elvis's army serial number.
  • Dark Future: Averted in Comeback Tour; Needlepoint requires a massive list of codewords to be entered in response to the satellite computer's queries, taking twelve hours to complete the correct entry of all the passwords. Parodied in Demon Download: The password is "swordfist" and is frequently mistaken for swordfish.

Live Action TV

  • Heroes and Watchmen: One averts, spoofs and justifies superhero tropes all the time, another is a meticulous Deconstruction of the entire genre.and both have a plaintext name with obvious relation to its setter as a password. (And for extra security, the computer tells you when it's incomplete.) However, the events later in the latter's story suggest that Ozymandias may have wanted them to crack the password.
    • Rather more frighteningly, the scene in the second series of Heroes where Bob's daughter enters his password, midas, for administrator access, has Product Placement by CISCO, of all things.
  • Played straight in Bones, when genius-level scientist Brennan tries to keep her password secret.
Cquote1.svg

Booth: I know your password too. It's Daffodil.
Brennan: I never told you that!
Booth: What? I got eyes. I mean you guys aren't exactly CIA material.
Hodgins: Daffodil?
Brennan: What? They're pretty. And I'm changing my password.
Booth: Daisy.
Brennan: How did you know?
Booth: It's your second favorite flower. I know you, Bones. Try a planet!
Brennan: (entering password)
Booth: Jupiter!

Cquote2.svg
    • In another episode avast antivirus mod for pc - Activators Patch Beaver in the Otter") Booth finds a locked suitcase and asks Bones for the owner's birthdate. He's mildly surprised when that fails, but then realizes that she'd given it to him in British Commonwealth order (day-month-year). The US order (month-day-year) opens the case.
  • In the Doctor Who episode "World War III", the password 'buffalo' is enough to give Mickey control over a missile.
    • Possibly justified given that this is a British military server, and the buffalo is not exactly native to that island country. In other words, would you ever expect a die hard Denver Broncos fan to use the name of the Oakland Raiders' quarterback as his password? I think not.
      • True, it might put off someone who was trying to guess the password, but just the word 'buffalo' would be matched in virtually no time at all by an automated dictionary search.
      • Well, it's never clear if that password was put in by the military, or if it was a personal password The Doctor added himself at some point as a back door.
    • In "Voyage of the Damned", the evil robot angels can be delayed by saying "Security Protocol One."
    • In the Tom Baker storyline "The Invasion of Time", the Doctor tries to break an encrypted lock that even the sonic screwdriver won't open. He examines the lock to see if it takes retina or voice scans, before muttering how one of his favorite professors at the Prydonian Academy once told him that "there was nothing more useless than a lock with a voiceprint." He then realizes that the password is the phrase, "There is nothing more useless than a lock with a voice print", spoken aloud.
      • Later in that same episode, the above-mentioned professor (whose office the Doctor was nosing around in) enters his office and opens the secret door by saying the phrase "There is nothing more useless than a lock with a voice imprint"—and the door accepts it, which seems to prove the professor's point since this voice-activated door lock obviously isn't that picky about vocal frequencies (the Doctor doesn't even try to imitate the professor's voice) or the actual phrasing of the password.
  • In Torchwood, Jack keeps not only his safe's password but also the password for the Rift manipulator written in a notebook. As Owen remarks: "Not so clever, Jack."
    • In "Children of Earth", Bridget Spears, a fairly high-ranking civil servant, uses the password "hastings".and writes it down for her new assistant to use.
  • In an episode of Stargate SG-1, a character mentions this trope and that it's usually "something familiar". Kinsey, whose computer they were trying to access, mentions that he has "a wife, three children, seven grandchildren and various nieces and nephews", but Jack O'Neill figures out that the password is Oscar, the name of Kinsey's dog.
  • Subverted in Stargate Atlantis. In trying to access Dr. McKay's account to fix a computer error, Teyla laments about not knowing the password, and Sheppard responds with:
Cquote1.svg

Sheppard(typing and speaking): One six four three one eight seven nine one nine six eight four two.
(computer beeps)
Sheppard: See? Doesn't take a genius.
Teyla: . it doesn't?
Sheppard: Sixteen Forty Three is the year Isaac Newton was born; Eighteen Seventy Nine, Einstein, Nineteen Sixty Eight-
Teyla: The year Rodney was born.
Sheppard: NEVER underestimate the size of that man's ego.
Teyla: Wait, weren't there other numbers?
Sheppard: Forty Two. The Ultimate Answer to the Great Question of Life, The Universe, and Everything.

Cquote2.svg
    • It has to be said he didn't guess it, he only remembered hearing it and knew what the numbers meant.
    • Also subverted earlier, when Rodney basically needs to hack into their own system.
Cquote1.svg

Caldwell: We'll use my password.
Rodney: No, we'll use mine.
Caldwell: Why? Because you don't trust me?
Rodney: No, because it's a 26-digit alpha-numeric code that I may have to enter multiple times and I haven't gotten around to memorizing yours yet.

Cquote2.svg
  • Subverted in the Veronica Mars episode "Like A Virgin". Veronica reports that her account's been hacked, and the system administrator gives her a spiel about password safety. Whereupon she reveals that her password was "GJ7B!X" (with possible variation in case).
    • Subverted again in "Mars vs. Mars." Keith changes the combination to his safe to something of personal significance, then leaves it in a location that would be highly visible to a trained PI. When trained PI Veronica finds all the password and opens the safe, it no longer contains files but instead an ink packet that explodes onto her.
  • NCIS takes this trope to its logical extreme, by having Ducky, who had recently become a forensic psychologist, determine the password of a missing naval officer based on a study of objects collected from her apartment. Since she was a bookworm, it was the title of one of her books. Ducky was even able to guess which book after a few token tries.
    • Double Subverted in another NCIS episode. Tony, breaking into a house, enters in a password easily extrapolated from Genre Savvy knowledge of this trope (the password was a birthday, as indicated by the worn out numbers). Unfortunately for him, it's a double-failsafe system.
  • In an episode of The Drew Carey Show, Oswald has keylocked his cell phone, and forgotten the password. He starts off with 1111, then 1112, getting to 1114 before Lewis throws the cell phone out the window. Oswald then remembers that he wrote down the password, and gets it out of his wallet. The password? 1115. In another episode Mimi guess Mr. Wick's secrect password. It's "Mr. Wick."
Cquote1.svg

Oswald: He used his own name as the password? That's stupid.
Mimi: At least it's a better password than "password".
Oswald and Lewis: I already changed it!

Cquote2.svg
  • In one episode of Drake and Josh, Megan states she found out the name of the woman who Walter (the dad) was dating. When asked about this, Megan states that she read Walter's E-mail, and when asked about that, she stated that Walter's password was "password". Josh then immediately goes to change his password (like father, like son. Heh.).
  • Double subverted in an episode of House. Dr. House is desperately trying to get into a patient's laptop, and couldn't guess the password. He claims that this proves the patient was lying/hypocritical/etc about his "no secrets" policy. Dr. "Thirteen" suggests that he leaves the password blank. The system logs in.
    • Of course, House encounters no such problems with other passwords, like Cuddy's "partypants", which he calls "a pretty obvious choice".
    • In the episode "Carrot or Stick", Chase admits that the password he used was 'password'.
  • A warden in Days of Our Lives has "lockdown" as his password. To make matters worse, it's written on a sticky note in his desk.
  • An episode of Mission Impossible had a former dictator's computer protected by two passwords. The first one? The dictator's own name. The second? Anything Goes, his favorite musical which he watches 24/7 and has posters of all over his office.
  • Justified in an episode of CBS's Hack when the characters are trying to use stolen ATM cards to get cash out of an ATM. Mike notes that the one thing the banks tell you not to make your PIN is your birthday, and reasons that they wouldn't do this unless some people actually did make their PIN their birthday. They try a number of cards before eventually discovering one whose PIN is the owner's birthday.
  • Subverted in Psych, where Shaun Spencer SherlockScans the room, and then correctly gives the password. When his friend expresses surprise, he points out that the password is written on the bottom of the (raised) computer, and he simply read the reflection on the CD case.
    • Played straight when the clue to a safe code is the physical measurement of a man's wife (36-24-34).
  • In The X-Files, when Scully needed to access Mulder's computer, it only took her a few guesses to come up with trustno1.
  • In an episode of The Office, Dwight boasts that he has installed password protection on all his accounts to prevent identity theft. Jim asks if the password is 'Frodo.' Dwight immediately denies it, but starts furtively typing on his keyboard. Jim then asks if he'd just changed it to 'Gollum,' which Dwight denies again, before furtively typing some more.
    • When Dwight is (briefly) fired, Karen is given the job of going over all his accounts and files but finds that he has locked each one with a different password (each of which is a mythical beast of some kind)
    • In a later episode, the server goes down, and they need to figure out the password (set by an IT guy who had since been replaced), so after they unsuccessfully try some default ones, Dwight, not being Genre Savvy, quits trying to guess it and decides to brute force it (manually), starting with 0000000. Jim cuts him off after 0000001, and they go back to guessing swordfish-type passwords, which eventually works.
Cquote1.svg

Micheal Scott: I remember when I heard it, I laughed but Pam got upset.
Kevin: Try 'bigboobs' (Jim trys it, nothing)
Dwight: Try it with a 'z'.
Jim: Ok, we're in.

Cquote2.svg
  • A masked orgy in Its Always Sunny in Philadelphia is guarded by the password "orgy". (Or, as Danny DeVito puts it, "ooooooorrrrrgggggyyyyyy".) Of course, given the. rather low caliber of the participants, it doesn't look like they're in a hurry to turn anyone down.
  • The short-lived Tremors TV series featured a scene where circumstances force survivalist Burt Gummer to reveal that the password to his home/bunker's front door is the name of his long-departed ex-wife.
  • In an episode of CSI, the number keys on the safe each play a different note, and the code is "Three Little Maids From School Are We". The safe's owner being an avid Gilbert and Sullivan fan with posters to that effect.
  • One episode of the Canadian sitcom, Corner Gas:
Cquote1.svg

Hank: I came up with the best password, you'll never be able to guess it!
Brent: Is it "password"?
Hank: Uhh. No?

Cquote2.svg
    • Hank later changes it and tells everyone that "This time, it's not password". It turns out his password is "notpassword".
  • Lampshaded in Leverage:
Cquote1.svg

Parker: Forty-two seconds.
Hardison: What?
Parker: To rob this bank. One security guard who's never fired his gun before, two closed-circuit cameras outside, one inside, and a Glenn-Reider safe built in the '50s whose default combination is the birthdate of the manager's wife! Get in, get out, forty-two seconds.

Cquote2.svg
  • In Cheers, Rebecca Howe's password into her corporation's computer system is "Sweet Baby," which is what she calls her millionaire boyfriend, Robin Colcord. He uses this to break into the computer system and indulge in some pretty extensive insider trading. Her reaction when she finds out is the unforgettable, "I am too stupid to live!"
  • Done at least three times on Criminal Minds: in the pilot episode, when the password was the song the criminal used to fall asleep ("Enter Sandman"); very creepily in second season, when the password to a pedophile elementary school principal's computer was "save them"; and in third season, when the teenage criminal's password was his dead mother's name.
      • The "paedophile" in question actually wasn't a paedophile; he wanted to save children from paedophiles. Also, "save them" was his username (spelt backwards to become Mehtevas). Big difference, and therefore not an example of this trope.
    • Four times! JJ managed to guess the password of a teen's computer because the girl was a fan of vampires—the password was "Cullen". Reid didn't get the reference.
    • Five times! In season three, Hotch guesses the code to a deceased mans safe after correctly guessing that it was not his wife's birthday, but the U.S Marine corps birthday. The man in question was very proud of his military background. Granted, Hotch guessed wrong the first time, but still.
  • In Home Improvement, Tim does a Tool Time episode from his house about installing a home security system, by filming himself as he installs his own security system. First Al suggests using the name of a pet or loved one for the security system password, then Tim says his password on the air.
Cquote1.svg

Tim: For instance, I picked "sabre saw".
Al: Perhaps now you'd like to choose a password that our viewing audience hasn't heard.
Tim: (pause) Perhaps. For all you criminals out there, it might not be another tool. It might be a car.

Cquote2.svg
  • Subverted in Little Mosque on the Prairie, Rayyan tries to get into Amaar's voicemail trying obvious codes like "Amaar" and "Islam" but gives up when she realizes it's not going to work. Double Subverted when at the end of the episode Amaar enters in his password: Rayyan.
  • Knight Rider (2008) "Knight Fever": Sarah tries to crack the computer of a scientist she once dated. After a spiel about "512-bit encryption" making it impossible to break in, Mike correctly guesses that the password is "SARAH". Because, apparently, Sarah is such a hottie that anyone who had ever dated her would automatically spend the rest of his life obsessed over her. (Admittedly, this has been true of every former lover of Sarah's we've met.)
  • An episode of Murder, She Wrote featured a deceased computer tycoon who set his PC's password to "OPENDOOR", on the arrogant assumption that nobody would expect him to use something so obvious. The protagonists stumble upon it through a sudden flash of insight.
  • Subverted in Power Rangers RPM when Dr K chose Ziggy's name as her password, based on the fact that everyone thought she hated him, when in fact, she seems to have feelings for him. In fact, it's possible she intentionally pretends to hate him so thact no-one will guess the password.
  • On one episode of The Secret World of Alex Mack Alex's father's supposedly "creative" password is easily guessed: it is his wife's name backwards. "Creative you ain't," his daughter says to herself upon figuring it out.
  • In an episode of Seinfeld the plot revolves around George's ATM code 'bosco'. In one scene Kramer almost guesses it by reasoning out George's personality and sweettooth.
  • On the tie-in website for Victorious, Robbie mentions that he tried to lock Rex out of the computer. Rex gets back on and then mentions that Robbie should have chose a better password than "Tori Vega loves me"
  • In The Tribe, the super secret password protecting all research regarding the Virus is please. To be fair, the resident genius didn't think to try it himself. On a related note, some episodes later, the tribe is at the lab they think might help them figure out the antidote — Jack and Dal try to get anything to happen Aiseesoft FoneLab 10.1.12 Crack + Registration Number Free Download the computer system, but nothing does until Jack, again accidentally, discovers that the system is voice activated.
  • Lois and Clark does it at least twice: in one episode they successfully get into a Citizen Kane wannabe's computer with the password "Rosebud". In another Lex Luthor's illegitimate son is trying to hack into his dad's accounts. He suspects it's one of the names Lex planned to call his legitimate kids after he married Lois, before having a flash of insight that it's the name she chose: "Clark".
  • Season four of Dexter has the title character, suffering from short-term memory loss, remember that his password is "Harry". An odd choice for someone so concerned with secrecy.
  • On an episode of News Radio, the station's owner, Jimmy James, successfully hacks into a reporter, Matthew's, stock-trading account using the password "cat" (Matthew is known to have several cats). In turn, Matthew successfully hacks into Jimmy James' bank account using the password "Mary Ann" (the name of the news director's mother, whom Jimmy is known to have a crush on).
  • Used in this episode of the Finnish comedy show Ilmisten Puolue or "People's Party". The party chairman, Tapsa, announces that the parties website has been hacked and vandalized. After some questioning, Tapsa admits that, due to his poor memory, he made the password "password" to remember it. After being told that it is the most obvious and overused password ever, he claims that he has changed it to something "unsolvable". Another party member immediately asks if the new password is "123456", which Tapsa confirms. Cue mass Face Palm.
  • In the Eureka episode where Allison takes over from Nathan as head of Global Dynamics, if you watch closely, you can see that her passcode is 867-5309.
  • Subverted in the BBC 4 adaptation of Dirk Gently, in which the time machine self-destructs because the wrong password was entered.
  • The activation code for the Self-Destruct Mechanism in the various Star Trek series is generally fairly obvious, too, but they at least have the bad excuse of voice print matching. (We Will Not Use Playback Attacks In The Future, it seems)
    • Bizarre, since Spock himself demonstrates how easy it is to fake someone else's voice using standard Federation technology in "The Menagerie". And even if you make it somewhat difficult, The Spock might turn out to be an Evil Twin or Enemy Within and you'll be screwed anyway.
    • In TOS the ship self-destruction password was "Zero-Zero-Zero Destruct Zero". Which — as Frippo from Cracked.compointed out — looks like the Password depot brute force - Crack Key For U left it on factory settings.
    • The "prefix codes" appear again in The Next Generation when the Enterprise is teaming up with Cardassians to stop a rogue Federation starship, the Phoenix, and her captain, Ben Maxwell, from attacking Cardassian targets. The Enterprise gives the Phoenix's prefix code to a Cardassian ship under attack, and the Cardassian ship gets a shot in at the unshielded Phoenix, but the Phoenix has longer-range weapons and simply shoots from further than the Cardassian ship can return fire.
      • Actually, no. Phoenix has shorter-range weapons, and while Cardassians do manage to bring its shields down and hit it, Phoenix is not damaged and simply destroys attacking Cardassians ship. Also, regarding prefix codes, it may be possible that ship transmitting code must be Federation vessel for other ship to accept it, as well as possible encirption.
    • Notably averted in the Star Trek: The Next Generation episode "Brothers". When Data takes over the Enterprise (using a playback attack!), his password is:
Cquote1.svg

Data: 1-7-3-4-6-7-3-2-1-4-7-6-Charlie-3-2-7-8-9-7-7-7-6-4-3-Tango-7-3-2-Victor-7-3-1-1-7-8-8-8-7-3-2-4-7-6-7-8-9-7-6-4-3-7-6-Lock.

Cquote2.svg
      • Unfortunately according to "The Nitpicker's Guide for Next Gen Trekkers", perfect machine Data transposes a few numbers when he goes back into the computer later — and the computer accepts it anyway! Though it's entirely possible that the password was actually an algorithm incorporating some variable like the exact time, current star system, position of the challenger on the deck, etc. This would give partial protection from simple playback attacks.
    • The Deep Space Nine episode "Through the Looking Glass" has Sisko going to an alternate universe, where the designer of the space station used the same passwords as his duplicate in the "real" universe. Not only that, but no one seems to change the password that activates the self destruct on taking command of a space station. It might be assumed that the password was the designer's fixed back door, except that it's the same as Mirror Kira's password and Sisko was able to change it.
    • The fan series Hidden Frontier references this when Captain Maxwell's first officer suggests using the trick to bring down the shields of another rogue Federation starship, only for the following dialog to ensue:
Cquote1.svg

Captain Maxwell: It won't work, she'll have changed it.
First Officer: Are you sure?
Captain Maxwell: I change mine every week.

Cquote2.svg
      • .which, of course, defeats the whole point.
  • In one episode of HustleThe Mark's password is the name of his dog. Who guards the warehouse with the laptop in it. And wears a name-tag. Except The whole thing is a set up: the laptop is a plant, the dog belongs to someone else, and that isn't even its real name!
  • In the Jonathan Creek episode "Satan's Chimney", a character named Vivian uses her own name as a password. Jonathan correctly deduces that the password was set up by someone else and that they wanted him to find the information it protected.
  • In the Midsomer Murders episode "Market for Murder", the password on the Reading Group's secret share market account is 'Gerald'; the name of the late husband of the group's founder (whom she could not go five minutes without mentioning in conversation).
  • In Andromeda, it turns out that the override code for Eureka Maru is "Shut up and do as I say."
  • In The Suite Life On Deck Zack hacks into Cody's computer in order to steal one of his old essays. When he's asked for a password he quickly figures it out to be "Bailey", the name of Cody's girlfriend. Zack then mockingly comments on that "At least [Cody] has changed it from 'I Miss Mommy'".
  • The West Wing uses swordfish passwords twice. The secret of President Bartlett's MS is signified by "Sagittarius", and to get into the secret operation for foiling Haffley's stem cell vote is the Shave and a Haircut knock.
    • Also in the seventh season, Leo's able to leak a tape using someone else's email because she uses her cat's name as a password.
  • In Leonardo, Piero de' Medici guards his "lightning box" with a Clock Punk security system involving a portculis, a series of numbered levers, and a guilotine. The password is his birthday. The second time Leo tries to get past it, though, he's changed it . to his son's birthday . which is the same day, but a different year.
  • In an episode of MacGyver, Mac and Jack Dalton are coerced into breaking into a secure museum exibit which Mac helped design, though Pete set the access code. They run through the standard gamut of obvious codes (such as Pete's birthday) to no avail. Jack then asks if Pete's has regular gambling numbers to which Mac replies "No, he likes golf.GOLF!". Mac then inputs what turns out to be the correct password: "Arnold Palmer's birthday. Pete's hero."
    • Which seems fairly secure as cracking it involves knowing that Pete likes golf, that his hero is Arnold Palmer and what Arnold Palmer's birthday is.
  • In an episode of password depot brute force - Crack Key For U Collar Neal's girlfriend easily guesses the password to Neal's laptop since it is based on a piece of art Neal admires. Considering how easy to guess the password was, Neal should have been more Genre Savvy and not left the laptop just lying around.
    • As an inversion at the beginning of the episode Neal figures out her ATM password which amazed her since it was a randomly generated number that had no connection to her. Neal cheated by observing what keys she pressed in a reflection.
  • In Spooks, Ruth expresses absolute shock that the Americans would use 1776 as the keypad code for a secure storage facility in their embassy.
    • And in Series 3 a major drug corporation is hacked because they never changed the default password on their system.
  • Law & Order: Special Victims Unit "Educated Guess" features a man who has been raping his niece since she was 14. When the detectives find a lock box which they believe has evidence of this, they first try his birthday and then his wife's birthday to open it. Then they try his niece's birthday, which does open it.
  • Sherlock
    • In the episode, "The Hounds of Baskerville," Sherlock corrects guesses a Major's password to some top-secret CIA information as "Maggie", on the first try.
    • In the first episode, one person uses the name of her dead daughter as a password.
    • Irene Adler comes up with a four digit password that stumps Sherlock for months. It turns out to be SHER with the critical clue actually included on the "locked" screen.
    • She also has her safe passcode as her body measurements. Sherlock works it out partly because she hints at it, and partly because he can tell what some of the numbers are based on the key usage. In any case, it's a blind as the safe contains nothing but a spring-trapped gun. Luckily Sherlock works that out as well.
  • In Being Human (UK), George is a genius with an IQ in the 150s, but he admits that all of his internet passwords are 'password1'.
  • On Gossip Girl Nate's password has been "soccer" since the fifth grade.
  • On an episode of Honey I Shrunk the Kids, the password to shut down some homicidal teddy bears is the word they keep repeating: "Destroy."
  • Subverted, played straight, and both times lampshaded in the Supernatural episode "The Girl with the Dungeons and Dragons Tattoo".
    • While trying to hack into Frank's encrypted hard drive, Charlie thinks she found the password in the remarkably simple "WarGames" when this yields results. Then Frank's hard drive opens a program revealing that it's a false lead and taunts her.
    • Played straight while she's hacking into Dick Roman personal computer, which is locked by the password "W1nn1ng".
  • In Noob, a character has his password be his favorite dessert, for which the French word is "Flan". and has to ask his younger brother to remind him what it is. In the comic based on the series, a fan of the game's top player has said player's name as his password. Both are in a guild that a hacker trying to get people to stop playing MMORPG has once called "his favourite group".

Newspaper Comics

  • Dilbert:
  • One issue of The Far Side featured a group of gangsters being lead out of their hiding place by the police, and one of them gripes "I knew 'Shave and a Haircut' was a bad secret knock."
  • In a Sunday strip of Peanuts, Sally orders a Strawberry Ice Cream Cone, and Charlie Brown orders one of Chocolate. Snoopy gets to the counter and says, "WOOF!" He comes away with a four-scoop cone of different flavors, musing as he eats, "That's interesting. I never knew exactly what 'Woof' meant."
  • In a Sunday strip of Garfield, the titular character seems to have trouble remembering his password. The light bulb pops on over his head, and he types in seven characters. Jon pops up right behind him and says, "It's 'lasagna,' isn't it?" Upon which Jon is promptly tied up Password Recovery Bundle the computer cord.

Radio

  • Used in an episode of Adventures in Odyssey. Alex and Cal are trying to get information from the website of the community college where Alex's mother works, but it needs a password. Cal looks around, spots a sticky note nearby which says "Milk and eggs" and deduces that this must be the password. Alex says that that's his mom's shopping list, but Cal decides to try it anyway. Much to the chagrin of just about everybody except Cal, it works.

Tabletop Games

  • Played with in the Warhammer 40,000 novel Storm of Iron in which the "sacred chant of activation" used by the Tech Marines to launch a large missile (melta torpedo) is correctly guessed in frustration by one of the protagonists when he exclaims, "God damn it! Fire you worthless piece of fucking shit! FIRE!"
  • As the Literature section points out, DnD has a spell called "Knock" which opens pretty much any lock that isn't magically protected. However, one 3rd edition lock had a clever inversion of this trope where opening the first locking mechanism would close the second locking mechanism. Only a high DC Open Lock check could break it.
  • "Hey, wake up!"

Video Games

  • Quest for Glory IV acknowledges this trope by teaching a thief character that people are really dumb about their passwords, and is usually an object or picture nearby. For example, the password for a Filch-brand Safe is. "Filch."
    • At least it's pretty non-obvious: the safe has only every other letter on it (A, C, E, G, I, K), while there are blank spaces in between. So it's not immediately obvious what the code should be.
    • Another part of the game has the player investigating the crypt of the Borgov family, which has a hidden passageway leading to the Big Bad's castle. In the middle of the floor is a relief of the Borgov family crest, which features a rainbow pattern on one side. Pressing the colors Blue, Orange, Red, Green, Orange, and Violet opens a panel which contains the key you need.
  • Guess what the password in Resident Evil Code: Veronica is. No, go on. Guess. Justfied because the base was meant to be blown up easily — so no one would find the family secret.
  • Passwords in Deus Ex are usually single words. and can often be found on various notes in the same building (if not the same room) as the computer in question. Locked in the cabinet sometimes, but that's easily solved with a lockpick.
    • This gets lampshaded later on when many of the emails you find on PDAs start scolding the minions for keeping the passwords in easily found locations. It's around that point that you stop finding them so easily. The codes you do find tend to be revealed less straightforwardly; in one late-game example the password reindeerflotilla is found by digging through a pseudo-Linux (BlueOS, apparently) install crash log.
    • The Nameless Mod is slightly better at this as many of the easy passwords are explicitly temporary (like after a server crash) and explicitly easy as they are just tests. The passwords that are really insecure are frequently lampshaded
    • Perhaps the most extreme (but little-known) example of this, though, is that Anna Navarre's killphrase needs to be retrieved from two computers in the UNATCO base. Ideally you're supposed to hack the computers, or use the login/password combination "demiurge/archon" that Paul gives you if he survived. In fact, though, the self-destruct key for UNATCO's incredibly expensive badass cyborg killing machine can be found by logging into the relevant computers with "guest/guest".
Cquote1.svg

Alex Jacobson: I installed UNATCO's security myself. It's unbeatable.

Cquote2.svg
    • In Deus Ex Human Revolutionthe (otherwise unattainable) code to the bomb in "Smash The State" is "0000". Inputting the code will get you the achievement "Lucky Guess" which has the description "Next time Jacobshould use a more complex code to arm his bombs."
      • Human Revolution has many, many bad password choices by the standards of today. The one for Adam's office computer is "mandrake", and example mook passwords include "morpheus", "stinger", "index", and "macro". Like the original, passwords can often be found in Pocket Secretaries near the associated computer. One (well-hidden) PDA even has a dozen of the logins and passwords for the Detroit Police Department computers on it.
      • Human Revolution lampshades this at one point; a homeless women will tell you that she overheard one cop berating another for choosing 'patriotism' as the password for the armory door. You can later break into the police staion and loot their armory for some nice guns; they never bothered to change the password to anything else.
  • Played painfully straight in a subplot of Marvel Ultimate Alliance. In order to find out whether Black Widow has turned traitor, you need to figure out the password to the personal S.H.I.E.L.D. accounts of both Nick Fury and Black Widow herself. In both cases, it's the name of a friend, and thus easily guessed. And this is despite them both being top-row members of an international anti-terror organization!
  • The one password in EarthBound was not of the "easily guessed" type, but was ridiculous nonetheless: It consisted of waiting three minutes. Who would guess that?
    • This is later subverted by another character asking for the password. As the Player Character does not answer, he (or it) attacks ("someone so quiet is either extremely shy, or extremely dangerous").
  • Played with in Uplink: administrators have random sequences of characters for passwords, which furthermore tend to change just after the player hacks the system. Civilians, however, use regular words for their bank account passwords.
    • Another note is that there are two password-breaking programs available to buy in the game. One is the Dictionary Hack, and the other is simply called Password Breaker. Nobody actually uses the dictionary program as it won't always get you into a system, whereas the simple brute-force Password Breaker will get you in 99.99% of the time.
    • There are four passwords in Uplink that never change.
      • The accounts the player actually uses personally.
      • InterNIC, which is always a random word selected when your player account is created.
      • A Shout-Out to WarGames, and will always have "Joshua" FontCreator Pro13.0.0.2683 With Crack the password and zero security. It's also the only password in the game that can't be cracked by the Password Breaker program — you need to get the reference.
      • The testing system always has the password rosebud.
  • Chrono Cross has an odd example of a password. At one point, the party (disguised as guards) meet another set of guards in front of a treasure room. They are asked the password, and given some logical-sounding choices. None of them work; the password is entered by just standing there until the guards acknowledge that silence is the password.
  • Subverted in Second Sight. When the player attempts to use a computer without knowing the password (found out via scripted events) then John Vattic (the main character) will enter generic "stupid" passwords such as password. Many of the actual passwords are quite poor (for example a soldier in Siberia has "snow" as his password, although it took a psychic reading his mind to find out).
  • In Team Fortress 2 — Meet The Spy, the password to a padlock is. 1111. Then the BLU Heavy knocks down the door before either the BLU Soldier and the BLU Scout could open the door anyway, indicating that just about any weapon used by the cast would smash the door open.
    • It doesn't help that the '1' key on the keypad is the only key that's less than spotless, if you look. If '1111' doesn't work, then you just haven't pressed it the correct number of times, apparently.
    • However, this doesn't stop the Soldier from getting confused midway through. "One, one, one, er [beat] One.
  • Final Fantasy VI: You're asked for a password, and your choices are "Rosebud," "Courage," and "Failure." A nearby NPC will tell you the answer in exchange for some "cider," but since you're part of an underground rebellion against an Evil Empire, take a wild guess.
    • It's actually a little more interesting in the original Japanese, where the password was "Wild Rose." Anyone who had played Final Fantasy II would instantly recognize it, since both games deal with taking out an Evil Empire, making it a quick Shout-Out to the earlier installment of the series.
  • In Legend of Mana, you meet a band of pirate penguins who ask you "What be the password?". And the password is? "What", of course!
  • Lampshaded in Vampire: The Masquerade Bloodlines: passwords for computers are usually related to the owner in some way, except for a programmer, who laments in an email about a superior's password being his name backwards.
  • Subverted in the Full Motion VideoThe X-Files GameVideo Game. During your investigation, you find Scully's laptop. It's password-protected, and you can ask Skinner for suggestions on what the password might be. None of his guesses (such as "faith") are correct, and after three incorrect tries the laptop locks you out. In fact, it's impossible to gain access to the laptop. You have to send it to the FBI's IT division to get it hacked, so that it can later be stolen just before you get the information inside.
  • In Time Splitters: Future Perfect, this is averted in 1994, where a password is a string of numbers and letters, lampshaded in 2052, where Amy accesses Crow's computer, saying, "Anyone who uses his own name as a password deserves to be hacked", and played straight in 2243, where the passwords are "banana" and "lollipop".
    • Amy's remark might be a Take That directed at Valve Software's Gabe Newell, who had his accounts hacked numerous times leading up to the release of Half-Life 2 because he (supposedly) used his own name as his password.
  • The early PC game D/Generation featured a computer terminal where you had to extract a password for a door from the rant of a crazy hostage. It could be one of 2 or 3 things, all of which were just one, simple English word like "pestilence."
  • Xehanort from Kingdom Hearts made the password to his important research-results concerning the "Door to Darkness" (DTD) the names of the 7 Princesses of hearts, who were known to ANYONE who may have been interested in the research. Ha ha, how clever of the seeker of darkness. Well, at least there's no evidence of the order the names are supposed to be written in (Sora still manages to guess it somehow, despite not exactly being a genius). Later, Sora changes the password to something even easier! The most frequently said thing in the game: Sora, Donald and Goofy. In that order.
    • His mentor Ansem the Wise isn't much better. His password is his favorite flavor of ice cream, sea-salt (a real-life treat that the game's director got at Disneyland one day, making this a Mythology Gag). To his credit, Sora & co. wouldn't have known the password if they hadn't gotten a deliberate clue from Riku a few hours earlier.
      • Players who bothered to talk to Scrooge throughout the course of the game would also have it figured out, as he's had the ice cream and is attempting to recreate the flavor.
      • And, of course, there's two kickers. One's that the other two choices you have don't sound exactly palatable (Liver pickle ice cream, anyone?), and the other's if you bother to talk to King Mickey in that room. He'll tell you that the password is "Sea sa-" before deciding that you're smart enough to figure it out.
      • The passwords being guessed in the right order is potentially justified; Final Mix+ (only released in Japan) showed a bonus scene involving an Organisation member (heavily implied to be Xemnas) inputting a password consisting of the names of the somebodies of the Organisation's founding members, each in their own seperate box, raising the possibility that the order the names are inputted isn't particularly important (reinforced by the fact that the group guessed one of the other passwords, one consisting of seven different names, in one go).
  • Sly Password depot brute force - Crack Key For U Honor Among Thieves has this in the first area. To stop the machines going at the Cooper Vault, Sly has to go in and input a three-digit password. However, the person who originally set the password was a stupid Mook, so it remained "123," much to the Big Bad's consternation. All the other safes in the other games were better at passwords, but they left clues to the codes everywhere. Paintings, scattered bottles, and the enemy you're going up against is a master thief who has a penchant for completely cleaning out an area.
  • Monkey Island 2 Le Chucks Revenge features a sequence during which, in order to progress with a certain portion of the storyline, you have to win at a simple spin-the-wheel gambling game. To do this, you have to get insider info from the Gambler's Guild (the correct number to bet on isn't even on the list of responses unless you've gotten it from the man behind the door). To get this info, you have to give the password. The thing is, it's unorthodox, but depending on how quick you are at making connections, you can figure it out watching it given once. The man behind the door will hold up some fingers and say "If this is X (where X is between 1 and 5), then what's this?" and hold up a different number of fingers. The answer is however many fingers he held up when he gave the number X.
  • In System Shock 2, a lot of information is found in discarded audio logs, and of course the game contains a smorgasbord of logs starting with "So I changed the password to 1234."
  • A common passcode that appears in both System Shock and BioShock (series), as well as Deus Ex, is the number 451. This is a reference to the office door code for Looking Glass Studios (the developers of the System Shock series) which in turn was a reference to Ray Bradbury's Fahrenheit 451.
    • Speaking of BioShock (series), the password for Australian supervisor Kyburz's office is the date of Australia Day. In case you don't know it, Filmora 6.8.2 Licensed email and Registration code a huge poster with the date right outside it.
      • In US date format's month/day rather than pretty much the rest of the world's day/month. Even when sold in Australia!
    • Similarly, in both Crusader games, every time you find a locked door, somewhere nearby will be an unlocked PC displaying an email informing the owner of the PC what the password to the door in.
  • From Half-Life 2:
Cquote1.svg

Rebel 1: "What's the password?"
Rebel 2: "Password!"

Cquote2.svg
Cquote1.svg

Rebel 1: "What's the password?"
Rebel 2: I'm not even going to tell you to shut up.

Cquote2.svg
  • Double Subverted in Advance Wars: Days of Ruin. The 10-digit passcode to a top-secret emergency nuclear bunker isn't anything obvious. But the amnesiacMysterious Waif knows it.
  • At one point in Super Mario RPG, villainous Booster speaks a password to open a door. In an interesting variation, the password is whatever you, as the player, named your save file.
    • Also, on the SunkenShip, there's the locked door leading to the King Kalimari fight — in this case, the password is always 'pearls'.
  • Used in all manner of fashions in Fallout 3. The hacking minigame involves educated guesses involving plaintext words (The computer tells you how many letters there are and which ones are right and in the right place), and passwords that get given to you run the gamut from the name of the daughter of the computer's owner to a hexadecimal pointer string. The last mission even ends with you inputting a security code that's never told to you outright but you've been hearing throughout the storyline. Bad Wolf?
  • The same case in Fallout: New Vegas. While seemingly the HELIOS ONE password is super long, those who understand the code can notice that it is not that secure at all. Tabitha also use the password of 123456789 for Raul's cell. Finally, the REPCONN password is 'ICE CREAM', which can be correctly guessed by the player character with very high luck or very low intelligence. In fact, the Override Command for The Strip's securitrons is '1C 3C R34 M'.
  • Halo 3 has a funny version of this as an Easter Egg. A marine is banging on a door, demanding to get in, but he doesn't know the password. There are three different exchanges, depending on the difficulty level, and they are all voiced by the guys from Red vs. Blue. Transcripts and mp3 files here. Snippet:
Cquote1.svg

Password?
Oh, man. I forgot!
Forgot. what?
I forgot the password!
See, that was almost right! Ah, see, the password BEGINS with "I forgot", but ends differently.

Cquote2.svg
  • One dungeon in Wild ARMs: Alter Code F has the group held up by Zed until they can give him the password. He goes away when you just tell him "password".
  • In Sonic Adventure 2, the code to access both Project: Shadow and to fire the Eclipse Cannon (a weapon capable of destroying a third of the moon) is Maria. Even if this wasn't the name of the granddaughter of the scientist in charge of both projects, it's still only five letters, and three japanese characters, since Robotnik clearly presses three keys, one for each syllable. Of course, this may have been intentional.
  • In Oddworld Stranger's Wrath, there's a Black Market Store in which Stranger needs a password to get in. Obviously, he doesn't know, but can get the password from one of the Clackers nearby. The password is Molasses, but he still says it wrong.
Cquote1.svg

Shopkeeper: "What's the password?"
Stranger: "Uh, Mole's Ass?"
Shopkeeper: "Ehhh close enough"

Cquote2.svg
  • Unintentional example in the Bleach DS fighting game series. Money can be unlocked using three passwords that are written on the touch screen, which in the second game are either an open jar, a pawprint, or a poorly drawn rabbit. For people outside of Japan, there's no way of knowing what the password is
Источник: https://tropedia.fandom.com/wiki/The_Password_Is_Always_Swordfish

Notice: Undefined variable: z_bot in /sites/kadinca.us/crack-key-for/password-depot-brute-force-crack-key-for-u.php on line 119

Notice: Undefined variable: z_empty in /sites/kadinca.us/crack-key-for/password-depot-brute-force-crack-key-for-u.php on line 119

4 Replies to “Password depot brute force - Crack Key For U”

Leave a Reply

Your email address will not be published. Required fields are marked *