...
Next we look at the item we are protecting. For example, our server name is KryptonI use the following flow picking elements that are variable,
- Domain Name www.krypton.com
- Server Name
- User Name
For example, I want to setup a master password for my database. In this case, I would use the server name which is krypton. We apply an algorithm to it. Let's say look Look at the first letter which is k and the last letter n. We then define our algorithm,
k Letter x + 1 + uppercase = L
n letter n + 1 = o
The final password is then,
Btr33s.Lo
We then use Use this to technique to also protect our second the database on server called Earth. The password for Earth is,
...