Secure Random Password Generator

This application helps by making up a secure, random password of a desired length for whatever purpose (harden your existing ebay, Amazon, gmail, and CodeGuru passwords; or register with yet another Web site requiring a password, create a new mail account, and so forth.).

Each time the 'Generate' button is clicked, the seed number for the random function is the number of milliseconds that have elapsed since Windows was started.

By default, characters in upper case, lower case, and digits are used for generation and you can easily add or exclude any characters to or from this set (such as common punctuation, special characters _ + / \$ %, and so on.), as desired.

The Copy button will copy the generated password to the Clipboard, so you can paste it into the input field with Ctrl+V.

MS VC++ 6.0 source code is included, so you can be absolutely sure that your new password is reasonably random and is not transmitted to anywhere in the background. Recompile your own generator from the sources if desired.



Downloads

Comments

  • Valy Password Generator

    Posted by injurer on 05/14/2007 10:02am

    Try this password generator. For me it's better even it's in beta. http://www.valyss.com/software.html and it's free. I hope they submit a new version soon.

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand Event Event Date: September 10, 2014 Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild." This loop of continuous delivery and continuous feedback is how the best mobile …

  • One of the most foolproof ways for an online system to confirm, "Is it really you?" is by adding two-factor authentication. Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and bring-your-own-device (BYOD). However, not all two-factor authentication solutions are created equal. This guide walks through some of the key area of differentiation between two-factor authentication solutions and provides some concrete criteria …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds