Secure Random Password Generator

This application helps by making up a secure, random password of a desired length for whatever purpose (harden your existing ebay, Amazon, gmail, and CodeGuru passwords; or register with yet another Web site requiring a password, create a new mail account, and so forth.).

Each time the 'Generate' button is clicked, the seed number for the random function is the number of milliseconds that have elapsed since Windows was started.

By default, characters in upper case, lower case, and digits are used for generation and you can easily add or exclude any characters to or from this set (such as common punctuation, special characters _ + / \$ %, and so on.), as desired.

The Copy button will copy the generated password to the Clipboard, so you can paste it into the input field with Ctrl+V.

MS VC++ 6.0 source code is included, so you can be absolutely sure that your new password is reasonably random and is not transmitted to anywhere in the background. Recompile your own generator from the sources if desired.



Downloads

Comments

  • Valy Password Generator

    Posted by injurer on 05/14/2007 10:02am

    Try this password generator. For me it's better even it's in beta. http://www.valyss.com/software.html and it's free. I hope they submit a new version soon.

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Packaged application development teams frequently operate with limited testing environments due to time and labor constraints. By virtualizing the entire application stack, packaged application development teams can deliver business results faster, at higher quality, and with lower risk.

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds