Many people, like myself, keep most passwords in a text file on their computer. We are often warned not to do that because a computer criminal can find this info and abuse it. How does that work? How can they find the info in a text file? Do they use a 'robot' to search through all the text files, or is it a physical person?
To tell you the sad truth the bad guys are more likely to just encrypt all of your files and demand $300+ from you to decrypt it. It isn't worth their time or effort to copy data off of your drive to access your accounts. It is easier for them to just charge a ransom so that you assess your data or use a program to capture your user names and passwords as you use them.
If Internet, L.A.N, or physical access, to your computer, a keystroke logger would be the first option.
0123456789 = 10
abcdefghijklmnopqrstuvwxyz = 26
abcdefghijklmnopqrstuvwxyz0123456789 = 36
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz = 52
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789 = 62
abcdefghijklmnopqrstuvwxyz0123456789 + 32 special characters in an American keyboard = 68
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789 + 32 special characters in an American keyboard = 94
Your password is: TdAnWdWrOnTeCsIsSn = 18 characters with ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz = 52
52^18 = 7727876721872448746791521746944 password combinations.
"Stairway To Heaven"T
here's a lady who's sure all that glitters is goldA
nd she's buying a stairway to heaven
hen she gets there she knows, if the stores are all closedW
ith a word she can get what she came for
oh, ooh, and she's buying a stairway to heaven
here's a sign on the wall but she wants to be sure
ause you know sometimes words have two meanings
n a tree by the brook, there's a songbird who sings
ometimes all of our thoughts are misgiven
Ooh, it makes me wonder,
Ooh, it makes me wonder.
There's a feeling I get when I look to the west,
And my spirit is crying for leaving.
In my thoughts I have seen rings of smoke through the trees,
And the voices of those who stand looking.
Ooh, it makes me wonder,
Ooh, it really makes me wonder.
And it's whispered that soon, if we all call the tune,
Then the piper will lead us to reason.
And a new day will dawn for those who stand long,
And the forests will echo with laughter.
If there's a bustle in your hedgerow, don't be alarmed now,
It's just a spring clean for the May queen.
Yes, there are two paths you can go by, but in the long run
There's still time to change the road you're on.
And it makes me wonder.
Your head is humming and it won't go, in case you don't know,
The piper's calling you to join him,
Dear lady, can you hear the wind blow, and did you know
Your stairway lies on the whispering wind?
And as we wind on down the road
Our shadows taller than our soul.
There walks a lady we all know
Who shines white light and wants to show
How everything still turns to gold.
And if you listen very hard
The tune will come to you at last.
When all are one and one is all
To be a rock and not to roll.
And she's buying a stairway to heaven.
Open the MS calculator in scientific mode. You remember 1234 for example, can be 56872, or whatever?
1234^2 = 1522756
1522756^3 = 3530945043777457216
3530945043777457216 x 3.1415926535897932384626433832795 = 11092791009760550469.010560652058
11092791009760550469.010560652058 = 33 characters
10^33 = 1.e+33 password combinations.
110927910097605504 = 18 characters
10^18 = 1000000000000000000 password combinations.
As for brute-forcing these password combinations, it will go pass the scope of this example.