FlexKit
Blog
Buy us a shawarma!
Security
16 min read

Tips for Strong Passwords You Can Actually Remember

Published on March 12, 2026

How to use a password generator wisely and when length and randomness beat complexity.

Why use a password generator?

Humans are bad at inventing random passwords. We pick patterns, birthdays, and words that are easy to guess or look up in dictionaries. A good password generator uses real randomness (cryptographically secure) so attackers cannot predict the result. For important accounts—email, banking, work—a generated password is safer.

Length beats clever symbols. A 16-character random mix of letters and numbers is stronger than a short password full of @ and !. Generators let you choose length (e.g. 12–20 characters) and character sets: uppercase, lowercase, numbers, symbols. For most accounts, 14–16 characters with mixed letters and numbers is a solid default.

Use one password per account. Reusing the same password means one breach unlocks many sites. A generator makes it easy to get a new, unique password every time. Store them in a password manager so you do not have to memorize dozens of random strings.

Symbols and mixed case add entropy, but only if the generator includes them. Turning on “symbols” and “uppercase” gives more possible combinations and can satisfy site rules (e.g. “must include a number and special character”). Do not rely on symbols alone to make a short password strong; length still matters most.

Generated passwords are hard to guess because they have no pattern. Attackers use wordlists and common substitutions (e.g. 0 for o). A random string defeats those strategies. The tradeoff is memorability—that is why we use a manager instead of memorizing.

Choosing length and character options

Twelve characters is a minimum for important accounts. Fourteen or sixteen is better. Twenty or more is overkill for most sites unless you have a specific threat model. Balance strength with what you can store and paste reliably.

Include numbers and uppercase if the site allows. They increase the keyspace and help meet common password policies. Some sites still require “at least one number” or “one special character”; a generator with those options avoids rejection at signup.

Exclude ambiguous characters (e.g. 0 vs O, 1 vs l) if you might type the password by hand sometimes. For passwords that live only in a manager and are always copy-pasted, you can use the full character set. For a password you might need to enter on a TV or game console, avoid characters that look alike.

Some generators offer “passphrase” mode: several random words separated by spaces or hyphens. These can be easier to type and remember while still being strong, as long as the word list is large and the selection is random. Useful when you need to type the password occasionally.

Do not reduce length to satisfy an outdated site limit (e.g. “max 12 characters”). Prefer a different service if possible, or use the maximum allowed and make sure the rest of your security (e.g. 2FA) is strong.

Using generated passwords safely

Do not share generated passwords over email or chat. If you must send one, use a secure channel and prefer a temporary link that expires. Treat them like keys.

When a site offers two-factor authentication (2FA), turn it on. A strong password plus 2FA is much harder to break than a password alone. The generator gives you a strong first layer; 2FA adds the second.

If you generate a password with an online tool, use one that runs in the browser and does not send the password to a server. That way only you see it. Copy it into your password manager or the sign-up form, then close the tab.

Do not reuse a generated password across sites. If one site is breached, attackers often try the same credentials elsewhere. A unique password per account limits the damage. Let the generator create a new one each time.

Clear your clipboard after pasting a password if you are on a shared or untrusted machine. Some malware reads clipboard content. In a password manager, the fill action often avoids putting the password in the clipboard at all.

Password managers and generators together

A password manager (e.g. Bitwarden, 1Password, KeePass) stores and fills passwords. Many have a built-in generator. You can also use a standalone browser-based generator and then paste the result into the manager when creating a new entry. Both approaches work; the important part is that the password is random and unique.

When the manager generates the password, you never see it in plain text unless you choose to reveal it. That is fine—you do not need to memorize it. When you use a separate generator, copy the password immediately into the manager or the signup form so you do not lose it or leave it on the clipboard too long.

If you change a password (e.g. after a breach notice), generate a new one and update the manager. Do not revert to an old password. Treat each account as needing its own fresh, strong password.

Back up your password manager’s data (vault) in a secure way. If you lose access to the manager, you lose access to every account unless you have recovery options. Use the manager’s official backup or export feature and store the backup somewhere safe and encrypted.

When to regenerate and what to avoid

Regenerate when a service reports a breach or when you suspect your password may have been exposed. Do not wait. Generate a new password, update the manager, and enable 2FA if you have not already.

Avoid basing a password on personal information (birthdays, names, addresses) even if the generator is not available. Those are easy to find or guess. Randomness is the goal.

Do not type a generated password into a site you reached via an email link without checking the URL. Phishing sites look like the real thing; a strong password is useless if you give it to the wrong site. Use bookmarks or type the URL yourself.

If a site does not allow paste in the password field (often “for security”), that is a bad sign. It prevents using a manager properly. Consider complaining to the site or using a workaround (e.g. browser extension) if you must use that service.

passwords
security
generator
best practices

Read more articles on the FlexKit blog