{"id":989,"date":"2020-09-04T19:03:02","date_gmt":"2020-09-04T17:03:02","guid":{"rendered":"https:\/\/jdm.pl\/blog\/?p=989"},"modified":"2020-09-04T19:03:03","modified_gmt":"2020-09-04T17:03:03","slug":"jak-bezpiecznie-zarzadzac-haslami","status":"publish","type":"post","link":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/","title":{"rendered":"Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami?"},"content":{"rendered":"\n<p>Zapraszamy do zapoznania si\u0119 z artyku\u0142em dotycz\u0105cym tworzenia i przechowywania hase\u0142. Do\u015b\u0107 cz\u0119sto pojawiaj\u0105 si\u0119 pytania, jak robi\u0107 to w bezpieczny spos\u00f3b i dlaczego np. do panelu klienta has\u0142o musi zawiera\u0107 odpowiedni\u0105 liczb\u0119 i typ znak\u00f3w. <\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Jak stworzy\u0107 bezpieczne has\u0142o?<\/h2>\n\n\n\n<p>Zacznijmy od tego, jakie has\u0142o uznajemy za &#8222;bezpieczne&#8221;. Kolokwialnie m\u00f3wi\u0105c takie, kt\u00f3re najtrudniej z\u0142ama\u0107. Zapomnijmy jednak na chwil\u0119 o ci\u0105gach skomplikowanych znak\u00f3w i cyfr, kt\u00f3re trudno zapami\u0119ta\u0107. Ot\u00f3\u017c nasze has\u0142o nie musi wcale tak wygl\u0105da\u0107. Za bezpieczne has\u0142o mo\u017cemy uzna\u0107 zdanie, kt\u00f3re zawiera w sobie cyfry np. jak\u0105\u015b dat\u0119. <\/p>\n\n\n\n<p>W zdaniu mamy spe\u0142nione wszystkie warunki &#8211; jest znak lub znaki interpunkcyjne, du\u017c\u0105 liter\u0119 i cyfry. Zdanie zdecydowanie \u0142atwiej jest nam tak\u017ce zapami\u0119ta\u0107 np. <em><strong>M<\/strong>\u00f3j kot <strong>F<\/strong>eliks ma <strong>7<\/strong> zabawek<strong>.<\/strong> <\/em><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">Nie pami\u0119tam has\u0142a &#8211; co dalej?<\/h2>\n\n\n\n<p>Co je\u015bli jednak has\u0142a zapomnimy? Wiele os\u00f3b zapisuje je w notesach lub nawet w plikach tekstowych. Nie jest to ani bezpieczne, ani praktyczne. Zdecydowanie zalecamy korzystanie z menad\u017cera hase\u0142. Jest to aplikacja umo\u017cliwiaj\u0105ca bezpieczne, zaszyfrowane przechowywanie naszych hase\u0142 &#8211; taki wirtualny sejf. Aby go otworzy\u0107, potrzebujemy poda\u0107 jedno has\u0142o &#8211; to g\u0142\u00f3wne, kt\u00f3re powinni\u015bmy mie\u0107 zawsze &#8222;w g\u0142owie&#8221;. <\/p>\n\n\n\n<p>W menad\u017cerze mo\u017cemy trzyma\u0107 tyle hase\u0142, ile potrzebujemy. Umo\u017cliwia nam to stosowanie najr\u00f3\u017cniejszych kombinacji do rozmaitych serwis\u00f3w. W praktyce dzi\u0119ki temu, przy ewentualnym wycieku, jeste\u015bmy bezpieczni &#8211; dane has\u0142o stosowali\u015bmy bowiem tylko na jednej stronie. <\/p>\n\n\n\n<p>Dashlane, LastPass, 1Password, Enpass, Keepass &#8211; to tylko niekt\u00f3re z wielu menad\u017cer\u00f3w hase\u0142.  Mo\u017cemy wybra\u0107 odpowiedni dla siebie. Warto pami\u0119ta\u0107, \u017ce t\u0119 sam\u0105 aplikacj\u0119 stosujemy na telefonie i komputerze &#8211; nasze has\u0142a s\u0105 wi\u0119c zawsze &#8222;pod r\u0119k\u0105&#8221;. Nie zalecamy logowania si\u0119 do menad\u017cera na obcych urz\u0105dzeniach &#8211; je\u015bli ju\u017c koniecznie musimy zalogowa\u0107 si\u0119 na nieznanym urz\u0105dzeniu, zdecydowanie lepiej podejrze\u0107 odpowiednie has\u0142o &#8222;w sejfie&#8221; na w\u0142asnym telefonie i przepisa\u0107 je w razie konieczno\u015bci. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zapraszamy do zapoznania si\u0119 z artyku\u0142em dotycz\u0105cym tworzenia i przechowywania hase\u0142. Do\u015b\u0107 cz\u0119sto pojawiaj\u0105 si\u0119 pytania, jak robi\u0107 to w bezpieczny spos\u00f3b i dlaczego np. do panelu klienta has\u0142o musi zawiera\u0107 odpowiedni\u0105 liczb\u0119 i typ znak\u00f3w. Jak stworzy\u0107 bezpieczne has\u0142o? Zacznijmy od tego, jakie has\u0142o uznajemy za &#8222;bezpieczne&#8221;. Kolokwialnie m\u00f3wi\u0105c takie, kt\u00f3re najtrudniej z\u0142ama\u0107. Zapomnijmy [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":993,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[16],"class_list":["post-989","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-porady","tag-bezpieczenstwo"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami? - Blog jdm.pl<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami? - Blog jdm.pl\" \/>\n<meta property=\"og:description\" content=\"Zapraszamy do zapoznania si\u0119 z artyku\u0142em dotycz\u0105cym tworzenia i przechowywania hase\u0142. Do\u015b\u0107 cz\u0119sto pojawiaj\u0105 si\u0119 pytania, jak robi\u0107 to w bezpieczny spos\u00f3b i dlaczego np. do panelu klienta has\u0142o musi zawiera\u0107 odpowiedni\u0105 liczb\u0119 i typ znak\u00f3w. Jak stworzy\u0107 bezpieczne has\u0142o? Zacznijmy od tego, jakie has\u0142o uznajemy za &#8222;bezpieczne&#8221;. Kolokwialnie m\u00f3wi\u0105c takie, kt\u00f3re najtrudniej z\u0142ama\u0107. Zapomnijmy [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog jdm.pl\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-04T17:03:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-04T17:03:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anna Starek-Wr\u00f3bel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anna Starek-Wr\u00f3bel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/\"},\"author\":{\"name\":\"Anna Starek-Wr\u00f3bel\",\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/#\\\/schema\\\/person\\\/26e7a9c6f5b416eabcfed62ee02685c0\"},\"headline\":\"Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami?\",\"datePublished\":\"2020-09-04T17:03:02+00:00\",\"dateModified\":\"2020-09-04T17:03:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/\"},\"wordCount\":357,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/hasla.png\",\"keywords\":[\"bezpiecze\u0144stwo\"],\"articleSection\":[\"Porady\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/\",\"url\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/\",\"name\":\"Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami? - Blog jdm.pl\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/hasla.png\",\"datePublished\":\"2020-09-04T17:03:02+00:00\",\"dateModified\":\"2020-09-04T17:03:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/#\\\/schema\\\/person\\\/26e7a9c6f5b416eabcfed62ee02685c0\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/hasla.png\",\"contentUrl\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/hasla.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/jak-bezpiecznie-zarzadzac-haslami\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/\",\"name\":\"Blog jdm.pl\",\"description\":\"WordPress tutoriale i porady\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/#\\\/schema\\\/person\\\/26e7a9c6f5b416eabcfed62ee02685c0\",\"name\":\"Anna Starek-Wr\u00f3bel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c514af5a4b2affc5fccce6e1cf2e2d03eb6489cfbf462552eee35a68ed106974?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c514af5a4b2affc5fccce6e1cf2e2d03eb6489cfbf462552eee35a68ed106974?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c514af5a4b2affc5fccce6e1cf2e2d03eb6489cfbf462552eee35a68ed106974?s=96&d=mm&r=g\",\"caption\":\"Anna Starek-Wr\u00f3bel\"},\"sameAs\":[\"https:\\\/\\\/cmo.im\"],\"url\":\"https:\\\/\\\/jdm.pl\\\/blog\\\/author\\\/anna-starek\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami? - Blog jdm.pl","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/","og_locale":"pl_PL","og_type":"article","og_title":"Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami? - Blog jdm.pl","og_description":"Zapraszamy do zapoznania si\u0119 z artyku\u0142em dotycz\u0105cym tworzenia i przechowywania hase\u0142. Do\u015b\u0107 cz\u0119sto pojawiaj\u0105 si\u0119 pytania, jak robi\u0107 to w bezpieczny spos\u00f3b i dlaczego np. do panelu klienta has\u0142o musi zawiera\u0107 odpowiedni\u0105 liczb\u0119 i typ znak\u00f3w. Jak stworzy\u0107 bezpieczne has\u0142o? Zacznijmy od tego, jakie has\u0142o uznajemy za &#8222;bezpieczne&#8221;. Kolokwialnie m\u00f3wi\u0105c takie, kt\u00f3re najtrudniej z\u0142ama\u0107. Zapomnijmy [&hellip;]","og_url":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/","og_site_name":"Blog jdm.pl","article_published_time":"2020-09-04T17:03:02+00:00","article_modified_time":"2020-09-04T17:03:03+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png","type":"image\/png"}],"author":"Anna Starek-Wr\u00f3bel","twitter_card":"summary_large_image","twitter_misc":{"Napisane przez":"Anna Starek-Wr\u00f3bel","Szacowany czas czytania":"2 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/#article","isPartOf":{"@id":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/"},"author":{"name":"Anna Starek-Wr\u00f3bel","@id":"https:\/\/jdm.pl\/blog\/#\/schema\/person\/26e7a9c6f5b416eabcfed62ee02685c0"},"headline":"Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami?","datePublished":"2020-09-04T17:03:02+00:00","dateModified":"2020-09-04T17:03:03+00:00","mainEntityOfPage":{"@id":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/"},"wordCount":357,"commentCount":0,"image":{"@id":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/#primaryimage"},"thumbnailUrl":"https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png","keywords":["bezpiecze\u0144stwo"],"articleSection":["Porady"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/","url":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/","name":"Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami? - Blog jdm.pl","isPartOf":{"@id":"https:\/\/jdm.pl\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/#primaryimage"},"image":{"@id":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/#primaryimage"},"thumbnailUrl":"https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png","datePublished":"2020-09-04T17:03:02+00:00","dateModified":"2020-09-04T17:03:03+00:00","author":{"@id":"https:\/\/jdm.pl\/blog\/#\/schema\/person\/26e7a9c6f5b416eabcfed62ee02685c0"},"breadcrumb":{"@id":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/#primaryimage","url":"https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png","contentUrl":"https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/jdm.pl\/blog\/jak-bezpiecznie-zarzadzac-haslami\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/jdm.pl\/blog\/"},{"@type":"ListItem","position":2,"name":"Jak bezpiecznie zarz\u0105dza\u0107 has\u0142ami?"}]},{"@type":"WebSite","@id":"https:\/\/jdm.pl\/blog\/#website","url":"https:\/\/jdm.pl\/blog\/","name":"Blog jdm.pl","description":"WordPress tutoriale i porady","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jdm.pl\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Person","@id":"https:\/\/jdm.pl\/blog\/#\/schema\/person\/26e7a9c6f5b416eabcfed62ee02685c0","name":"Anna Starek-Wr\u00f3bel","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/c514af5a4b2affc5fccce6e1cf2e2d03eb6489cfbf462552eee35a68ed106974?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c514af5a4b2affc5fccce6e1cf2e2d03eb6489cfbf462552eee35a68ed106974?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c514af5a4b2affc5fccce6e1cf2e2d03eb6489cfbf462552eee35a68ed106974?s=96&d=mm&r=g","caption":"Anna Starek-Wr\u00f3bel"},"sameAs":["https:\/\/cmo.im"],"url":"https:\/\/jdm.pl\/blog\/author\/anna-starek\/"}]}},"jetpack_featured_media_url":"https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png","uagb_featured_image_src":{"full":["https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png",1200,628,false],"thumbnail":["https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla-150x150.png",150,150,true],"medium":["https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla-300x157.png",300,157,true],"medium_large":["https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla-768x402.png",640,335,true],"large":["https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla-1024x536.png",640,335,true],"hd_qu_size2":["https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png",400,209,false],"1536x1536":["https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png",1200,628,false],"2048x2048":["https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla.png",1200,628,false],"sidebar-thumb":["https:\/\/jdm.pl\/blog\/wp-content\/uploads\/2020\/09\/hasla-250x124.png",250,124,true]},"uagb_author_info":{"display_name":"Anna Starek-Wr\u00f3bel","author_link":"https:\/\/jdm.pl\/blog\/author\/anna-starek\/"},"uagb_comment_info":0,"uagb_excerpt":"Zapraszamy do zapoznania si\u0119 z artyku\u0142em dotycz\u0105cym tworzenia i przechowywania hase\u0142. Do\u015b\u0107 cz\u0119sto pojawiaj\u0105 si\u0119 pytania, jak robi\u0107 to w bezpieczny spos\u00f3b i dlaczego np. do panelu klienta has\u0142o musi zawiera\u0107 odpowiedni\u0105 liczb\u0119 i typ znak\u00f3w. Jak stworzy\u0107 bezpieczne has\u0142o? Zacznijmy od tego, jakie has\u0142o uznajemy za &#8222;bezpieczne&#8221;. Kolokwialnie m\u00f3wi\u0105c takie, kt\u00f3re najtrudniej z\u0142ama\u0107. Zapomnijmy&hellip;","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/posts\/989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/comments?post=989"}],"version-history":[{"count":2,"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/posts\/989\/revisions"}],"predecessor-version":[{"id":991,"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/posts\/989\/revisions\/991"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/media\/993"}],"wp:attachment":[{"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/media?parent=989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/categories?post=989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jdm.pl\/blog\/wp-json\/wp\/v2\/tags?post=989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}