FireKey - A Secure Password Generator

Meet the trusted password generator, FireKey. It is a secure random password generator, personalise your password using below options and generate a password.

Your Password...

Note: Default length of the password has been set to 9.

Your password must contain:

Length of the Password:

If you want to stay on top of data breaches, or want to learn anything interesting happening in the tech industry, sign up to our newsletter.

Subscribe to our Newsletter

* indicates required

What is FireKey?

A password is a string of characters used for access approval. Passwords play an important role in our digital life to safeguard your personal accounts, resources and assets. Protecting your data isn’t just about choosing the right options it involves every step we take. With a secure password we can prevent threats of stealing our data and unauthorized access.

A secure password contains different types of characters (Alphabets, Numbers and Special Characters).

FireKey is a free tool developed by KODEAC to generate a secure password and this web based tool can be used on any computer, phone, or tablet. FireKey is a user interactive password generator and it never asks for your data, the passwords you generate are never sent across the web.

How FireKey works?

FireKey generates a password, which contains uppercase letters, lowercase letters, numbers and special characters, right as you visit the site. By default, generated password contains 9 characters. FireKey allows you to personalize your password, you can choose what type of characters you would like to have in your password.

You can generate your password by adjusting the password length slider or by clicking on the “Generate Password” button. FireKey generates the random passwords dynamically by taking the inputs from the password length slider and input box.

Strength of password is represented by the colors of slider. When you adjust the password length slider or when you increase or decrease the number in password length through the input box or when you check or uncheck the types of characters, the color of slider will automatically change resembling the strength of your password.

  • Yellow variant for Weak.
  • Light Green variant for Good.
  • Green variant for Strong.

You can copy the password to the clipboard with just a single click and can be pasted at the desired field or space. There is a copy button on the password box with icon & click on the button to copy the password.

To simplify the way of securing your accounts and assets, KODEAC has developed this tool with love and it is totally free to use.

Importance of a secure password

Modern technology and latest devices are vulnerable to misuse by unauthorized access. Most of the applications share information and in more cases they also connect with other applications to get information or to conduct financial transactions or to get access to other accounts. In some cases, a single device may be used by more than one user, and it may leave your privacy at risk, it may lead to misuse.

Misuse and unauthorized access may involves the loss of important information and valuable data, disclosure of sensitive and confidential information, unauthorized financial transactions and stealing identity. The most common way to break into our devices and applications is by guessing or stealing our passwords.

Passwords are used to gain access to an account, application or a device. Usage of dictionary words and commonly used words, empowers hackers to easily obtain the entry to our accounts. So a password which is hard to guess should be used and it reduces the chances of hacking through password.

A secure password is a long password which contains randomly arranged all types of characters. Secure password is comprised of alphabets, numbers and special characters. Secure passwords are hard to guess and require millions of combinations.


  • Your password should be long and complex.
  • It should have more than 9 characters, recommended length of password is 16 characters.
  • Uppercase letters, lowercase letters, numbers and alphabets, your password should have at least one of each.
  • Use passphrases to remember your complex passwords.
  • Use secure random password generators which doesn’t ask for your data to generate passwords.
  • Change your password every 3 months.
  • Passwords which are difficult to remember can be copied to a plain text file and encrypt the file using encryption tools.
  • Manage your passwords with a secure and reputed password management software.
  • Backup your passwords to retrieve your passwords if you lose or forgot your password.
  • If the application you use supports 2-step authentication, enabling it leads to a solid security.
  • You should only use SSL encrypted websites while making online payments. SSL encrypted sites have urls with protocols like HTTPS or SFTP or FTPS or SMTPS.
  • Check the urls or domains of the site you are visiting carefully, harmful phishing sites url or domains may look alike with little changes to the actual site’s url.
  • Enable antivirus and firewall protection, check carefully about the connections which you allow through firewall.
  • Make sure your Operating systems such as Windows 7, Windows 8, Windows 10, Mac OS, iOS, Android and Linux of your devices are updated with the latest security patch or update.
  • Enable key loggers and hidden cameras only when necessary, otherwise turn them off. It may cause disclosure of important information or privacy risk when your device is used by others.
  • It is recommended to lock your PC or Mobile phone if you are not using.
  • It is highly suggested to use on screen key boards for your critical passwords when you use other’s device.
  • Using two different browsers is helpful in cases like when you visit two different types of sites. Type of sites which are important in which you hold accounts which contains important and sensitive information can be used using one browser and type of sites which are casual and entertainment based can be used using another browser.
  • In the same way, using two Email Ids and Phone numbers for sharing or receiving confidential and non-confidential data is recommended.
  • If you are running an online business site, make sure that you are not using domains which are registered by others and it is advised to set up an email account with the same domain name.
  • There is a chance to divert two-step verification by using cookies, make sure you only allow harmless cookies.
  • Using third-party plugins and CDNs may increase the security threat, try to avoid using them when it is not necessary.


  • Avoid using the same password for multiple accounts or applications or devices.
  • Do not use same security question for different accounts.
  • Do not use the names of your family members or friends or favorite celebrities or pets as your passwords.
  • Do not use your mobile numbers or house numbers or zip codes or date of birth as your passwords.
  • You should use long and complex passwords containing alphabets, numbers and special characters but not the dictionary words. Examples of strong and secure passwords: Sd1%G4fU`Jw/Z#G_^, Il0%e;HrQ_cg>Fqj, Zz7^w9U(K0zt(voI.
  • Do not use unsecure passwords with dictionary words which are easy to guess and such passwords are likely to be hacked using Brute force attacks or dictionary attacks.
  • Allow your browser to store your passwords only when it is necessary and in cases where no others use your devices otherwise don’t allow your browser to store your passwords.
  • Do not log in to important accounts when you are connected to a public Wi-Fi or a free VPN.
  • Do not use Tor browser to access your accounts. It is highly not recommended.
  • Never use unencrypted connections such as HTTP or FTP to share confidential information or to make online payments.
  • It is not recommended to store the passwords of accounts that hold sensitive information in the cloud.
  • Do not engage with the unknown links appear in spam mails or SMS messages.
  • Sharing passwords through unencrypted messengers or Emails is unsecure, do not share passwords through third-party applications.
  • Do not use online paste and screen capture tools while you are logged in to your accounts.
  • Do not trust the expired SSL certificates, make sure that the site have enabled HTTPS connection when you share important information or make online payments.
  • If you’re running an online business, do not integrate distrusted payment gateways to your website.