Gave kind of a rushed response before; wanted to elaborate.
Password Safe uses just a single small file to store your user/pass, plus a place to store "security question" answers, PINs, etc. This file is presently a mere 16 kb for me, and that's with 63 u/p entries. That one file is *all* that you ever need to back up. If your hard drive dies or whatever, just do a reinstall of that tiny program, and replace the default file with your backup file. All of your data will be available, and you're "back up" (sorry!) and running.
It will auto-browse to the selected site for you with one click, and will auto-enter user/pass and submit with another single click. It also has a built-in crypto-strength password generator, which can be set to whatever yours and the site's policies are. E. g., number of characters, only alphanumerics if that's all the site will allow, minimum # of upper case or lower case characters, minimum # of numerals, keyboard characters if allowed, minimum # of those to use. Or hex only, if required. Or only easy-to-read characters, e. g. not lower case "L" and numeral "1", because they are too easy to confuse.
Many more options and configurations to your taste. But the point is, you are
not dependent on any company, including the PWS developers. Once you set it up, you never need to visit their site. If they go out of business tomorrow, you're good for the rest of your life (barring some monstrous change in access to Fx login boxes, of course). Currently supports Windows 2000 through 7, in both 32 and 64 bits. And since I last looked, has been
ported to Linux.
No need to worry about database breaches like LastPass,
because they don't have your creds. YOU, and you alone, have them, in this small file that is always encrypted, and can live on your own hard drive, Flash drive, whatever. You need to remember only a single master password to open the "safe". Write it down or otherwise store it, in a *very* safe place -- not near your computer, please! -- in case you ever forget it. With a proper, strong master PW, no one else can ever open it. I doubt NSA could (at least, *mathematically*

). I'll send mine to anyone who wants to try.
According to
Steve Gibosn's brute-force analyzer, the total number of possibilities for my own master pw is
4.93 x 10^27.
Time Required to Exhaustively Search this Password's Space:
Online Attack Scenario:
(Assuming one thousand guesses per second) 1.57 thousand trillion centuries
Offline Fast Attack Scenario:
(Assuming one hundred billion guesses per second) 15.67 million centuries
Massive Cracking Array Scenario: (NSA or other Gov? - Tom T.)
(Assuming one hundred trillion guesses per second) 15.67 thousand centuries
I have used this for several years, wouldn't live without it, and wouldn't consider anything else.
DISCLAIMER: The above is my own personal opinion, based on my own experience and research, and does not represent the views of, or endorsement by, this forum, its Admin/Developer, or any other person but myself. I have no personal or financial connection to Password Safe, and it's freeware, anyway. However, because I cannot control the product itself, nor how you use it, I cannot accept any responsibility or liability for your use of it, nor for any consequences of your use of it. IF YOU DO NOT ACCEPT THESE TERMS, DO NOT CONSIDER, HEED, OR USE THIS OPINION.
Nikilet wrote:What you referred me to about Surrogate Scripts ... Well, the truth is I just didn't really understand it. I got the concept behind it but after reading the page, I still wouldn't know what I need to do.
Nothing. That's the beauty of it. Just leave all unwanted scripts blocked by default, as the entire universe is when you first install NS. Mark the pesky, frequent ones as Untrusted, to shorten the length of the menu considerably, and not be bothered by ever seeing them again. NS will automatically run the surrogate for you, making the page happy while sending no actual information to the data-miners and ad agencies.
The only time you would need to do something is if for some reason you want to allow one of the real scripts to run at some site. You do just as before: click Temp-Allow in the menu, or if it's in Untrusted, point to Untrusted, then click the one(s) you want to TA. But why? -- when the page is happy?