Make your online browsing experience a pleasant one Each month or as needed simply……


Each month or as needed simply clear your browsers cache so that what you see is truly what you see and that you are not instead seeing “stale” data. The internet uses various techniques to speedily present data to users such as the caching via content data networks (CDN) and the caching done via the use of the users local computer.  Thus, often times you will see stale (non-current) data so manually habituating clearing your own cache will make your viewing experience more pleasing and reliable. Here are a few guides on how to do so on various browsers.


Lusquan is not just “another” online shop, but rather it integrates with other services and tools that when taken as a whole make up a digital Eco-system that offers a range of online services and platforms. Inevitably, once you are familiar with the various parts you may find yourself frequenting them from time to time.
Many of the other services often require some form of username and password to gain access to.  As such it makes for wise user online experience that everyone puts in a little effort and thought into the management of their passwords  and usernames.
We have done our best to provide tools to ensure that your management of passwords and usernames is made easy but the bottom line still boils down to YOU the user putting in some due diligence. Probably the first step (like in all things) in order to exercise any form of due diligence is ‘knowledge’ as the more you know the more you understand and the more you understand then the more likely you are to habituate what you know should be done.
Thus, here are the basics of what you need to know about Passwords and their management so that your online experience (not only on Lusquan and its various related parts) in general is both private and peaceful.


User authentication is the most common way that User accounts on web sites, and hosted services are protected from unauthorized access. Thus, briefly:  Users are given a unique user ID for online accounts normally in the form of a username or email address and a password/passphrase etc.. These combined bits of information must be provided, checked, and verified before the user can access the online account.
The earliest attacks were referred to as dictionary attacks. They used words from the dictionary. This is why “never” use a dictionary word on choosing a strong password.
The constructors who write the dictionary attack software are fully aware of the sort of variations users may chose to use when creating passwords thus, they developed a new technique that tries each word from the list, many times that include with each attempt, some digits being added to the end of the word.
Additionally, because they realized that people use the name of their children or significant other as passwords the dictionary lists were expanded to include male and female names….so avoid (like you would the plague) doing this.


Passwords should be robust, unique, and unrelated to anything that could be discovered or deduced about you such as children’s names. Combined passphrases are better than passwords. Three or more unrelated words joined/inter-placed by some punctuation or special character is a very strong template for a password. Simply use our freely provided password management tools found on the left hand menu of our social networking site  (included in both free and members sites) to create as well as make/generate complex passwords and safeguard your password(s) then cross check its strength with our (or any online equivalent for that matter) PassWord Checker utility as we have gone the extra mile to provide the tools you need to ensure a more secure online experience.
  • A focus-written software package which takes one word at a time from a list of dictionary words, and tries them as the password against the account under attack. Often transformations are applied to the dictionary words such as adding digits to them and substituting digits for letters.
  • A dedicated, purpose-written software package generates all combinations of letters, numbers, and other characters such as punctuation and symbols, in progressively longer strings.
  • The use of software to generate strings of characters that is hoped will match a user’s key for an Application Programming Interface.
  • A word list that contain actual passwords. Automated software reads a password at a time from a huge list of passwords collected from data breaches
  • The transformations used emulate commonly used password tricks such as substituting vowels for digits.

Yes! They may want your data but why lay back and hand it to him? Prevention goes a long way so procure your sanity from actions of stealth.