Within the aftermath of the RockYou attack, security researchers, each commercial and tutorial, did in depth research on the published passwords and compiled lists of the mostly used passwords and found out the recurring algorithms that folks had. http://Lexingtonhealthinc.com/__media__/js/netsoltrademark.php?d=xn--6-twf5eb8bf7C8b8ae3j.com