Bell, take a peek at that brute force time estimate calculator I linked up above. I know you'd just have to trust it for now since it's a black box, but seriously, it'll help illustrate what towlie is saying. As a simple, quick example: Suppose I set up a 5 character password, check all the boxes for uppercase, numbers, punctuation, etc., and set the speed to 2,000,000 passwords checked per second. That ends up taking only 68 minutes. Now, go to a password only 6 characters long, but only check the lower and upper case letters boxes. It's using far fewer characters -only letters and their capitals - but it's more than doubling the time required to break it (165 minutes).
Thanks, clear to me now
But where does when one stop with the password length? 16? 17? 18? ...
All dirty jokes aside: Length is better than complexity.
But the longer it is, the longer it takes to get a satisfying result.
Where I work, you can have over one hundred characters for our centralized authentication system, but I guarantee you nobody's got one that long. Mine is pretty abysmally long (well over 20+; don't want to give too much away), but I work in a place where a breach could potentially enable violations of US government