I already
did.
"
I had to deal with a server most of yesterday morning that had been brute forced on the RDP port. "
Fine I will rephrase, Brute forcing of passwords simply isn't a thing anymore and hasn't been for decades, with the obvious exception of random unsecured servers that the general public won't be accessing anyway.
Your argument is like saying everyone should wear asbestos fire suits because you know a guy who jumped in a volcano.
I'm not saying there's no need to have a long password on a server admin account, just that complex passwords for email, Facebook, shopping sites, etc are pointless and the sites simply ask for them because it's become "the way" due to the fear of brute forcing vastly outliving the threat of it.
I see you like to live dangerously.
It's not really living dangerously when the danger is negated, Yahoo's servers have been immune to brute force since before Playstation was a word. Filling passwords with random characters just makes them harder to remember and in many cases easier to break (if breaking them was a viable option).
Like I said, almost all hacking these days is done by acquiring passwords either using social engineering or malware/spyware. If an account is compromised due to a brute force attack that is 100% the fault of the two bit organisation who got brute forced, not the user who gave them more credit than they deserved.
I'm really glad that you know better and are educating everyone to use weak, easily hackable passwords. Nice one.
Random note, in my example ("purplefartpants" is just as secure as "AwEs0m3!") the one with the numbers/capitals/! is actually significantly weaker.