Sponsored by ComputerWeekly.com
Attackers are increasingly turning to human psychology and the study of password selection patterns among user groups to develop sophisticated techniques that can quickly and effectively recover passwords. Passwords are commonly protected by applying a one-way cryptographic algorithm that produces a hash of set length given any password as input. However, cryptography can only protect something to the point where the only feasible attack on the encrypted secret is to try to guess it. When it comes to passwords, guessing can be easy. Access >>>
Table of contents
- The password cracking toolbox
- The study of password selection patterns
- The proof-of-concept attack
Premium Content for Free.
More Premium Content Accessible For Free
No more excuses: VDI is ready!
There are a lot of reasons to avoid implementing VDI. Access this e-guide with advice from desktop virtualisation expert Brian Madden who directly ...
Taking stock of e-commerce systems
In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel ...
CW Europe - April 2015 Edition
With the datacentre industry a major consumer of non-renewable energy, it continues to come under fire from environmental campaigners and users to ...