home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page105.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  94KB  |  817x1045  |  8-bit (256 colors)
Labels: chat room | computer | crt screen | hakham | laptop | monitor
OCR: COMPUTERS AND DIGITAL BASICS The brute force attack also uses password-cracking software, but its range is much more extensive than the dictionary attack. Because exhausts all possible combinat tions of letters to decrypt a password, brute force attack can run for days or even as long as week to crack some passwords If hackers can't guess password, they can use another technique called sniffing. which intercepts information sent out over computer networks. Sniffing software is used legitimately by network administrators to record network traffic for monitoring and maintenance purposes The same soft- ware can also be used for illicit activities. If your user ID and password travel over network as unencrypted text they can easily fall into the hands of password thief. An even more sophistica ...