a. What are rainbow tables? b. How would rainbow tables reduce the time needed to crack a password? c. Would it be possible to create rainbow tables for all possible passwords with 1–20 characters? Would it be practical?
a. What do Trojan horse password capture programs do? b. Can antivirus software detect keystroke capture software? c. How would you detect a physical keylogger? d. What is shoulder surfing? e. Does the shoulder surfer have to read the entire password to be successful? Explain.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here