In their purest form, netbooks are PCs designed to have little or no software stored on them. Instead, they are designed to use cloud computing, in which the software and data are both stored on Internet servers. Netbooks in this pure form can only work when they have an Internet connection. Based on what you learned in this chapter, discuss security implications for netbooks, both pros and cons? What password-cracking method would be used for each of the following password: (a) swordfish, (b) Lt6^, (c) Processing1, and (d) nitt4aGm^? Critique the safety of each of the following passwords, giving your specific reasoning: (a) swordfish, (b) Lt6^, (c) Processing1, and (d) nitt4aGm^.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here