dcsimg
Login | Register   
RSS Feed
Download our iPhone app
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX

By submitting your information, you agree that devx.com may send you DevX offers via email, phone and text message, as well as email offers about other products and services that DevX believes may be of interest to you. DevX will process your information in accordance with the Quinstreet Privacy Policy.


advertisement

More articles by Eric Budke

Author Bio
Eric Budke, CISSP, is a principal consultant at Foundstone, Inc., a computer security training and consulting company. He specializes in performing firewall, Unix, and e-commerce related assessments and penetration studies. He has spent time as a security consultant at a Big 5 firm, a system and network engineer at an interactive services shop, and a systems engineer at a major ISP. He also edits the slightly off-beat SecurityBeat.com.
For Security Zone | February 10, 2003
The majority of machines use regular password authentication, making password cracking an easy means for an attacker to gain access to systems—without using any fancy exploits.
Sitemap
×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.
Thanks for your registration, follow us on our social networks to keep up-to-date