password search attack

password search attack
Безопасность: перехват паролей

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Нужен реферат?

Смотреть что такое "password search attack" в других словарях:

  • Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… …   Wikipedia

  • Search for Tomorrow — Series title card from December 23, 1981 to February 25, 1986 Genre Soap opera Created by …   Wikipedia

  • Brute-force attack — The EFF s US$250,000 DES cracking machine contained over 1,800 custom chips and could brute force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted with 32 Deep Crack chips and some control chips. In… …   Wikipedia

  • Random password generator — A random password generator is software program or hardware device that takes input from a random or pseudo random number generator and automatically generates a password. Random passwords can be generated manually, using simple sources of… …   Wikipedia

  • Brute force attack — In cryptanalysis, a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example, possible keys in order to decrypt a message. In most schemes, the theoretical possibility of a brute… …   Wikipedia

  • Munged password — In computing, the term munge /ˈmʌndʒ/ means to attempt to create a strong, secure password through character substitution. Munge is sometimes backronymmed as Modify Until Not Guessed Easily. The usage differs significantly from Mung (Mash Until… …   Wikipedia

  • SHA hash functions — The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Contraseña — Utilización de una contraseña en Wikipedia. Una contraseña o clave (en inglés password) es una forma de autentificación que utiliza información secreta para controlar el acceso hacia algún recurso. La contraseña normalmente debe mantenerse en… …   Wikipedia Español

  • United States diplomatic cables leak — This article is about the release of leaked U.S. diplomatic cables by WikiLeaks. For the contents of those cables, see Contents of the United States diplomatic cables leak. For reactions to the leak, see Reactions to the United States diplomatic… …   Wikipedia

  • Doctor Who tie-in websites — The 2005 series revival of the long running British science fiction television programme Doctor Who features several tie in websites produced by the BBC website team that viewers can access on the Internet. Whilst none of the material in the… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»