很多计算机病毒、蠕虫和特洛伊木马的设计都利用了弱口令。
Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.
不法分子利用部分用户贪图方便设置弱口令的漏洞,对银行卡密码进行破解。
Illegal element USES partial user covet to go to the lavatory the flaw that installs weak countersign, to the bank card password undertakes defeating solving.
用默认用户ID(如db2admin)安装db 2UDB并使用弱口令(或者根本没有)可能将系统置于风险中。
Installing db2 UDB with the default user IDs (for example, db2admin) and providing a weak password (or none at all) can put your system at risk.
EKE协议是基于弱口令的密钥交换协议,通过使用对称密钥加密体制和公钥加密体制,能够很好地抵抗离线字典攻击。
EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.
EKE协议是基于弱口令的密钥交换协议,通过使用对称密钥加密体制和公钥加密体制,能够很好地抵抗离线字典攻击。
EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.
应用推荐