Weak passwords do not mix these elements.
弱密码不混合使用这些元素。
Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.
很多计算机病毒、蠕虫和特洛伊木马的设计都利用了弱口令。
Are passwords randomly selected by the system, or can users select their own? If the latter, does the system check for common weak passwords such as?
密码是由系统随机选择的,还是用户可以自行选择密码?
However, we find that relatively weak passwords, about 20 bits or so, are sufficient to make brute-force attacks on a single account unrealistic so long as a “three strikes” type rule is in place.
然而,我们发现,长度约为20个字符左右、相对较“弱”的密码也已经能够使得针对单一账户的暴力破解变得不现实:只要有“三振出局”的规范即可。 (译者注:原文的“threestrikes”typerule 指的应该是连续三次输入错误密码就会暂时锁死账户,具体可参考此处。)
Passwords that are too weak of course invite brute-force attacks.
当然了,弱密码的确容易招致暴力破解攻击。
In addition, many widely used authentication mechanisms are weak. For example, usernames and passwords for authentication are weak due to.
此外,许多广泛使用的身份验证机制是很薄弱的。
In addition, many widely used authentication mechanisms are weak. For example, usernames and passwords for authentication are weak due to.
此外,许多广泛使用的身份验证机制是很薄弱的。
应用推荐