The secret of how to hack password and Anticipation - Part 1. Introducing, Strengths and Weaknesses of Password

Password function for protection (protection) and is confidential. Thus, only those who know the password are able to open the data or to access the service. People can not arbitrarily open data or using a service because they have to know the password. Password contains sequences of characters that can contain some numbers, letters, and symbols.

Password authentication has been applied to a wide range of services. In banking, we all recognize the existence of an ATM (Automatic Teller Machine). ATM requires the ATM card holder Jebol Secret Password and anticipation to memorize and secret password that is usually just a number. Password is often referred to as Personal Identification Number (PIN).

On the Internet, many websites that require users to enter a user name (username) and password to access the service. Starting from the email, forums, data, web hosting, website news, and much more. Password associated with the computer, usually can use all the standard characters, which is a combination of some symbols, some letters, and numbers.
1.1 Example log into Google's email service (gmail.com)

In connection with the use of a computer, a password can be used to protect data and systems. Protected data can be a file, while the protected system can be an application program, the operating system, and the computer's BIOS.

1. Strengths and Weaknesses
Password is one way to authenticate. Is the authentication? The word is derived from the Greek word authentic. Password is intended that the user claims that he is a person who is entitled to use the services / data, can be authenticated by the system.

There are many ways that can be used to perform authentication. Can be broadly divided into three as follows.

• Factors knowledge.
Also called: something what you know. Only users who know certain information that can access data and services. This information is confidential and can be password, pass phrase, or PIN (Personal Identification Number).
• Factors ownership.
Also called: something what you have. Only users who have certain items that can access data and services. Of course, these items are unique and can not arbitrarily be imitated by others. Such items may include identification card (ID card), token, HP (Hand
Phone), and so on.
1.2 Token with trademark VeriSign
• Heredity.
Also called: something what you are. Only the users themselves who can access data and services. Authentication is done with the introduction of the characteristics of the user directly. Can use many methods, ranging from
voice recognition, fingerprint, retina of the eye, face recognition, and so forth. Jebol secret password and Anticipation
1.3 Fingerprint (fingerprint recognition) on the laptop.
1.1 Excess Password for Authentication
Password course is practical. Users only need to memorize the password code (what you know) without having to use a variety of additional tools.
Compare this with the introduction of biometric technology for user characteristics (what you are). Of course it takes a kind of fingerprint recognition technology, the retina of the hands, eyes, and many more.

1.2 Weaknesses Password for Authentication
In addition to practical advantages, the use of passwords also have drawbacks, mainly due to two factors:
• Carelessness Users
May occur if users are careless in arranging the password. Starting from choosing passwords easily guessed, passwords are not maintained properly so leaked, the user forgets his own password, or a password is used indiscriminately.
Example: Every time the password is typed, then at that moment that could happen password theft incident. Minor incidents such as your hand movements observed others while typing a password, can cause Your password is hacked.

• Weakness System
May occur if the system is quite weak and can break. That is, one not users but it is the system itself is weak.
Example: computer BIOS password. For users who know, BIOS passwords can be removed (reset) by moving a jumper on the motherboard.
SHARE

Milan Tomic

Hi. I’m Designer of Blog Magic. I’m CEO/Founder of ThemeXpose. I’m Creative Art Director, Web Designer, UI/UX Designer, Interaction Designer, Industrial Designer, Web Developer, Business Enthusiast, StartUp Enthusiast, Speaker, Writer and Photographer. Inspired to make things looks better.

  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment
    Facebook Comment

0 komentar:

Posting Komentar