Describe the dictionary attack and how it can be avoided.

What will be an ideal response?


A common attack frequently used against Linux systems is called a dictionary attack. This type of attack uses a password-cracking program that identifies passwords by simply trying one word after another from a dictionary file, including some common variations of these words. With today's computing power, a simple password can be cracked within minutes.
Therefore, a password should never be a word which could be found in a dictionary. A good, secure password should always be at least eight characters long and contain numbers along with uppercase characters.

Computer Science & Information Technology

You might also like to view...

The transform that distorts an object’s shape horizontally or vertically is known as a:

a) TranslateTransform b) SkewTransform c) ScaleTransform d) none of the above

Computer Science & Information Technology

You can align text with the top of the page, center the text, distribute the text equally between the top and bottom margins (____), or align the text with the bottom of the page.

A. format B. justify C. expand D. collapse

Computer Science & Information Technology

Identify thepage-break-insideproperty that prevents printers from inserting a page break.?

A. ?page-break-inside: always; B. ?page-break-inside: type; C. ?page-break-insert: avoid; D. ?page-break-insert: type;

Computer Science & Information Technology

The continue statement terminates a loop and continues with the first statement after the loop.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology