Do you think the system administrator has access to a program that can decode user passwords? Why or why not? (See exercise 6.)

What will be an ideal response?


Normally, the system administrator cannot decode user passwords. The
administrator can assign a new password to a user. Passwords are generally

encrypted by a one-way hash so the system can tell when the correct pass-
word is entered, but it cannot regenerate the cleartext password. The system

applies the hash algorithm to the entered password and checks whether the
result matches the stored, encrypted password. A match means the correct
password was entered.
However, if a user has a weak password, the system administrator can use
a program such as crack or John the Ripper to decode a password. You can
download either of these utilities using the tools described in Appendix C.
The packages are named crack and john.

Computer Science & Information Technology

You might also like to view...

A protocol is a set of rules for communication between devices that determine how data is formatted, transmitted, received, and acknowledged

Indicate whether the statement is true or false

Computer Science & Information Technology

A riser board contains

A) Risen, a nonconductive plastic found only in riser boards B) Tall chips unable to fit on a motherboard because of their height C) Expansion slots into which adapter cards can be placed D) A plug that fits into the electrical socket on the wall

Computer Science & Information Technology

In a deep copy, two or more pointers have their own data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The credit or debit card provided during the account creation process is charged $1.50, because federal law allows a card to verify parental consent only if charged.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology