A Survey on Password Attack Resist Tools
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Passwords are the key to all digital secrets. Passwords remain the most widely used authentication method despite their well-known security weaknesses. Text password is the most popular form of user authentication on websites due to its convenience and simplicity. Text passwords are not always strong enough and are very easily stolen and changed under different vulnerabilities. Intruders can easily acquire a text password when a person creates a weak password or a password that is completely reused in many sites. The hacking of just one password can then lead to the loss of security of all websites to which he/she gains access through that password. Another risky environment is when a person enters his/her password in a computer that is not trust-worthy. This paper gives a review on different methods that were introduced for safeguarding of password on a network.
Authors and Affiliations
Meenu Alex, Neena Alex
Confident Multi-Owner File Partaking For Vibrant Units in the Cloud
Cloud computing is an evolving computing archetype in which resources of the computing infrastructure are delivered as services above the Internet. As auspicious as it is, this archetype also conveys forth many new d...
VHDL Implementation of Reed Solomon Improved Encoding Algorithm
The effective Reed Solomon encoder design is based on the improved algorithm widely used in wireless communication system. Taking RS encoder in Digital Video Broadcasting system, we introduce the structure of RS enco...
Multi bit Retention Flip-Flop For Zigbee SoC’s
Zigee-SoC is a wireless sensor network which integrates all the components of the Zigbee device in a single chip. Zigbee SoC gives assistance to a number of power modes including standby mode. This standby mode exten...
Efficient Data Gathering with Mobile Collectors and Space-DMA Technique in Wireless Sensor Networks
Now a day’s efficient data gathering scheme in wireless sensor networks is has got more attention towards the research and development. This issue is taken care by using adopting mobility and Space Division Multiple...
An Efficient and Effective Ranking On Spatial Data By Quality Preferences
A spatial database is database that is optimized to gather and query the information that is linked to objects in space and a spatial preference query objects are based on the qualities of their spatial area. A huge...