STATEMENT OF THE PROBLEM
The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.
The choice of data encryption comes next in the minds of those that want reduction of unauthorized access on confidential files or data. Security provided by the computer operating systems come with a preset super user account and password. The super user may have a password to control network functionality, another to conduct or access nightly backups, create accounts, and so on. For a cracker, logging on to a system as the super user is possibly the best way to collect data or do damage. If the super user has not changed an operating system’s preprogrammed passwords, the network is vulnerable to attack. Most crackers know these passwords, and their first attempt to break into a network is simply to try them. If an attacker cannot log on as the super user, the next best thing might be to figure out the user name and password of a regular user. It is used to be standard practice in most Universities and colleges, and in some commercial companies, to assign every student or employee an account with user name and initial password – the password being the user name. Everyone was instructed to log on and change the password, but often, hackers and crackers logged on before legitimate users had a chance.
ABSTRACT
Climate variability has been one of the major issues of the 21st century. The idea is to understand the differences in the clima...
Abstract
There appears to be little doubt about the fact that frauds in banks are a matter of the great...
ABSTRACT
It has become inevitable that there would be communication and due to the inherent limitation of the human voice, the public add...
ABSTRACT
The research investigated the effects of scaffolding and scenario based teaching methods on the performance of NCEI students in...
ABSTRACT
The focus of this work is on the impact of using celebrities in television advertisement. Thus...
Background to the Study
Several groups have urged the government to revamp the country's tax system...
ABSTRACT: Early childhood education (ECE) significantly influences the dev...
ABSTRACT
The purpose of the research is to examine the shades of meaning that are associated with names and naming in Igala. The study ex...
ABSTRACT
Ficus kamerunensis is an epiphytic shrub or tree growing up to 20 m high. The plant used in ethnomedicine to treat microbial inf...
Background to the Study
According to Akintowa et al. (2009), more than 100 years ago, scientists discovered that many elements commonly f...