STATEMENT OF THE PROBLEM
The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.
The choice of data encryption comes next in the minds of those that want reduction of unauthorized access on confidential files or data. Security provided by the computer operating systems come with a preset super user account and password. The super user may have a password to control network functionality, another to conduct or access nightly backups, create accounts, and so on. For a cracker, logging on to a system as the super user is possibly the best way to collect data or do damage. If the super user has not changed an operating system’s preprogrammed passwords, the network is vulnerable to attack. Most crackers know these passwords, and their first attempt to break into a network is simply to try them. If an attacker cannot log on as the super user, the next best thing might be to figure out the user name and password of a regular user. It is used to be standard practice in most Universities and colleges, and in some commercial companies, to assign every student or employee an account with user name and initial password – the password being the user name. Everyone was instructed to log on and change the password, but often, hackers and crackers logged on before legitimate users had a chance.
ABSTRACT
The main purpose of this research work was to review the impact of stress on academic achievem...
Abstract
Pay constitutes an integral part of the success of any organization. It motivates employees to...
Background of the Study
AI-powered chatbots have transformed customer service marketing by offering efficient, round-the...
Chapter One: Introduction
1.1 Background of the Study
The electoral system plays a critical role in shaping political leadershi...
Background of the Study
Fraud is a major concern in commercial organizations, often le...
Chapter One: Introduction
1.1 Background of the Study
Rural employment remains a significant challenge in many parts of Nigeria...
Background of study
Has technology transformed humankind into omniscient being? Years back, communication was done through difficult mean...
Background of the Study
The promotion of girl child education has been a critical issue in many parts of Nigeria, particula...
Background of the Study
The concept of smart cities involves integrating technology, data-driven solutions, and innovati...
Background to the Study
The trend and the volume are increasing on a daily basis and all levels of the society are invo...