Basic Computer Notions The Internet

Next Introduction Introduction  (cont'd) Introduction  (cont'd) Internet addresses Top-level domains Top-level domains (cont'd) Generic top-level domains Generic top-level domains (cont'd) Generic top-level domains (cont'd) Generic top-level domains (cont'd) Networks Usage World Wide Web World Wide Web  (cont'd) World Wide Web  (cont'd) World Wide Web  (cont'd) World Wide Web  (cont'd) What is it? Tips Tips (cont'd) Tips (cont'd) Software Secure connections What is it? Tips Tips (cont'd) Tips (cont'd) Tips (cont'd) Tips (cont'd) Tips (cont'd) FTP software FTP software (cont'd) FTP software (cont'd) FTP software (cont'd) FTP software (cont'd) Passwords Passwords (cont'd) 38 of 43 Passwords (cont'd) Passwords (cont'd) What are they? How to avoid them Virus-scanning software

Passwords (cont'd)

One method used to break into accounts is to systematically try all of the words in a dictionary or list of names as possible passwords for known usernames. (Some servers, but not all, will block multiple unsuccessful login attempts. Yahoo! mail server started doing so in 1999; Microsoft said there was no problem, but they'd do something about it (TCP 1999 April).)


Start Next
Bacon home page
R. Funnell

Last modified: Thu, 2007 Aug 16 17:50:54

Slide show generated from internet.html by Weasel 2007 Aug 16