Wait, the LM hash sends passwords in clear text? That's just asking for trouble! A, C, and D are bad enough, but B is the real nail in the coffin. Time to put this dinosaur out of its misery.
Ah, the good ol' LM hash. A, C, and D are classic weaknesses. As for B, I hear the hackers like to have a little 'clear text' party over the network. Where's the fun in encrypting everything?
Haha, the LM hash is like a security Swiss cheese - full of holes! A, C, and D are spot on. As for B, I think I'll just stick my head in the sand on that one.
A, C, and D all seem to be correct weaknesses of LM hashes. I'm a bit unsure about B though. Aren't the hashes supposed to be encrypted when sent over the network?
Blair
1 months agoCurt
28 days agoKathrine
1 months agoDelila
1 months agoIzetta
2 months agoInocencia
5 days agoKiley
9 days agoFreeman
22 days agoBelen
1 months agoDeandrea
2 months agoLavonda
2 months agoEve
1 months agoKanisha
1 months agoIvette
2 months agoDoretha
2 months agoCraig
18 days agoElbert
24 days agoCarin
2 months agoBlair
2 months agoDortha
2 months agoIvette
2 months ago