2Passwords
One of software’s most crucial tasks is the protection of passwords. That may be surprising. After all, aren’t passwords part of systems that provide protection? Don’t passwords secure our accounts with banks, web retailers, and online games?
The truth is, while passwords are the keystones of computer security, they can become the targets of attacks. If a remote computer accepts your identity based on your password, a process known as authentication, it must have a list of user passwords to compare against. That password list is a tempting target for attackers. Recent years have seen a number of large-scale thefts of customer account ...
Get How Software Works now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.