Wait, the LM hash sends passwords in clear text? That's just asking for trouble! A, C, and D are bad enough, but B is the real nail in the coffin. Time to put this dinosaur out of its misery.
Ah, the good ol' LM hash. A, C, and D are classic weaknesses. As for B, I hear the hackers like to have a little 'clear text' party over the network. Where's the fun in encrypting everything?
Haha, the LM hash is like a security Swiss cheese - full of holes! A, C, and D are spot on. As for B, I think I'll just stick my head in the sand on that one.
A, C, and D all seem to be correct weaknesses of LM hashes. I'm a bit unsure about B though. Aren't the hashes supposed to be encrypted when sent over the network?
Blair
3 months agoCurt
2 months agoKathrine
2 months agoDelila
2 months agoIzetta
3 months agoInocencia
1 months agoKiley
1 months agoFreeman
2 months agoBelen
2 months agoDeandrea
3 months agoLavonda
3 months agoEve
2 months agoKanisha
2 months agoIvette
3 months agoDoretha
3 months agoCraig
2 months agoElbert
2 months agoCarin
3 months agoBlair
3 months agoDortha
3 months agoIvette
4 months ago