Word: passwords
(lookup in dictionary)
(lookup stats)
Dates: during 1990-1999
Sort By: most recent first
(reverse)
Right now, passwords travel unencoded acrossthe wires, and any knowledgeable user can view thenon-encrypted password. Kerberos would guaranteethat the passwords traveling over the network werescrambled...
...sign that HASCS has become moresecurity-conscious under Steen is hisestablishment of a policy that undergraduates maynot have the root password, which enables itsholder to view everyone's files and email...
...outsiders. There will always be the threat of government officials with security clearance who decide to betray their country and download intelligence files. Yet terminals inside Langley are routinely audited for suspicious activity, such as an unusual number of log-ins after hours or repeated failures to have a password accepted, usually symptomatic of a hacker testing out a host of computer-generated passwords. During their first polygraph, job applicants are now asked if they've ever tried hacking. The agency will also stage "red-team" exercises, during which computer experts try to hack the system from terminals...
...Defense Systems Network, which has its own lines or leases special lines from phone companies to send encrypted messages. To penetrate that system, a hacker would first have to wiretap a dsnet line, then break the sophisticated encryption of its messages, as well as steal another user's password to get past the main menu...
...contractors who on a lark have tried to hack parts of the agency's computer system that are closed off to them. A hacker from Canada almost daily tries to break past the CIA's Internet link to get to the agency's secret files. He once used the password "Clinton," thinking that would give him access to any secret. It didn't. "We know who he is," a CIA official said with a smile. "But there's no damage he can do because there's nothing on the other side of that Internet link" with the agency...