Word: unencrypted
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
Once connected, all the hacker has to do is take the password file and unencrypt it using a cracker program and a dictionary maker. With these programs in hand, the hacker can simply run them on the password file to get an unencrypted version of the password file...
| 1 |