Password File Access ControlOne way to thwart a password attack is to  terjemahan - Password File Access ControlOne way to thwart a password attack is to  Bahasa Indonesia Bagaimana mengatakan

Password File Access ControlOne way

Password File Access Control
One way to thwart a password attack is to deny the opponent access to the password
file. If the hashed password portion of the file is accessible only by a privileged user,
then the opponent cannot read it without already knowing the password of a privileged
user. Often, the hashed passwords are kept in a separate file from the user
IDs, referred to as a shadow password file . Special attention is paid to making the
shadow password file protected from unauthorized access. Although password file
protection is certainly worthwhile, there remain vulnerabilities:
• Many systems, including most UNIX systems, are susceptible to unanticipated
break-ins. A hacker may be able to exploit a software vulnerability in the
operating system to bypass the access control system long enough to extract
the password file. Alternatively, the hacker may find a weakness in the file
system or database management system that allows access to the file.
• An accident of protection might render the password file readable, thus compromising
all the accounts.
• Some of the users have accounts on other machines in other protection
domains, and they use the same password. Thus, if the passwords could
be read by anyone on one machine, a machine in another location might be
compromised.
• A lack of or weakness in physical security may provide opportunities for a
hacker. Sometimes there is a backup to the password file on an emergency
repair disk or archival disk. Access to this backup enables the attacker to read
the password file. Alternatively, a user may boot from a disk running another
operating system such as Linux and access the file from this OS.
• Instead of capturing the system password file, another approach to collecting
user IDs and passwords is through sniffing network traffic.
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
Password File Access ControlOne way to thwart a password attack is to deny the opponent access to the passwordfile. If the hashed password portion of the file is accessible only by a privileged user,then the opponent cannot read it without already knowing the password of a privilegeduser. Often, the hashed passwords are kept in a separate file from the userIDs, referred to as a shadow password file . Special attention is paid to making theshadow password file protected from unauthorized access. Although password fileprotection is certainly worthwhile, there remain vulnerabilities:• Many systems, including most UNIX systems, are susceptible to unanticipatedbreak-ins. A hacker may be able to exploit a software vulnerability in theoperating system to bypass the access control system long enough to extractthe password file. Alternatively, the hacker may find a weakness in the filesystem or database management system that allows access to the file.• An accident of protection might render the password file readable, thus compromisingall the accounts.• Some of the users have accounts on other machines in other protectiondomains, and they use the same password. Thus, if the passwords couldbe read by anyone on one machine, a machine in another location might becompromised.• A lack of or weakness in physical security may provide opportunities for ahacker. Sometimes there is a backup to the password file on an emergencyrepair disk or archival disk. Access to this backup enables the attacker to readthe password file. Alternatively, a user may boot from a disk running anotheroperating system such as Linux and access the file from this OS.• Instead of capturing the system password file, another approach to collectinguser IDs and passwords is through sniffing network traffic.
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
Password File Access Control
One way to thwart a password attack is to deny the opponent access to the password
file. If the hashed password portion of the file is accessible only by a privileged user,
then the opponent cannot read it without already knowing the password of a privileged
user. Often, the hashed passwords are kept in a separate file from the user
IDs, referred to as a shadow password file . Special attention is paid to making the
shadow password file protected from unauthorized access. Although password file
protection is certainly worthwhile, there remain vulnerabilities:
• Many systems, including most UNIX systems, are susceptible to unanticipated
break-ins. A hacker may be able to exploit a software vulnerability in the
operating system to bypass the access control system long enough to extract
the password file. Alternatively, the hacker may find a weakness in the file
system or database management system that allows access to the file.
• An accident of protection might render the password file readable, thus compromising
all the accounts.
• Some of the users have accounts on other machines in other protection
domains, and they use the same password. Thus, if the passwords could
be read by anyone on one machine, a machine in another location might be
compromised.
• A lack of or weakness in physical security may provide opportunities for a
hacker. Sometimes there is a backup to the password file on an emergency
repair disk or archival disk. Access to this backup enables the attacker to read
the password file. Alternatively, a user may boot from a disk running another
operating system such as Linux and access the file from this OS.
• Instead of capturing the system password file, another approach to collecting
user IDs and passwords is through sniffing network traffic.
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2024 I Love Translation. All reserved.

E-mail: