Download now Free registration required
Hacking is so simple! Not only the operating system's loop holes offers opportunities to hackers but also the applications like Skype and Google Chrome developed for the operating systems are quite attractive to hackers. In this paper, the author presents the various ways in which the passwords like user account's passwords stored by the operating system or the passwords required by different applications are stored on the system and can be hacked by intended hackers. This paper presents in depth research of the password storage mechanisms implemented in various versions of Windows and various application software and can be exploited by hackers.
- Format: PDF
- Size: 1184.6 KB