At a company I used to work at, part of my job was to scan the database that held all our passwords, then make users change the really weak ones. The database was encrypted (technically "hashed") and I used two programs, "crack" and "john the ripper" to look for the weak passwords. It's amazing how some of the really hard looking ones were cracked in minutes or hours.
It seems that any company or institution can be hacked by scammers and many have already been hacked! I love the voice recognition verification ,simple as talk and text.
At a company I used to work at, part of my job was to scan the database that held all our passwords, then make users change the really weak ones. The database was encrypted (technically "hashed") and I used two programs, "crack" and "john the ripper" to look for the weak passwords. It's amazing how some of the really hard looking ones were cracked in minutes or hours.
It seems that any company or institution can be hacked by scammers and many have already been hacked! I love the voice recognition verification ,simple as talk and text.