Comments
  1. You must read the article before you can comment on it.
    • jbuchana4 years ago

      At a company I used to work at, part of my job was to scan the database that held all our passwords, then make users change the really weak ones. The database was encrypted (technically "hashed") and I used two programs, "crack" and "john the ripper" to look for the weak passwords. It's amazing how some of the really hard looking ones were cracked in minutes or hours.

    • TripleG
      Top reader this weekTop reader of all timeReading streakScoutScribe
      4 years ago

      It seems that any company or institution can be hacked by scammers and many have already been hacked! I love the voice recognition verification ,simple as talk and text.