1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
13

Which of the following is the strongest password? Xo795&A &cGo9Tz F5h#3u9g vU7#$3T sC9$d&cF5h#3u9g

Computers and Technology
2 answers:
SVETLANKA909090 [29]3 years ago
7 0
SC9$d&cF5h#3u9g
because it's longest and contains most type of characters.
REY [17]3 years ago
6 0

Answer:

sC9$d&cF5h#3u9g

Explanation:

     The best passwords are resistant to brute force and dictionary attacks, but you can also make them easy to remember.

    Stay away from the obvious. Never use numbers or letters in sequence and never, never even use the word password. Create unique passwords that do not include any personal information, such as your name or date of birth. If you are specifically targeted for a password hijacking, the cybercriminal will try everything he knows about you in attempts to guess your password.

    Thinking about the nature of brute force attacks, you can avoid them as follows:

   Long passwords: This is the most important factor. If possible, do not use anything shorter than 15 characters.

   Use a mix of characters: The more you mix letters, numbers, and symbols, the stronger your password will be and the harder it will be for a brute force attack to figure it out.

   Avoid common overrides: Password crackers know all common overrides. Whether it's DOORBELL or D00R8377, anyone using a brute force attack will guess it just as easily. Random character placement is much more effective today than common leetspeak * substitutions.

   Do not use memorable keyboard paths: Just as we advised above not to use letter and number sequences, do not use keyboard paths (eg qwerty). They are among the first to be discovered.

You might be interested in
Make a program that prints each line of its input that mentions fred. (It shouldn’t do anything for other lines of input.) Does
Vitek1552 [10]

Answer:

See Explaination

Explanation:

This assume that input is a file and is given on command line. Please note this will ot print lines with frederick as thats what I feel question is asking for

#!/usr/bin/perl -w

open(FILE, $ARGV[0]) or die("Could not open the file $ARGV[0]");

while ($line = <FILE>){

if($line=~/\s+fred\s+/)

{

print $line;

}

}

close(FILE);

8 0
3 years ago
George enters the types of gases and the amount of gases emitted in two columns of an Excel sheet. Based on this data he creates
Alex777 [14]

Answer:

data source

Explanation:

The main aim of a data source is for the gathering of all necessary information that is needed to access a data. Since he has used the information to create a pie chart, this means that some data were used for the creation of this pie chart. Hence the information used for the creation of the pie chart is the data source for the information illustrated on the pie chart.

3 0
3 years ago
A(n) ____ , a type of idps that is similar to the nidps, reviews the log files generated by servers, network devices, and even o
kobusy [5.1K]
An LFM IDPS

Using an LFM which stands for log file monitor, the system is able to review log files generated by servers, network devices, and even other idpss. Its main purpose is to look for signatures and patterns which might indicate that an intrusion is in the pipeline or has already happened.
This intrusion detection is enhanced due to the fact that LFM is in a position to look at several log files from different systems.




8 0
3 years ago
My HTC Desire 510's mobile data stopped working, how to I make it work again?
denis-greek [22]
Ask your mobile operator
2.go to hrs service
3. Turn on and turn off
4 0
3 years ago
How to learn python ?
laila [671]

Answer:

https://www.python.org/about/gettingstarted/

Explanation:

its a site i used

7 0
3 years ago
Other questions:
  • Explaim Why the shape of a cell is hexagonal
    15·1 answer
  • Rachel is on her way to an interview for the position of a project manager. She is trying to prepare for this interview by analy
    6·1 answer
  • Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hur
    5·2 answers
  • Select the correct answer.
    14·2 answers
  • What is the name given a technological program that typically copies itself and moves through a computer system in order to disr
    10·1 answer
  • Hi need help on this <br> what is cyberspace
    14·1 answer
  • Match the following.
    8·1 answer
  • Someone please make a random question with an easy answer because i need one more brainliest to UPGRADE!
    7·2 answers
  • Raina remembered when she taught Amara to draw. What happened?
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!