Passwords - The Need for Trusted Path

From
Revision as of 10:19, 17 May 2006 by Jeschke (talk | contribs) (Reverted edit of 1147727895, changed back to last version by Schumann)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

- The machine itself could be compromised
- A program running in the background in a public terminal room
- Wide spread nowadays: false cash machines


Back (Eavesdropping) | Table of Contents | Next (Password Retry Counters)