Passwords - Attacks via Audit Trail: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
 
(No difference)

Latest revision as of 23:04, 8 November 2004

A record showing who has accessed a computer system and what operations he or she has performed during a given period of time.

This attack was possible on early unix systems, where all log files were readable for anyone.


Back (Attacks on Password Storage) | Table of Contents | Next (One-Way Encryption)