Passwords - Attacks via Audit Trail: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
(No difference)
|
Latest revision as of 23:04, 8 November 2004
A record showing who has accessed a computer system and what operations he or she has performed during a given period of time.
This attack was possible on early unix systems, where all log files were readable for anyone.
Back (Attacks on Password Storage) | Table of Contents | Next (One-Way Encryption)