1.   Security assessments include checks on user passwords, file system, network set-up, end-user files and start-up parameters.

2.   User password with invalid syntax supplied to PI.

3.   Please supply a valid user password.

4.   Space filled user password supplied to PI.

5.   But other specialists say that once information is in a database, it is accessible to virtually anyone who has a user password and a little knowledge.

n. + password >>共 29
computer 36.11%
user 8.33%
module 5.56%
account 4.17%
default 4.17%
time 4.17%
transfer 4.17%
customer 2.78%
e-mail 2.78%
bank 1.39%
user + n. >>共 268
fee 12.50%
name 10.08%
interface 9.98%
group 6.98%
access 3.97%
input 2.81%
information 1.55%
act 1.45%
friendly 1.26%
tree 1.16%
password 0.58%
每页显示:    共 6