Back to photostream

Rainbow Table

A rainbow table attack might bring in a myriad of pre-nominations and assumptions into the minds of my imaginative readers. Like everyone might know about me till now.

 

I am not someone fond of jumping to things right away so I would want to help my readers with a few cryptographic terms before I begin to blabber all about cyber attacks and bore my enthusiastic public.

 

We are all fond of browsing the internet and go through a variety of things over it daily.

 

What if you find one day that your roommate had secretly been snooping your data and sending it over to your girlfriend, dad and mom?

 

You would feel attacked and betrayed.

 

So is a Cyber Attack.

 

A deliberate attempt by someone is it an individual or an organization to snoop into your data for reasons that bring them to profit in any form be it financial or personal.

 

We log into a host of services on a daily basis starting from Gmail to our academic portals. Even I have logged into Tutorialcup to be able to deliver this article.

 

This makes all of us a possible prey or a source of data for a predator who might misuse us. There can be various types in which a hacker may try to break into passwords.

Terms

 

www.tutorialcup.com/interview/rainbow-table.htm

154 views
0 faves
0 comments
Uploaded on August 1, 2021