Ở đó bạn có thể tìm thấy một loại giá trị gia tăng các tính năng như e-tập tài liệu liên quan đến chủ đề của cuốn sách này, các URL của những trang web liên quan, câu hỏi thường gặp từ các cuốn sách, chỉnh sửa, và bất kỳ thông tin cập nhật từ các tác giả (s). | Passwords Chapter 2 35 If you aren t sure how to transpose the normal characters in a word to alternate characters that look similar you can use a tool like L33t-5p34K G3n3r@t0r available from a number of sites if you simply search for it on can also visit but the translations are not as consistently good as those created with L33t-5p34K G3n3r@t0r. If you can t come up with a good phrase or password on your own you can use a tool like the Secure Password Generator on the Web site security .The Secure Password Generator see Figure has check boxes to let you select the number of characters in your password whether to use uppercase letters numbers or punctuation and whether to allow a character to can also tell it to create up to 50 passwords at one time and then select the one you prefer from the list in case you are concerned that will know your password. Figure The Secure Password Generator Password Cracking Password-cracking utilities use three methods for attempting to break a password. The simplest and the fastest assuming that your password is a word that might be found in a dictionary is called the Dictionary Dictionary Attack tries every word in the dictionary until it finds the right one for the username trying to be accessed. 36 Chapter 2 Passwords The second method used to break passwords is called a Brute Force Brute Force Attack will try literally every possible combination sequentially until it finds the right combination to authenticate the username trying to be Brute Force Attack will attempt to use lowercase letters uppercase letters numbers and special characters until it eventually stumbles onto the correct password. The third method is called a Hybrid Attack. The Hybrid Attack combines the Dictionary Attack and the Brute Force Attack. Many users will choose a password that is in fact a .