Hi,

I want to know if it is possible for someone to gain access to resources if
they capture a person's encrypted password.

For Eg:

Gmail uses https once the authentication process starts. This is basically
to ensure that if anyone is listening on the network he gets garbled text.
So if a person is able to emulate the session and send the encrypted
password with my user-id... will he gain access to my gmail account?

Regards,
Ashish
_______________________________________________
ILUGC Mailing List:
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc

Reply via email to