David Chieu wrote:

> Darren Reed wrote:
> ...
>
>> How does it defend against being brute forced?
>
> I don't understand the question. Can you give an example of brute forced?


I use a dictionary as a source of usernames and passwords
and send correctly formatted data at the NIC (using a combination
of usernames and passwords) until it respods with a message
indicating a successful authentication attempt.

Darren


Reply via email to