David Chieu wrote: > Darren Reed wrote: > ... > >> How does it defend against being brute forced? > > I don't understand the question. Can you give an example of brute forced?
I use a dictionary as a source of usernames and passwords and send correctly formatted data at the NIC (using a combination of usernames and passwords) until it respods with a message indicating a successful authentication attempt. Darren
