equal
deleted
inserted
replaced
33 against such cheats. |
33 against such cheats. |
34 |
34 |
35 \item Explain what hashes and salts are. Describe how they can be used |
35 \item Explain what hashes and salts are. Describe how they can be used |
36 for ensuring data integrity and storing password information. |
36 for ensuring data integrity and storing password information. |
37 |
37 |
|
38 \item What is the difference between a brute force attack and a |
|
39 dictionary attack on passwords? |
|
40 |
38 \item What are good uses of cookies (that is browser cookies)? |
41 \item What are good uses of cookies (that is browser cookies)? |
39 |
42 |
40 \item Why is making bank customers liable for financial fraud a bad |
43 \item Why is making bank customers liable for financial fraud a bad |
41 design choice for credit card payments? |
44 design choice for credit card payments? |
42 |
45 |