Translation Part - 1

Author: up4abeer

Date: May 7, 2007

by up4abeer
5-07-07
An evaluation of your digital infrastructure revealed inadequate encryption algorithms deployed for encapsulation and transmission of authentication data.
He watched your network traffic and read your passwords like they were written on the wall of a public restroom
The severity of this vulnerability is heightened due to the simplistic key space used in hash creation with regard to authentication data complexity policies. Resulting in financial loss.