Your password is now easier to crack than you think : comments.
| Sun | Mon | Tue | Wed | Thu | Fri | Sat |
|---|---|---|---|---|---|---|
|
1
|
2
|
3
|
||||
|
4
|
5
|
6
|
7
|
8
|
9
|
10
|
|
11
|
12
|
13 |
14
|
15
|
16
|
17
|
|
18
|
19
|
20
|
21
|
22
|
23
|
24
|
|
25
|
26
|
27
|
28
|
29
|
30
|
(no subject)
I mean, true it wouldn't work for login attempts that keep on changing usernames (unless you restricted by IP, but that is not practical for many uses), but I don't see those as being a problem as long as your number of users is sufficiently large.
(no subject)
(no subject)
How do they typically get it?
(no subject)
(no subject)
(no subject)
Second, you have to define "anyone". There are certainly holes that are unknown to the good guys, but known to the bad guys.
Also, going back to your earlier question, it's not always possible to limit the number of logins, depending on the protocol being used.