How to deal with the authentication problem, Database Management System

Most computer systems authenticate users by asking them for the user name and password. However, the user names and passwords often can be guessed by hackers. Suggest an automated, preventive control mechanism to deal with the authentication problem.

Posted Date: 4/6/2013 5:19:39 AM | Location : United States







Related Discussions:- How to deal with the authentication problem, Assignment Help, Ask Question on How to deal with the authentication problem, Get Answer, Expert's Help, How to deal with the authentication problem Discussions

Write discussion on How to deal with the authentication problem
Your posts are moderated
Related Questions
i need help for assignment ..

Using Literal Character String Example: To print IS A as one string with column name employee SELECT ENAME || ' IS A ' || JOB AS "EMPLOYEE" FROM EMP;

Control as State within Program 1.  The term control exactly means to check effect of input within a program. For illustration, in Figure, after the ATM card is inserted (a

What are the various states through which a transaction passes through in its lifetime?  Briefly discuss all the events that causes transition from one state to another.   Ans:

What is property - properties of a database ? It is an integrated collection of logically related records. It consolidates separate files into a common pool of data records and

What are the uses of ODBC? Under what circumstances we use this technology? ODBC expose database capabilities within a standardized way to the application programmer by an ap

What sorts of tables one can se in designing the hierarchy of a LDB? Tables, which are having Foreign Key relations.

What is Hierarchical DBMS In HDBMS, data is structured in a tree like manner. There is a parent-child relationship between data items and the data model is very suitable for re

The clause in SQL which specifies that the query result should be sorted in ascending or descending order based upon the values of one or much more columns is Ans : Order by

If the deletion violates referential integrity constraint, then three alternatives are available: Default option: - refuse the deletion. It is the job of the DBMS to describ