Access to
computer and network resources depends on user name and
password. For old edition operating system, protection for
ID information provided by some components doesn’t
process at the time when the information is tested. Thereby,
attacker can acquire valid user name and password, and of
course has the same popedom with actual user. Now
attacker can