Access to computer and network resources depends on user name and password. For old edition operating system, protection for ID information provided by some components doesn’t process at the time when the information is tested. Thereby, attacker can acquire valid user name and password, and of course has the same popedom with actual user. Now attacker can