There are many security protocol were designed to support client’s secure login to specific server. Normally, login name and password were sent to server. Computer server search user’s login name and password table on received user’s sending. If it is found in table then server permit client to access computer resource, otherwise server should ask for the correct new ones.