Subscribe to the RSA blogs and podcasts for the latest posts and security updates!
Written on October 9, 2012 by Identity and Data Protection Beat
The best thing in this system is that it parts passwords in a few and stores every half in unexpected areas. The several parts never meet up, yet when an individual logs in and has his secret word verified. That may as well make it harder for somebody to steal them, for the reason that a criminal could should break into both these servers, which could be secured in contrasting ways.
Mail (will not be published) (required)
© Copyright 2011 EMC Corporation. All Rights Reserved.
The opinions expressed here may be personal. Content published here is not read or approved in advance by EMC
and does not necessarily reflect the views and opinions of EMC.