Doesn Windows 2000 solve password strength issues?
While Windows 2000 protects passwords better than native NT 4.0, it still has significant vulnerabilities and inflexibilities that are superiorly handled by Password Bouncer. In most cases, Win2K is still susceptible to “dictionary” and “brute force” attacks and other tricks of the hacker trade, which Password Bouncer can protect you from. Even if the Default Domain Policy for Password Complexity is enabled, it just requires that the password contain characters from any three of the following four lists: 0-9, A-Z, a-z, and/or from a list of special keyboard characters. It does not support positional numeric or special characters, restrict repeating sequences, nor handle palindrome (same characters forward and backward like “radar”) checks that can cut hacking time in half. For example, the password: 1RaDaR1 would pass WIN2K’s complexity criteria if minimum length is seven, but it would fail Password Bouncer’s criteria on potentially several optional rules. At the very least, it would f