So, instead, we used a brute-force algorithm. |
DaveGrohl will begin trying to brute-force the password. |
Fundamental algorithmic strategies: brute-force, greedy, divide and conquer, recursive backtracking. |
Both WEP and WPA-PSK use a key that is susceptible to offline brute-force dictionary attacks. |
The viettan.org server also experienced numerous attempts of unauthorized entry and brute-force password cracking of internal email accounts. |
Brute-force network attacks are harder to deal with. |