Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

ACKNOWLEDGEMENT

I express my sincere gratitude to Mr.Venugopal sir, my guide and Head of the department, Dept of Computer Hardware and maintenance for all his help in presenting this seminar. I express my hearfelt gratitude to all the other staff members of Dept of CHM for their valuable advice and guidance in presenting this seminar. Also I express my gratitude to my friends for all their help and cooperation Finally I express my sincere gratitude to my parents for their valuable encouragement and also for their being a source of inspiration.

ALLWIN TINTO.J

ABSTRACT

Users stereotypes such as

nowadays textual

are

provided

with

major

password tokens

passwords,

biometric

scanning,

or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.

CONTENTS
1. INTRODUCTION 2. EXISTING SYSTEM 3. PROPOSED SYSTEM 4. BRIEF DESCRIPTION OF SYSTEM 5. SYSTEM IMPLIMENTATION 6. 3D PASSWORD SELECTION AND INPUT 7. 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES 8. 3D PASSWORD APPLICATION
9. SECURITY ANALYSIS

10. CONCLUSION 11. REFERENCES

You might also like