Figure 2
Figure 2: The password cracker uses a brute force attack.
Figure 2: The password cracker uses a brute force attack.