(Information security technology experiment - network attack and defense experiment 1 using L0phtCrack5 to crack passwords 2, secure password setting strategy 3, "Glacier" Trojan using graphic instructions, the steps are clear and specific.
Information security technology experiment - network attack and defense experiment.doc)