Hello! They set a topic for RGZ on Information Security - You need to write a program that demonstrates the operation of the authentication method based on an unmounted password. What kind of method is this? Can you tell the sources to familiarize yourself with this method? Thank.
Your thoughts solved the problem as follows: 1. A window appears in front of the user, on which cells or figures with numerical content are located. 2. Cells contain numbers obtained randomly. 3. Next, the user, knowing the code combination, marks in the window with cells an area in which one of the code symbols, or the entire code, is contained. 4. The program reads the contents of the marked area, and you give the user, either permission to enter, or failure to identify.
I dare to suggest that this is a type of authorization in unix-like systems — when you enter a password, it is not displayed on the screen (even asterisks are not displayed). In fact, it looks something like this:
Login OK ...