In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.The simplest example of a challenge-response protocol is password authentication, where the challenge is asking for the password and the valid response is the correct password.Clearly an adversary who can eavesdrop on a password authentication can then authenticate itself in the same way. One solution is to issue multiple passwords, each of them marked with an identifier. For instance, p1=pv4OAFx1Q2cQ, p2=DsYfX3Ke, and so on.
Posts about Challenge-Response
  • How to Rid Your Blog of Comment Spam

    … bulk messages sent electronically. Back in the olden days, when hobbits roamed the earth, plastering links indiscriminately in the comments sections of blogs was one way to help a website rank better in the search engines. Google eventually caught on to this little trick and began penalizing websites for using this particular tactic. Unfortunately…

    Chris Irby/ Dex Mediain SEO Google Blogging How To's- 23 readers -
Get the top posts daily into your mailbox!