We will be attempting to design and run an effective defense against hacking tools such as dictionary attacks and brute force attacks.  Dictionary attacks attempt to match every word in a dictionary to the hash in the system32 file until it gets the password.  Brute force attacks are similar to dictionary attacks, except it uses every letter, number, and special character combination possible.  We will first learn how they work, try to find copies of the source code, and try to find weaknesses in the code.