hi blacknight, There can be many other weaknesses in such software. For example, some software use your password: - as an input to derive the...
Separate names with a comma.