Write a 2 -3 page paper on how one can use hash values to log into a system, crack a network, etc.

Be sure to explain how hash values are used and misused in a system. 

Cite your sources!!!!

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.