Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.
2
不法分子利用部分用户贪图方便设置弱口令的漏洞,对银行卡密码进行破解。
Illegal element USES partial user covet to go to the lavatory the flaw that installs weak countersign, to the bank card password undertakes defeating solving.