Suppose a user employs one-time or reusable passwords and that the password is transmitted slowly enough for the following scenario:
a. Describe how an eavesdropped can gain access to the remote server with a relatively modest number of guesses (Hint: The eavesdropped starts guessing after the original user has typed all but one character of the password.
b. To what other attacks might a user of one-time passwords be subject