The previous posts ( I, II, III, IV) focused primarily on remote login, either to multiuser systems or Web sites (though the same principles also apply to other networked services …
Source: LXer – A look at password security, Part V: Disk Encryption