... the passwordhe enters, and then compares the result to the encrypted password (the hash) contained in the password file; if the two match, he's given access. Because the passwords in the ... PREVENTING THE CON One of the most powerful tricks of the social engineer involves turning the tables. That's what you've seen in this chapter. The social engineer creates the problem, and then ... targeting theirinformation, belongs to the other sub-specialty, the social engineer. From the time of my bus-transfer trick, when I was too young to know therewas anything wrong with what I...