computer cyber security information technologies password Understanding Rainbow Tables: How Hackers Crack Password Hashes (and How to Defend Yourself)