Category:Book:End-user Computer Security/Book part/Main content/Chapters/«Passwords and digital keys», chapter 2