All that often stands between a malicious hacker and access to valuable, confidential data is a few keystrokes: an end-user’s or admin’s password. Yet even the most carefully crafted and well-guarded ...