Blackberry not validating email password
Some better known cryptographic hash functions include file signature algorithm to establish unique numeric identifiers (hash values) for known files and compares those known hash values against the hash values of files, such as files on a seized computer system. While still considered safe at the time, in 2008 a more severe weakness was discovered.
For example, Twitter allows any password not in a list of about 400 common ones (such as “”).
There is a list of 106 passwords Blackberry forbids.
Also, an organization can track how often a given password is used, and add them to the list if too many users try to use it.
On many systems, you use arguments to the pam_PAM module to force very strong passwords, disallow (or allow) null (no) passwords.
You can even prevent users from reusing their last few passwords.(something you are), and various security devices such as smart cards and dongles (something you have).