You've built the hardware, installed the software and cracked some passwords. Now find out how to fine-tune your attacks. In the first two parts of this series, I ...