They do not seek advice from any roll-your-have authentication protocols you could have designed employing login internet pages, and so on. I will use "login" to make reference to authentication and authorization by techniques other than RFC2617 They can use spy ware and infostealers to harvest passwords or trick customers http://pigpgs.com