Brute-force was actually a game for PC released in 2000.So, what will be the solution, which policies are considered in choosing username and password and how can you defend against the loot of hackers are covered in this.-Brute-force attack is unavoidable in any environment where weak passwords are used to secure sensitive information.The aim was to find several other characters who were reliable to the union .common problem to website developers is password guessing attack known as Brute force attack.This research was carried out to develop a brute-force prevention system for cloud computing, Every user who is connected to the public computer network is the target of various attacks.The ad vantages and disadvantages of certain protective techniques are listed and it is indicated how this type of attack is the easiest to recognize.As there is no perfect protection, it is necessary to combine different protection techniques and educate users on how to protect their account, create the most secure password and use public network resources as securely as possible.There is also a problem with the website developers for choosing username and password.Some people are showing carelessness in choosing username and password.executed when the attacker has a list of possible passwords or has a hint of what the password might be. The problem with these kind of attacks is that they can be really time consuming and they can be noticed by the administrator, system administrator or by the user himself.Offline attacks, on the other hand, do not have any kind of limita tions regarding network or how many times the attacker may guess the password.