TechTutorials - Free Computer Tutorials  







Authentication and Password Security Tutorials






Tutorials (29)

Total Tutorials: 6572  |  Added today: 0 Tutorials updated: 09/15/2018



Sort Tutorials By:


Access Controls: What is it and how can it be undermined?
 
We have stoplights on city streets, and locks on the doors of our homes. What these things have in common is that they are access controls. The world of computer security is very much the same in that it employs various ways to limit access. In this article we will cover several ones and discuss their usage.
Added: 12/15/2005, Hits: 1,932, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Access List Evaluation Rules
 
The rules in access list are compared in a special sequence from top to bottom one by one. Where the rule matches to any of the condition the comparison is stopped and the process is carried out. The
Added: 03/17/2011, Hits: 1,433, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Authentication is changing: passwords have become yesterday's access control
 
In this article the author will cover steps that you can take to help keep your personal and corporate data secure and private, using the latest in 2FA (two factor authentication).
Added: 01/06/2012, Hits: 682, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Authentication TechNotes
 
Covers username/password, CHAP, certificates, Kerberos, mutual, multi-factor, biometrics, tokens, and smartcards authentication.
Added: 11/15/2003, Hits: 972, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Authentication, the Forgotten, Should-be Predominant
 
Using the familiar Alice and Bob model, we'll take a look at the concept of integrity preservation, through the use of a MAC, or Message Authentication Code. This article will define what it is, what it does, and why it's vital in the majority of cases, although often overlooked in most of them.
Added: 02/03/2006, Hits: 928, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Authentication: The Next Frontier
 
Understanding Authentication.
Added: 09/12/2007, Hits: 910, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Biometrics - a problem or a solution?
 
Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these are technical, and possess technical solutions, however difficult they may be to implement, others are social and cultural.
Added: 03/13/2003, Hits: 728, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Biometrics and You
 
The world of computer security has spawned yet another way to help secure one’s computer assets. That would be the still maturing area that is biometrics. Just what are biometrics anyway, and are they really being adopted by the mainstream? Read on to find out.
Added: 12/09/2005, Hits: 824, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Changing Passwords for Key User Accounts
 
I must warn all readers that this article is direct and aimed to make you feel a bit uncomfortable. The goal is to expose a few vulnerabilities in your network, so that they can be fixed. However, my experience and research has proven that most companies fall into the same bucket when it comes to these vulnerabilities.
Added: 10/14/2005, Hits: 940, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Claims Based Identity: What does it Mean to You? (Part 1)
 
This article series explores the identity management dilemma by addressing some of the more specific implementation of identity technologies.
Added: 10/12/2012, Hits: 682, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Data Leakage Prevention
 
In this article the author will venture into the world of Data Leakage Protection, and describe how to use this technology to better protect corporate data on personal and corporate devices.
Added: 09/23/2011, Hits: 1,119, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Determining Whether an in House or an External Certificate Authority is More Appropriate for Your Company
 
With security becoming such a huge priority for companies over the last few years, many administrators who might have never thought twice about digital certificates are suddenly finding themselves in situations that require issuing various types of certificates. In this article, I will explain some of the benefits and some of the drawbacks of internal and external certificate authorities, in an effort to help you to make an intelligent decision as to what is right for your network.
Added: 01/12/2006, Hits: 849, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

How to use Kerberos Authentication in a Mixed (Windows and UNIX) Environment
 
Kerberos is the protocol of choice for mixed network environments. This article explains how to use Kerberos authentication in these mixed environments.
Added: 04/21/2006, Hits: 930, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Identity (Management) Crisis (Part 1): The evolution of identity concepts
 
In this article we'll take a look at how the concept of identity has evolved – particularly in the legal and technological realms.
Added: 01/20/2012, Hits: 649, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Identity (Management) Crisis (Part 2): Everything you (think you) know is wrong
 
This article discusses how your identity is much more than just a set of credentials and why protecting your credentials is an important part of operating securely online.
Added: 02/03/2012, Hits: 674, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Identity (Management) Crisis (Part 3): Solving the Identity Problem
 
In this, Part 3, we’re going to begin the discussion about some current identity management solutions as well as new ways to implement old methods of verifying identity.
Added: 02/17/2012, Hits: 565, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Identity (Management) Crisis (Part 4): Selecting a Comprehensive Identity Management solution
 
In this, Part 4, we’ll look more closely at the criteria for choosing a comprehensive identity management solution for an organization or a federated identity management solution.
Added: 03/30/2012, Hits: 681, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

More on Running Windows Under Non-Admin Accounts
 
This article is a follow up to my previous article on WindowsNetworking.com titled "Running Windows Under Non-Admin Accounts" and shares some comments from readers concerning issues they've found and solutions they've tried for limiting desktop computer users to non-admin accounts. The article also provides some additional workarounds for performing admin-level tasks while logged on to a computer using ordinary user credentials.
Added: 03/09/2006, Hits: 983, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Password Protection
 
Do you protect your passwords as much as your data? If you don't keep your passwords safe, then you might as well not have any. Unfortunately many people are guilty of gross negligence when it comes to passwords. Too many people carry paper scraps with passwords around, use insecure passwords, and don't pay attention to where their passwords are going. PC911 helps you choose secure passwords, keep them safe, and make sure they cannot fall into the wrong hands.
Added: 07/04/2003, Hits: 802, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Passwords: the Weak Link in Network Security
 
In this article, we will discuss how passwords work, why and how passwords are vulnerable, how to create more secure passwords, how to create effective password policies, and some alternatives to password-only authentication for high security environments.
Added: 06/09/2004, Hits: 847, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating
Page:  1 2   Items Per Page:







7 Seconds Resources, Inc.




IT Showcase