TechTutorials - Free Computer Tutorials  

Authentication and Password Security Tutorials

Tutorials (29)

Total Tutorials: 6574  |  Added today: 0 Tutorials updated: 10/26/2018

Sort Tutorials By:

Protect Against Weak Authentication Protocols and Passwords
Did you know that your Windows computers store and send weak password hashes which are very easy to crack? Even if you run legacy operating systems, there are methods that you can implement that will protect against these weak authentication protocols and password hashes being generated.
Added: 11/02/2004, Hits: 780, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Remote Authentication: Different Types and Uses
Computer networks have arguably helped worker efficiency and helped a company’s bottom line. Well with that has come the need for workers to, at times, remotely log into the corporate network. This is ideally done via secure means. Within the confines of this article we will look at several of these methods.
Added: 12/23/2005, Hits: 561, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

The End of Passwords?
The end of passwords and how new technologies will keep enterprise information assets secure.
Added: 01/23/2009, Hits: 630, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

The Pros and Cons of Behavioral Based, Signature Based and Whitelist Based Security
Taking a look at multiple security approaches, how they operate, and the strengths and weaknesses of each, along with a brief discussion of sandboxing and virtualization as security mechanisms.
Added: 11/14/2008, Hits: 2,037, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

The Science of Host Based Security
Just a few years ago, the focus of enterprise security was primarily split between perimeter security and authentication controls. Security engineers spent their time mulling over firewall implementations, access rights, and the occasional implementation of encryption technologies. A new movement though has overtaken the industry as security breaches have become more and more common despite perimeter defenses, thus forcing enterprises to start reassessing security again from a host based perspective.
Added: 06/09/2004, Hits: 386, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Use Strong Passwords
In logging on to any computer, there are at least two elements you need to have. One is a user name and its associate password. Because there are two important details you need to log on, you need to make sure that at least one of them is very secured and very private
Added: 12/25/2014, Hits: 238, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Using Dual Accounts for Administrators
With security on the minds of everyone, including all administrators and executives, every precaution needs to be taken to protect the network devices, servers, clients, Active Directory, and network resources. Historically and even recently administrators and others that have elevated privileges to essential resources have been able to use a single user account for all of their activities, whether the activity is one that a common end user would perform or one that only an administrator can perform. It is time to consider the exposure that this situation creates and take action to protect all resources that are exposed by this activity.
Added: 06/03/2005, Hits: 512, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Using passwords as a defense mechanism to improve Windows security (Part 2)
In this article I will focus more on the global settings of password policies and where to change them to incorporate the 20 Golden rules of good password management in Part 1. This article will describe the possibilities of these policies and will run though real world reasons where these global settings should be applied. Different ways of generating passwords will also be described to make it easier for your users to come up with new passwords in a quick trouble free way.
Added: 06/09/2004, Hits: 449, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Why and how to implement SecurID Authentication
Authenticating users who log onto your network by account name and password only is the simplest and cheapest (and thus still the most popular) means of authentication. However, companies are recognizing the weaknesses of this method. Passwords can be guessed or cracked using dictionary attacks or more sophisticated methods such as rainbow tables, or users can be coerced, charmed or tricked into revealing their passwords to others. These latter techniques, called social engineering, have become a growing problem for companies of all sizes.
Added: 04/13/2006, Hits: 607, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating
Page:     1 2 Items Per Page:

7 Seconds Resources, Inc.

IT Showcase