Войти
  • 2318Просмотров
  • 1 десятилетие назадОпубликованоComputer and Network Security

Authentication

Summary Types of authentication, detailed explanation of password hashing, examples of bad password choices, password cracking methods, and coverage of password security on Unix and Windows systems. 2:55 - Examining the /etc/passwd file in Linux 5:08 - Examining the /etc/shadow file 5:53 - Example of hashed password Reference Materials Guide to Network Defense and Countermeasures - Chapter 1 (pgs. 28-29), Chapter 3 (pgs. 99-100) Additional Information Configuring auditing policies in Windows: Top 5 security settings to audit: