Back to Results
First PageMeta Content
Cryptographic software / Password / Security Accounts Manager / Cryptographic hash functions / Salt / Challenge-response authentication / Shadow password / Crypt / S/KEY / Cryptography / Computer security / Security


On NT Password Security By: Jos Visser This article is (c) Copyright 1997 Open Solution Providers. It may be referred to or reproduced in full only with full retention of this copyright message. For more information on t
Add to Reading List

Document Date: 2004-10-07 03:31:00


Open Document

File Size: 124,69 KB

Share Result on Facebook

Company

Hewlett-Packard / Beatrice / Microsoft / /

Holiday

liberation day / /

IndustryTerm

local area network / straightforward tool / client software / web browsing / Internet services / smart hacking systems / software development / obfuscation algorithm / external devices / straightforward algorithm / email technology / intermediate network / Internet consultancy / email software / Secure operating systems / challenge-response protocol / encryption algorithm / /

OperatingSystem

UNIX / Linux / Microsoft Windows / /

Person

Jeremy Allison / Jos Visser / /

Position

Windows/NT system administrator / Queen / system administrator / Security Accounts Manager / builtin Administrator / administrator / /

Technology

challenge-response protocol / LAN / email technology / UNIX / encryption algorithm / Linux / shadow password file / operating system / operating systems / access control list / encryption / Java / ActiveX control / ASCII / straightforward algorithm / SMB protocol / DES-like algorithm / ISP / UNIX hashing algorithm / ActiveX / obfuscation algorithm / GUI / stored using a complex obfuscation algorithm / /

URL

http /

SocialTag