התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


1 Throwing good parties and building community (w/ Priya Parker) 38:16
211 - Behind the login Screen: Understanding OS Authentication - Part 2
Manage episode 467834536 series 2872461
Enjoying the content? Let us know your feedback!
In today's episode, we're going to explore the fascinating topic of operating systems authentications. We all use it but how many of us wondered how the behind the curtains machinery work. We'll be focusing on Windows, Linux/Unix, and Mac OS. We'll discuss how hashes are used in authentication, the concept of salt in passwords, rainbow table attacks and their countermeasures, the benefits of password-less authentication using hardware keys, password cracking, the shadow file in Unix/Linux, and the mechanics of how each OS protects passwords and how attackers try to circumvent these protections.
- Scareware blocker, now available in Microsoft Edge
- https://blogs.windows.com: Stand Up To Scareware With Scareware Blocker
- https://learn.microsoft.com: Kerberos Authentication Overview
- https://www.microsoft.com: Scareware Blocker
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
228 פרקים
Manage episode 467834536 series 2872461
Enjoying the content? Let us know your feedback!
In today's episode, we're going to explore the fascinating topic of operating systems authentications. We all use it but how many of us wondered how the behind the curtains machinery work. We'll be focusing on Windows, Linux/Unix, and Mac OS. We'll discuss how hashes are used in authentication, the concept of salt in passwords, rainbow table attacks and their countermeasures, the benefits of password-less authentication using hardware keys, password cracking, the shadow file in Unix/Linux, and the mechanics of how each OS protects passwords and how attackers try to circumvent these protections.
- Scareware blocker, now available in Microsoft Edge
- https://blogs.windows.com: Stand Up To Scareware With Scareware Blocker
- https://learn.microsoft.com: Kerberos Authentication Overview
- https://www.microsoft.com: Scareware Blocker
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
228 פרקים
כל הפרקים
×
1 228 - How the Emergence of AI-Powered Malware works 26:19


1 226 - Inside A Stealthy Malware Powering Modern Cyber Attacks 47:28

1 225 - What Is a Content Delivery Network—And Do They Really Protect Businesses? 24:29

1 224 - Cisco Talos Year 2024 In Review 34:38



1 221 - FBI’s 2024 Annual Internet Crime Report 32:16

1 220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces 32:41


1 218 - Fast Flux-The Cybercriminal's Hide and Seek 26:49

1 217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2 28:32

1 216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1 32:15

1 215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks 37:04

1 214 - What are polyglot files and how bad are they? 31:58
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.