Yusuf On SecuritySecurity news, opinion and advice

211 – Behind the Login Screen: Understanding OS Authentication – Part 1

Hosted by
Yusuf

In today’s episode, we’re going to explore the fascinating topic of operating systems authentications. We all use it but how many of us wondered how the behind the curtains machinery work. We’ll be focusing on Windows, Linux/Unix, and Mac OS. We’ll discuss how hashes are used in authentication, the concept of salt in passwords, rainbow table attacks and their countermeasures, the benefits of password-less authentication using hardware keys, password cracking, the shadow file in Unix/Linux, and the mechanics of how each OS protects passwords and how attackers try to circumvent these protections. 

  • Scareware blocker, now available in Microsoft Edge

https://blogs.windows.com: Stand Up To Scareware With Scareware Blocker

https://learn.microsoft.com: Kerberos Authentication Overview

https://www.microsoft.com: Scareware Blocker

Join the discussion

More from this show

209 – DeepSeek

Today, we’ve got something really exciting for you. If you’ve been following the world of artificial intelligence lately, you’ve probably...