Skip to content

Utilize Windows

  • Home
  • Contact Us
  • Computer
  • Hardware
  • Networking
  • E-books

Security

Overview of Hashing Cryptography

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: Learn what is hashing, why do we use it, and common hashing algorithms. Prerequisites: you have to understand …

Read more

Categories Computer, Security

Explanation of Asymmetric Cryptography

November 28, 2022December 3, 2012 by Husein Gradasevic
Utilizewindows

Before you start Objectives: Learn what is asymmetric cryptography, how does it work, and about different implementations. Prerequisites: you should know what …

Read more

Categories Computer, Security

Explanation of Symmetric Cryptography

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: Find our the specifics about symmetric cryptography and about specific algorithms that are often used. Prerequisites: you should …

Read more

Categories Computer, Security

Introduction to Cryptography

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: Learn what is encryption, why it is used, what are its primary parts, and what are its …

Read more

Categories Computer, Security

Authentication Protection Techniques

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: Learn which protocols are used to protect the authentication process itself. Prerequisites: you have to know what authentication …

Read more

Categories Computer, Security

Types of Authentication

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: Learn what is authentication, and about different common types of authentication. Prerequisites: no prerequisites. Key terms: authentication, password, token, …

Read more

Categories Computer, Security

Managing Local Authentication in Windows

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: learn which tools can be used in Windows OS to manage authentication locally. These include Credentials Manager, …

Read more

Categories Computer, Security

Authentication Versus Authorization

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: Learn the difference between authentication and authorization, and how are those two implemented in Windows operating systems. …

Read more

Categories Computer, Security

Overview of Different Authentication Attacks

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: Familiarize yourself with different types of authentication attacks and general ways to prevent them. Prerequisites: no requirements. Key …

Read more

Categories Computer, Security

Switches and Security

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: Learn about switch security features such as VLANs, MAC address filtering, and port authentication. Prerequisites: no prerequisites. Key …

Read more

Categories Computer, Security
Older posts
Newer posts
← Previous Page1 Page2 Page3 Page4 Next →

Recent Posts

  • The Windows File Management 101: Expert Tips for Effective Organization
  • Introduction to Home windows XP – Up to date
  • Methods on The right way to Repair Home windows Error Code 0x0 0x0
  • Wifi 5 vs Wifi 6 – Ought to You Improve or Not?
  • Distinction between WEP, WPA, WPA2, WPA3, WPS WiFi Safety
  • Cloud
  • Computer
  • Hardware
  • http
  • Linux
  • Networking
  • php
  • Security
  • Server
  • Web
  • Windows
  • Windows 10
  • Windows 7
  • Windows 8
  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows Vista
  • Windows XP

Contact us

Email: marketing[at]shantelllc.com

Search Here

More

  • Contact Us
  • Terms Of Use
  • Cookie Policy
    • Opt-out preferences
  • Disclaimer
  • Privacy Policy
  • Sitemap
© 2023 - Utilize Windows
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}