Posts

Showing posts from August, 2022

NTLM V1 and V2 Differentiation Against Kerbero | CalCom Software

Image
Kerberos, NTLMv1 and NTLMv2 are the three different authentication protocols. These protocols seek to improve security, especially in the Active Directory environment. Authentication protocols are widely used in attack techniques. They might facilitate the access and privilege-escalation of intruders. So it's important to choose the most trustworthy protocol and be aware of its shortcomings. The underlying fact that the NTLMv1 protocol is the oldest of the three is shown when NTLM v1 and v2 are compared to Kerberos. NTLMv2 offers a few minor security-enhancing upgrades. The authentication process using Kerberos is significantly more complex and secure. AUTHENTICATION of NTLMV1:  NTLM was made by Microsoft. Both current and vintage Windows versions are compatible with it (Windows 95, Windows 98, Windows ME, N.T 4.0). The NTLM authentication protocol uses a challenge-response mechanism. A user connects on to a client computer using a domain name, username, and password. The client co

What is Cyber hygiene? Everything You Need to Know About It | CalCom Software

Image
  What is Cyber hygiene? Everything you need to know about It   If you are a working professional or a student, you must have heard about cyber hygiene. People nowadays are becoming more conscious of maintaining good cyber hygiene. And many technology geeks are always looking for new ways to improve cyber hygiene.  But do you know what cyber hygiene is? If not, keep reading. Here we will tell you everything about cyber hygiene that you should know. What is Cyber hygiene? Many of you have heard the term cyber hygiene, but few know what cyber hygiene is exactly. Cyber hygiene is also known as cyber security maintenance. Cyber hygiene is a set of practices or best practices performed by an individual or institution regularly to ensure secure and healthy cyberspace. This cyber hygiene helps secure users' privacy along with their data, network and devices.   Tips for maintaining cyber hygiene Maintaining good cyber hygiene is essential to keeping your cyberspace safe and secure.