![]() ![]() Fortunately, remote-desktop access is not built into Windows 10 Home and not enabled by default in Windows 10 Pro or Enterprise. This is bad enough if you have remote-desktop access set up on your PC, as the attacker can use your Windows username and password to log on as you. If someone - say someone running a server hosting third-party desktop-theme images - gets an NTLM hash of your Windows account password, then that someone can decode your password in a matter of seconds. ![]() Here's the problem with NTLM hashes: They're damn easy to "crack" using any of a half-dozen free password-cracking programs.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |