Passwordless authentication and other types of authentication

We will now discuss the types of connections we can find. We will use Windows 10 as an example, although it could be applied to other operating systems. In this regard, we could find three types of connection data:

The tasks for a server technician are varied, with everything from providing cost estimates to upgrading hardware and software as needed. The server for a business hosts a lot of data and information, and server repair technicians need to be aware of what a business needs. 


Password authentication : when our computer is turned on, we must select or enter the username and then enter the password. We will not be able to use the computer with all its functions until we enter the passwords correctly. Undoubtedly, it is the safest way, but also the one that requires a little more effort.
Passwordless authentication : Appears when the user does not have a password. Then, anyone can easily access the content on that computer. In short, it is the most dangerous for our security.
Automatic login : in this case we have a user with a password. The difference is that we, without having to do anything, will enter Windows as if we had entered a username and password, so security is also awful. It is usually used at home or in trusted sites, the danger is if the computer is stolen or just someone turns it on and extracts the information that interests them.
As you can see, connecting without a password can be a significant risk to our security. We will now illustrate it with an example so that you can better understand it.

Comments

  • No Comment Yet
Please login first for post a comment