passwords

You may need to do a quick third-party registration to access certain ones. Resources without a hyperlink are no longer published/posted.

Articles
  • What to expect during your next penetration test
  • Following up on your vulnerability and penetration testing
  • Low-hanging security fruit you can’t afford to overlook
  • Best practice tips for your password policy
  • How to audit network passwords
  • Three Actionable Steps To Take Following Your Penetration Testing
  • The science behind bad passwords
  • What you need to know about the Windows Security Accounts Manager
  • Don’t forget enterprise password protection in a merger or acquisition
  • Microsoft Office 2013 crackable, so look to Office password recovery
  • Cracking passwords in Windows 7
  • Password cracking tools for SQL Server
  • Balancing Windows security with reasonable password policies
  • Nine common password oversights to avoid
  • Secure your Windows systems with proper password practices
  • Managing multiple passwords in Windows
  • Managing single sign-on burdens in Windows
  • Step-by-step guide: Laptop hacking
  • Step-by-step guide: Cracking network passwords
  • Windows password management myths
Screencasts
  • Essential Tools and Techniques for Cracking Windows Passwords

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: