What is the security account administrator?
The security account administrator is part of the Windows® operating system that verifies account passwords. Passwords stored by this system are encoded using a hash algorithm. Because the hash encodes only in one direction, the passwords are relatively safe if the unauthorized user finds them. The security account administrator is built into the system register and its files are directly monitored by the core, making it difficult to handle associated information or a change in associated information. Although this system is safe from most basic attacks, it has received several criticisms due to a selected group of security failure. This system only holds these passwords; Other system passwords are held in unrelated areas. The administrator uses the operating system to verify that the entered passwords are correct.
When a user creates an account password, the system sends it via the hash algorithm. This process converts the password to numbers and then launches these numbers through the equation. The output of the equation is a string of numbers thatIt has no similarity to the original password. Windows then completely removes all traces of the original password, so only the numbers will remain.
When the user enters his password, the process repeats himself. The security account manager contains the final string of numbers that are compared with the transferred password. If the numbers match, the user can log in; If this is not the case, the system will return the invalid password error.
Security of the security account administrator is about as tight as it can be. The processes that control the system are created directly into the operating system register. This is common for the most inherent systems, but it makes it difficult to handle them. Three security comes from the core of the system. Once activated, the core takes over the security account administrator files and holds them as long as it is started. This makes it extremely difficult to move or copy files.
the system is not reliable and there are manyways to fool the core to give up the files. The most common methods include connecting Windows® installation to the virtual system. During the emulation, the core is easier to check and copy files. It is also possible to cause a computer error, a commonly called blue screen that includes active memory in the file. This dump contains information from the security account administrator.