Back in the early days of networking, just after the birth of the PC, people wanted the ability to share files from one system to another. In business applications, systems already had the ability to network themselves using proprietary networking protocols such as IPX (Internetwork Packet Exchange), Tolkien Ring, and coaxial bus networks. One big problem with all these proprietary protocols is that none of them could cross-communicate between themselves. This became known as vendor lock-in, and we still have some of this even today with proprietary systems and protocols. (Yes, I am pointing the finger at you, Microsoft.) Using these protocols meant paying a license fee for each system on the network-not just ...
NetBIOS name service and NTLM
Get Kali Linux 2018: Windows Penetration Testing - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.