Computing
NTLM
LM hash
Password
Cain and Abel
Authentication protocol
Integrated Windows Authentication
LAN Manager
Crypt
Computer security
Computer network security
Cyberwarfare