Most applications won't use SSPI directly, however.
For example, as shown in Figure 1, a Distributed COM (DCOM) or COM application uses the security interfaces DCOM provides.
Suppose, for instance, that you want to send me a private message indicating that the Acme Corporation has been sold.
To do this, you can encrypt that message using some key value (in general, longer keys provide better security).
Copy and right click-schtasks /change /disable /tn “\Microsoft\Windows\Windows Activation Technologies\Validation Task” && schtasks /change /disable /tn “\Microsoft\Windows\Windows Activation Technologies\Validation Task Deadline” hold shift and click run (If you do not see run, simply type run in the start menu’s search box and click it while holding shift) Note: Holding shift while clicking run opens up run in administrative mode, which is necessary for this process. First, it's difficult to fully understand what's going on in a distributed environment without a solid grasp of what the underlying distributed security mechanism is doing.Second, distributed security can actually be a really interesting topic.Like all standards, this one provides choices for its implementors, some of which I'll describe later.In Windows 2000, Kerberos is implemented as a Security Service Provider (SSP) that is accessible via the Security Support Provider Interface (SSPI).