lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20040918184230.GA15407@eiv.com>
Date: Sat, 18 Sep 2004 14:42:30 -0400
From: Shawn McMahon <smcmahon@....com>
To: Michael Scheidell <scheidell@...nap.net>
Cc: bugtraq@...urityfocus.com, vulnwatch@...nwatch.org,
   full-disclosure@...ts.netsys.com, vuln@...urity-corporation.com
Subject: Re: Vulnerability in IBM Windows XP: default hidden Administrator account allows local Administrator access

On Sat, Sep 18, 2004 at 11:39:56AM -0400, Michael Scheidell said:
> XP HOME??? I am not talking about XP home.

You said you had never seen "a Windows install" where the Administrator
account didn't show.  I told you about a very common Windows install
where that is true.

A more appropriate response when someone expands your knowledge would be
"thank you".  Another good one would be "huh, didn't know that" or "you
learn something new every day."

No response at all would be acceptable, and more in keeping with
commonly-agreed standards of mailing list ettiquette.

Unless you are contending that Windows XP Home isn't Windows.


-- 
Shawn McMahon      | Let's set the record straight. There is no argument
EIV Consulting     | over the choice between peace and war, but there is
UNIX and Linux	   | only one guaranteed way you can have peace - and you
http://www.eiv.com | can have it in the next second - surrender. - Reagan

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ