lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BMEKJNNECFPDGJLDFNLJAEGGCIAA.mwwilson@navo.hpc.mil>
From: mwwilson at navo.hpc.mil (Michael Wilson, Contractor)
Subject: RE: Vulnerability in IBM Windows XP: default hidden Administrator account allows local Administrator access

I guess that means "If you call IBM support and you have changed your local
administrator password to anything other than blank, then we may not be able
to help you out of the bind you have gotten yourself into (data loss)".

IBM had decided that the average user (of their systems) cannot be trusted
with even knowing about their systems administrative access, much less the
password.

Mike Wilson

-----Original Message-----
From: Michael Scheidell [mailto:scheidell@...nap.net]
Sent: Friday, September 17, 2004 3:20 PM
To: mwwilson@...o.hpc.mil; Chris Norton; bugtraq@...urityfocus.com;
vulnwatch@...nwatch.org; full-disclosure@...ts.netsys.com
Subject: RE: Vulnerability in IBM Windows XP: default hidden
Administrator account allows local Administrator access


yes, my two biggest complaints:

1) they bypassed telling you there was one
2) if you knew about it, and wanted to change it, they told you that you
would lose data if you did!

(xp manual install recommends that you put a password on it!)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ