lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: smcmahon at eiv.com (Shawn McMahon)
Subject: Re: Vulnerability in IBM Windows XP: default hidden Administrator account allows local Administrator access

On Sat, Sep 18, 2004 at 11:39:56AM -0400, Michael Scheidell said:
> XP HOME??? I am not talking about XP home.

You said you had never seen "a Windows install" where the Administrator
account didn't show.  I told you about a very common Windows install
where that is true.

A more appropriate response when someone expands your knowledge would be
"thank you".  Another good one would be "huh, didn't know that" or "you
learn something new every day."

No response at all would be acceptable, and more in keeping with
commonly-agreed standards of mailing list ettiquette.

Unless you are contending that Windows XP Home isn't Windows.


-- 
Shawn McMahon      | Let's set the record straight. There is no argument
EIV Consulting     | over the choice between peace and war, but there is
UNIX and Linux	   | only one guaranteed way you can have peace - and you
http://www.eiv.com | can have it in the next second - surrender. - Reagan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040918/b08c8616/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ