lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <004001c49d32$cf983180$0501a8c0@andromeda>
From: prp17 at adelphia.net (Phillip R. Paradis)
Subject: RE: Vulnerability in IBM Windows XP: default hidden Administrator account allows local Administrator access

> I guess that means "If you call IBM support and you have 
> changed your local
> administrator password to anything other than blank, then we 
> may not be able
> to help you out of the bind you have gotten yourself into 
> (data loss)".

See my prior post. To change the password without losing the contents of
Protected Storage, log in as the affected account, and use the normal method for
changing one's own password. (Which depends on whether the Welcome Screen is
enabled or not; if not, press Ctrl-Alt-Del and click Change Password. If the
Welcome Screen is enabled, the option is somewhere in the Users control panel,
though since I never use the Welcome Screen, I don't recall where, exactly.)



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ