From: jmr@rmisp.com (Justin Robbins)
To: cypherpunks@toad.com
Message Hash: cb85928ea19d319feb900f89b683a354db328e76626e9f6722dd6f64a3168ccb
Message ID: <3.0.32.19961118194954.00964d10@rmisp.com>
Reply To: N/A
UTC Datetime: 1996-11-19 03:18:18 UTC
Raw Date: Mon, 18 Nov 1996 19:18:18 -0800 (PST)
From: jmr@rmisp.com (Justin Robbins)
Date: Mon, 18 Nov 1996 19:18:18 -0800 (PST)
To: cypherpunks@toad.com
Subject: NT insecurity
Message-ID: <3.0.32.19961118194954.00964d10@rmisp.com>
MIME-Version: 1.0
Content-Type: text/enriched
Well, for those uninformed out there who believe that you can penetrate an NT box using NTFSDOS, the problem remains that security in windows NT is a combination between the filesystem NTFS and the actual operating system, NT. NTFSDOS only allows reading the drives, not writing to them. NT also keeps the security registry keys/information in approximately 25 areas, not in 1 password file.
So..
ya can't "erase a password file under NT" because they don't exist.
There's my 2 cents for this 60+ letter a day mailing list.
Justin Michael Robbins
of Dreamage Technologies
jmr@rmisp.com0000,0000,8080">
warlock@thepentagon.com
Please use the 1-888-401-2862 Paging/Messaging system for immediate response.
Return to November 1996
Return to ““lyalc@mail.cba.com.au” <lyalc@cba.com.au>”