1996-11-19 - NT insecurity

Header Data

From: jmr@rmisp.com (Justin Robbins)
To: cypherpunks@toad.com
Message Hash: cb85928ea19d319feb900f89b683a354db328e76626e9f6722dd6f64a3168ccb
Message ID: <3.0.32.19961118194954.00964d10@rmisp.com>
Reply To: N/A
UTC Datetime: 1996-11-19 03:18:18 UTC
Raw Date: Mon, 18 Nov 1996 19:18:18 -0800 (PST)

Raw message

From: jmr@rmisp.com (Justin Robbins)
Date: Mon, 18 Nov 1996 19:18:18 -0800 (PST)
To: cypherpunks@toad.com
Subject: NT insecurity
Message-ID: <3.0.32.19961118194954.00964d10@rmisp.com>
MIME-Version: 1.0
Content-Type: text/enriched

Well, for those uninformed out there who believe that you can penetrate an NT box using NTFSDOS, the problem remains that security in windows NT is a combination between the filesystem NTFS and the actual operating system, NT.  NTFSDOS only allows reading the drives, not writing to them.  NT also keeps the security registry keys/information in approximately 25 areas, not in 1 password file.

So..

ya can't "erase a password file under NT" because they don't exist.

There's my 2 cents for this 60+ letter a day mailing list.


Justin Michael Robbins
of Dreamage Technologies

jmr@rmisp.com0000,0000,8080">								

warlock@thepentagon.com
Please use the 1-888-401-2862 Paging/Messaging system for immediate response.




Thread