I just can't see people breaking into your house to get your admin password.
it is fine to write down your password & keep it in a safe place because the likely hood of someone finding your password & maliciously use it is low.
It is true that having your password tape to the monitor is not a good idea, but I didn't say that you should be that careless. The reason that the research center I worked for feel safe to have the password in an envelope on the wall is that the person that make it though the fireproof doors & alarm would have no trouble removing the hot-swap scsi array and read it when they get back to their hide out.Originally posted by: Nothinman
I just can't see people breaking into your house to get your admin password.
Unless they already broke in to steal the computer, then having the admin password on a post-it on the monitor just makes things that much easier for them.
it is fine to write down your password & keep it in a safe place because the likely hood of someone finding your password & maliciously use it is low.
The chances of you going to a web page that exploits the IE exploit of the day is pretty low too, but you keep up with patches anyway, right?
Originally posted by: Jeff7181
Is there anything I can do if I forgot the password for the Administrator account in Windows XP Pro, other than reinstalling the OS?
Does it mean that you dust every envelope that come accoss your desk, because there is a protential of foul play?
Do you taste check your donut or coffee every morning just to make sure that it doesn't have poison in it?
The reason you have to reinstall is because you are not soppose to hack the security of the OS. Quit being so darn lazy and just do it
Back up and start over. That is the answer.
Originally posted by: teqwiz
The reason you have to reinstall is because you are not soppose to hack the security of the OS. Quit being so darn lazy and just do it. All you are asking here are questions on hacking and not on OS recovery. If you are learning Admin techniques for work or personal knowledge, you are going about it the wrong way if all you learn is how to circumvent the SAM. An admin would learn to use it, not destroy it. Back up and start over. That is the answer. Learn from your mistakes.
Originally posted by: prosaic
Originally posted by: teqwiz
The reason you have to reinstall is because you are not soppose to hack the security of the OS. Quit being so darn lazy and just do it. All you are asking here are questions on hacking and not on OS recovery. If you are learning Admin techniques for work or personal knowledge, you are going about it the wrong way if all you learn is how to circumvent the SAM. An admin would learn to use it, not destroy it. Back up and start over. That is the answer. Learn from your mistakes.
First of all I'd say that not everyone is an admin, nor does everyone want to be an admin.
Then I'd point out that it is often the JOB of an admin to circumvent the security on a given system, for testing and / or for recovery purposes. And sometimes you're not just recovering data. Sometimes you're recovering a configuration that happens to be important to someone. Admins spend a lot of time helping users (and even themselves) recover from mistakes. Wiping, reinstalling, and then restoring the data is the fallback position, and you can always count on it if everyone has been smart enough to keep current on backups. But there's nothing intrinsically more noble about recovering the hard way if you can get back to functionality and access to your data without going through all of the motions.
Learning from your mistakes is a good idea, but reformatting and reinstalling isn't always the best way to learn. Most of us already know how to install the OS. Fewer know how to get into an installation without the original admin passwords.
I know of at least two ways (sort of two-and-a-half) to do it in Windows NT/2000/XP that do not involve damaging any part of the registry or configuration of the original installation. And I am no guru, but merely a competent, sort of, user. It is possible, but not likely, for a standalone system to be configured so that none of the ways I know will work. In such a case I might still try cracking the system. If I had spent a lot of time configuring a system, I would certainly rather spend 90 minutes or so recovering the system, if I could do that without "damaging" the functionality of it, than 1-2 days reconfiguring it.
- prosaic
Speaking of being "sort of" competent, I wonder how I managed to post this as a blank message the first time 'round.![]()
Originally posted by: adrianwalters
Originally posted by: prosaic
Originally posted by: teqwiz
The reason you have to reinstall is because you are not soppose to hack the security of the OS. Quit being so darn lazy and just do it. All you are asking here are questions on hacking and not on OS recovery. If you are learning Admin techniques for work or personal knowledge, you are going about it the wrong way if all you learn is how to circumvent the SAM. An admin would learn to use it, not destroy it. Back up and start over. That is the answer. Learn from your mistakes.
First of all I'd say that not everyone is an admin, nor does everyone want to be an admin.
Then I'd point out that it is often the JOB of an admin to circumvent the security on a given system, for testing and / or for recovery purposes. And sometimes you're not just recovering data. Sometimes you're recovering a configuration that happens to be important to someone. Admins spend a lot of time helping users (and even themselves) recover from mistakes. Wiping, reinstalling, and then restoring the data is the fallback position, and you can always count on it if everyone has been smart enough to keep current on backups. But there's nothing intrinsically more noble about recovering the hard way if you can get back to functionality and access to your data without going through all of the motions.
Learning from your mistakes is a good idea, but reformatting and reinstalling isn't always the best way to learn. Most of us already know how to install the OS. Fewer know how to get into an installation without the original admin passwords.
I know of at least two ways (sort of two-and-a-half) to do it in Windows NT/2000/XP that do not involve damaging any part of the registry or configuration of the original installation. And I am no guru, but merely a competent, sort of, user. It is possible, but not likely, for a standalone system to be configured so that none of the ways I know will work. In such a case I might still try cracking the system. If I had spent a lot of time configuring a system, I would certainly rather spend 90 minutes or so recovering the system, if I could do that without "damaging" the functionality of it, than 1-2 days reconfiguring it.
- prosaic
Speaking of being "sort of" competent, I wonder how I managed to post this as a blank message the first time 'round.![]()
yeah, what he said....![]()
I only stated that if this person is attempting to learn, then this is what should be done. I doubt that this person is, since he's obviously logging on locally and not into a server. If my statement sounded harsh, then I appologize for that. But, the SAM is there for a reason and I do not advocate hacking the registry as a replacement for actually knowing how to do something. More than likely, if it is a Pro machine and a local account, then it probably his own machine, No big deal. But, offering up system security bypass information over the internet, for whatever reason, is not good practice. You really have no idea what this person may be trying to get into really.
But, the SAM is there for a reason and I do not advocate hacking the registry as a replacement for actually knowing how to do something.
Not too many years ago, this country was assaulted by a group that got alot of their information from the internet. I do believe that a catastrophy of that magnitude warrants some caution on the side of online policy towards freely given information.