So, get this:
I received a laptop for work this morning (yes, Saturday morning). Over this weekend, I need to install Visual Studio, transfer my code across, set up anything else I need (Firefox, etc) all ready to head south on Monday morning, 08:00. Thing is, I wasn't given a password for my user account.
I've spent a lot of today trying to break into the box. Eventually have a way that worked and was surprisingly easy.
Introducing Offline NT Password & Registry Editor.
Simple tool. Basically boots a live Linux CD and then allows you to do neat things like select an account and then blank its password, or promote it to administrator or whatever. There's also some registry editing tools but I only needed the password blanking. A minute later, I'm logging into my account with no password and setting it to what I want.
How secure do you feel your box is now? A reboot, with the ability to boot from CD, and I can clear your password and get access to your system. That'll cause problems for encrypted volumes, of course, but who uses those anyway...?
I received a laptop for work this morning (yes, Saturday morning). Over this weekend, I need to install Visual Studio, transfer my code across, set up anything else I need (Firefox, etc) all ready to head south on Monday morning, 08:00. Thing is, I wasn't given a password for my user account.
I've spent a lot of today trying to break into the box. Eventually have a way that worked and was surprisingly easy.
Introducing Offline NT Password & Registry Editor.
Simple tool. Basically boots a live Linux CD and then allows you to do neat things like select an account and then blank its password, or promote it to administrator or whatever. There's also some registry editing tools but I only needed the password blanking. A minute later, I'm logging into my account with no password and setting it to what I want.
How secure do you feel your box is now? A reboot, with the ability to boot from CD, and I can clear your password and get access to your system. That'll cause problems for encrypted volumes, of course, but who uses those anyway...?