Content-Transfer-Encoding: |
7bit |
Sender: |
|
Subject: |
|
From: |
|
Date: |
Tue, 25 Jan 2005 11:19:23 -0500 |
Content-Type: |
text/plain; charset="iso-8859-1" |
MIME-Version: |
1.0 |
Reply-To: |
|
Parts/Attachments: |
|
|
I would like to add the following.
While is "IS' possible to "get into" a user account a number of ways,
(especially if you have physical access),
you STILL have the problem that anything encrypted by the OS
under a specific user and their password(s) will be NOT readable
after you access that user's account...
(Disclaimer: I do not use any of the encryption stuff, so do not claim
to be the final authority on it...)
Rick Glazier
From: <[log in to unmask]>
> You are right. This MAY reset the BIOS password (depending on the
> motherboard make/model), but it is impossible for it to reset the Windows
> password. The Windows password is stored in a file on the disk in encrypted
> form. There is no way the BIOS could possibly know how to modify that file,
> especially on an NTFS filesystem.
Visit our website regularly for FAQs,
articles, how-to's, tech tips and much more
http://freepctech.com
|
|
|