How do you undo the Plain Text Password Registry hack in Windows? How do I reverse it after it has been applied? Daniel Hardy metaSENSORS, Inc. 358 Hungerford Drive Rockville, Maryland 20850 Tel: (301) 762-3078 ext. 35 Fax: (301) 340-0769 Email: danh@metasensors.com On the Web at www.metasensors.com -------------- next part -------------- HTML attachment scrubbed and removed
[Dan Hardy <danh@metasensors.com>]> How do you undo the Plain Text Password Registry hack in Windows? How > do I reverse it after it has been applied?Change the DWORD:00000001 with DWORD:00000000 and re-apply it. (Also note: the leading zeroes aren't really necessary.)> <meta name=ProgId content=Word.Document> > <meta name=Generator content="Microsoft Word 9"> > <meta name=Originator content="Microsoft Word 9"> > <link rel=File-List href="cid:filelist.xml@01BFF009.F4098620"> > <!--[if gte mso 9]><xml> > <o:OfficeDocumentSettings> > <o:DoNotRelyOnCSS/> > </o:OfficeDocumentSettings> > </xml><![endif]--><!--[if gte mso 9]><xml> > <w:WordDocument> > <w:View>Normal</w:View>NNNNNNNNNOOOOOOOOOOOOOOOOOOOOoooooooooooooooooooooooo........... (: Peter
On Mon, 17 Jul 2000, Dan Hardy wrote:> How do you undo the Plain Text Password Registry hack in Windows? How do I > reverse it after it has been applied?Take a look at the .reg file that you applied, in order to find the "path" for value that it set. Use regedit to find, select and delete that value. Note that you don't actually need to do this in order to make use of encrypted challange/response authentication: if your server supports encrypted authentication then your client will use that in preference to plaintext authentication anyway. Regards, -- Neil Hoggarth Departmental Computer Officer <neil.hoggarth@physiol.ox.ac.uk> Laboratory of Physiology http://www.physiol.ox.ac.uk/~njh/ University of Oxford, UK