On Wed, Jan 4, 2012 at 1:39 PM, Kennedy, Jim <kennedy...@elyriaschools.org> wrote: >> net user localuser n3wP@ssw0rd > > Then convert it to an exe or encrypt it to help keep prying eyes out of it.
Do note that such solutions only obfuscate the password. The conversion has to be able to reverse the cipher to give the password to the NET command. It's fairly trivial to then put a phony NET command in front of the real one and get the password. So it will prevent accidental disclosure, but it won't really stop someone who is "prying". Depending on one's security requirements, obfuscation may or may not be acceptable. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin