On Wed, Jan 4, 2012 at 1:39 PM, Kennedy, Jim
<kennedy...@elyriaschools.org> wrote:
>> net user localuser n3wP@ssw0rd
>
> Then convert it to an exe or encrypt it to help keep prying eyes out of it.

  Do note that such solutions only obfuscate the password.  The
conversion has to be able to reverse the cipher to give the password
to the NET command.  It's fairly trivial to then put a phony NET
command in front of the real one and get the password.  So it will
prevent accidental disclosure, but it won't really stop someone who is
"prying".

  Depending on one's security requirements, obfuscation may or may not
be acceptable.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to