As long as you properly attribute them, there's no problem :)

-ASB: http://XeeSM.com/AndrewBaker

Sent from my Motorola Droid

On Jul 21, 2010 1:39 PM, "Free, Bob" <r...@pge.com> wrote:

Indeed, that is why some folks referred to lophtcrack as password auditing
software vs a password cracking mechanism....it's somehow more
palatable...lol.

At the end of the day, the lowest common denominator is that you are
cracking them.

Other reasons are to see if default passwords are being used across multiple
accounts/environments or someone is using the same password multiple places
etc etc etc. Security teams can find lots of reasons to justify it :-]

We ran lophtcrack against an NT SAM with ~25K user accounts back in the day
and the results were indeed illuminating.

/apologies to ASB for the 2 "indeeds" :-)


-----Original Message-----
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Wednesday, July ...

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to