As long as you properly attribute them, there's no problem :) -ASB: http://XeeSM.com/AndrewBaker
Sent from my Motorola Droid On Jul 21, 2010 1:39 PM, "Free, Bob" <r...@pge.com> wrote: Indeed, that is why some folks referred to lophtcrack as password auditing software vs a password cracking mechanism....it's somehow more palatable...lol. At the end of the day, the lowest common denominator is that you are cracking them. Other reasons are to see if default passwords are being used across multiple accounts/environments or someone is using the same password multiple places etc etc etc. Security teams can find lots of reasons to justify it :-] We ran lophtcrack against an NT SAM with ~25K user accounts back in the day and the results were indeed illuminating. /apologies to ASB for the 2 "indeeds" :-) -----Original Message----- From: Ziots, Edward [mailto:ezi...@lifespan.org] Sent: Wednesday, July ... ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~