dh Hello bats,
dh on Mon, 9. Feb 2004 at 08:45:35 -0800 Lynn wrote:
L I found the file, but no way really to tell what is the
L password, unless it's the encrypted string which follows
L the server configs .. ? And if I recklessly deleted those
L strings, do you know what would happen?
dAniel
Hello Dirigo,
Thursday, February 12, 2004, 10:55:14 AM, you wrote:
D Did you have any luck finding this program? I searched the TBUD
D archives using DeBat as the argument and came up with a list of
D messages that contained ...de/bat ... .de being part of a domain
D name. No luck on a standalone
LG Thursday, February 12, 2004, 10:55:14 AM, Lief (if I may) wrote:
LG It was a post of mine dated 18 Dec 2003 on TBBETA with the
LG subject of Password Vulnerability.
LG Here's the URL you're looking for.
LG http://www.password-crackers.com/crack3.html#thebat
Thanks Lief. Dummy me ... I
Thursday, February 12, 2004, 9:55:14 AM, you wrote:
D Did you have any luck finding this program? I searched the TBUD
D archives using DeBat as the argument and came up with a list of
D messages that contained ...de/bat ... .de being part of a domain name.
D No luck on a standalone program
Monday, February 9, 2004, 3:51:45 PM, you wrote:
MP I downloaded it some time ago, but did not use it until today.
MP Hope it helps. Be sure to get to the correct account.cfg.
Thanks, came through fine, got the right account.cfg, it
found the new password, but apparently the old one is
still
Hello Lynn,
Wednesday, February 11, 2004, 3:42:40 PM, you wrote:
L Thanks, came through fine, got the right account.cfg, it
L found the new password, but apparently the old one is
L still floating around somewhere. I can't figure out what
L password I used to set it up, either. Chemo brain :-(
Wednesday, February 11, 2004, 8:32:13 AM, you wrote:
L Thanks, came through fine, got the right account.cfg, it
L found the new password, but apparently the old one is
L still floating around somewhere. I can't figure out what
L password I used to set it up, either. Chemo brain :-(
MP How
Sunday, February 8, 2004, 10:50:46 AM, you wrote:
MM account password is stored in binary file ACCOUNT.CFG in account
MM directory on disk.
I found the file, but no way really to tell what is the
password, unless it's the encrypted string which follows
the server configs .. ? And if I
Hello bats,
on Mon, 9. Feb 2004 at 08:45:35 -0800 Lynn wrote:
L I found the file, but no way really to tell what is the
L password, unless it's the encrypted string which follows
L the server configs .. ? And if I recklessly deleted those
L strings, do you know what would happen?
Dunno.. but
Monday, February 9, 2004, 10:35:01 AM, you wrote:
dh Dunno.. but someone posted sth to the lists about a program called
dh DeBat, coded by HOG which can recover the
dh account's password, IIRC.
dh HTH to find it on google.
Thanks, I'll do it ..
Lynn
TheBat 2.02.3 CE Windows 2000Service Pack
Monday, February 9, 2004, 3:51:45 PM, you wrote:
MP I downloaded it some time ago, but did not use it until today.
MP Hope it helps. Be sure to get to the correct account.cfg.
I will ... thanks!
Lynn
TheBat 2.02.3 CE Windows 2000Service Pack 2
--
[EMAIL PROTECTED]* * *Aun Aprendo
I'm still having this password problem, (refuses to
update new password, keeps making me OK it over whatever
I happen to be doing on every fetch and send) but in one
account it went away when I changed the password back to
the original one I built the account with.
Unfortunately I can't recall
Hello all,
Sunday, February 8, 2004, Lynn wrote:
I'm still having this password problem, (refuses to
update new password, keeps making me OK it over whatever
I happen to be doing on every fetch and send) but in one
account it went away when I changed the password back to
the original one I
=-=-=-=-=-=-=-=-=-Original message text=-=-=-=-=-=-=-=
Sunday, February 8, 2004, 11:37:29 AM, you wrote:
I'm still having this password problem, (refuses to
update new password, keeps making me OK it over whatever
I happen to be doing on every fetch and send) but in one
account it went away
14 matches
Mail list logo