With that said, I would bet it is highly likely that
TMDA is installed on a remote server by his hosting company

In which case I'd talk to them

tom
> --- Tom Moulton tmda <[EMAIL PROTECTED]> wrote:
>> I think he means tmda-cgi
>> > what passowrd? as far as I know, tmda doesn't have any password?
>
> Well if it's his tmda-cgi password, that would be in his
> ~/.tmda/tmda-cgi file. But if his hard drive crashed I think he has
> more problems since that file would be gone. If he is rebuilding his
> machine, then he can re-create that file with whatever password he
> wants since only tmda-cgi uses it.
>
> That being said... I think he might be talking about his crypt-key, and
> since his crypt-key is only created when the program is executed, and
> changes every time it's run, he can't create a new crypt-key that will
> match his previous one. The only way to replace the crypt-key is to
> restore from backups. And we ALL make backups of our home
> directories... right?
>
> If the true question is "How do I reverse engineer an address to decode
> the crypt key?" then, A> I don't think it can be done. and B> I don't
> think I would tell you if I did know, since that information can also
> be used to cause TMDA to bypass challenges on someone else's TMDA.
>
>
>
>
>
> __________________________________
> Do you Yahoo!?
> Yahoo! Mail - Find what you need with new enhanced search.
> http://info.mail.yahoo.com/mail_250
> _____________________________________________
> tmda-users mailing list ([email protected])
> http://tmda.net/lists/listinfo/tmda-users



_____________________________________________
tmda-users mailing list ([email protected])
http://tmda.net/lists/listinfo/tmda-users

Reply via email to