You can use SYSKEY utility from resource kit to encrypt the system key. This will take care of this crack. However, This solution have some drawbacks as you can read in Technet article Q143475. (easy way to gain the article: send email to [EMAIL PROTECTED] with subject q143475 - and you will get it in reply!) If you do not want to implement the syskey method, you only need to go back to the "standard" methods: - Always physically protect your server - Never leave a user Logged in the console - Keep tour ERD in safe place - Keep backups in safe place. - Use 8 characters random passwords (This will not defy l0pht, but it will take so long to crack so nobody will bother) Those will ensure that nobody will use l0pht crack on you. Arik Sudman BEZEQ - The Israeli telecom > -----Original Message----- > From: [EMAIL PROTECTED] > [SMTP:[EMAIL PROTECTED]] > Sent: &alef; 27 &dalet;&tsadi;&mem;&bet;&resh; 1998 13:02 > To: [EMAIL PROTECTED] > Subject: Fwd: l0pth crack question > > Hello all, > > > This is not a firewall question but still a security question. > And please excuse my lacking of knowledge. > > > Is there a fix for the l0pth crack for NT passwords? > Did any of the service packs take care of that problem or hasn't > anything > been done about it yet? > > l0pth crack info here -> http://www.l0pht.com > > Thank you for your time, > > Jason > > "Things are not what they used to be > Missing one inside of me > Deathly lost, this can't be real > Cannot stand this hell I feel > Emptiness is filing me > To the point of agony > Growing darkness taking dawn > I was me, but now He's gone." > If you don't know who > said this,.... > > Too bad. > > - > [To unsubscribe, send mail to [EMAIL PROTECTED] with > "unsubscribe firewalls" in the body of the message.] - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
