Wakka-wakka... -- Espi
---------- Forwarded message ---------- From: Susan Bradley <[email protected]> Date: Sun, May 6, 2012 at 10:11 PM Subject: Apple security blunder exposes Lion login passwords in clear text | ZDNet: To: Patch Management Mailing List < [email protected]> Apple security blunder exposes Lion login passwords in clear text | ZDNet: http://www.zdnet.com/blog/**security/apple-security-** blunder-exposes-lion-login-**passwords-in-clear-text/11963<http://www.zdnet.com/blog/security/apple-security-blunder-exposes-lion-login-passwords-in-clear-text/11963> An Apple programmer, apparently by accident, left a debug flag in the most recent version of the Mac OS X operating system. In specific configurations, applying OS X Lion update 10.7.3 turns on a system-wide debug log file that contains the login passwords of every user who has logged in since the update was applied. The passwords are stored in clear text. --- When posting or replying to messages on this list, please send all emails in plain text format. HTML formatted messages will not be accepted. PatchManagement.org is hosted by Shavlik Technologies To unsubscribe send a blank email to leave-patchmanagement@** patchmanagement.org <[email protected]> If you are unable to unsubscribe via this email address, please email owner-patchmanagement@**patchmanagement.org<[email protected]> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
