How does your organizations manage the local administrator account on workstations?

Discussion in 'Server Networking' started by Spin, Aug 30, 2008.

  1. So you're going to rewrite the OS to allow passwords to be encrypted with
    Blowfish? Jeesh.
     
    Paul Adare - MVP, Sep 2, 2008
    #21
    1. Advertisements

  2. It also seems to imply the assumption that the primary way that any password
    is "beaten" is by hacking it in some way. But the primary way a password is
    beaten is by one person who knows it, telling it to someone who is not
    supposed to know it, or by someone getting their hands on the password
    documentation list. All the encryption in the world isn't going to stop
    that.

    --
    Phillip Windell
    www.wandtv.com

    The views expressed, are my own and not those of my employer, or Microsoft,
    or anyone else associated with me, including my cats.
    -----------------------------------------------------
     
    Phillip Windell, Sep 2, 2008
    #22
    1. Advertisements

  3. Spin

    Dan Guest

    Dan, Sep 3, 2008
    #23
  4. Spin

    Dan Guest

    Good point and the yellow sticky notes that people try to hide near their
    computers
     
    Dan, Sep 3, 2008
    #24
  5. We're talking about logon passwords here Dan. Should be obvious.
     
    Paul Adare - MVP, Sep 3, 2008
    #25
  6. Hide? :)

    I've seen 'em stuck on monitor all the way around. The stupid thing looked
    like a giant Sun Flower! :)
    I didn't know if I should Click-it, sniff it, or each the seeds.

    --
    Phillip Windell
    www.wandtv.com

    The views expressed, are my own and not those of my employer, or Microsoft,
    or anyone else associated with me, including my cats.
    -----------------------------------------------------
     
    Phillip Windell, Sep 3, 2008
    #26
  7. Spin

    Dan Guest

    Well, I am expanding the topic to include a multi-level security approach
    with using not only login passwords which of course is better on Windows XP
    but also BIOS passwords, passwords used in 3rd party programs, biometrics,
    and how to fully safeguard and secure your machine from hackers whether
    internal or most importantly imo, remote external hackers with such skills
    that we could be talking about employees from the federal governments of say
    China or Russia now that is the true big time.
     
    Dan, Sep 4, 2008
    #27
  8. Spin

    Dan Guest

    Good idea but I would go farther that the discarded passwords be shredded and
    then ideally burned by fire just to be extra safe and secure and to keep you
    safe from dumpster diving.
     
    Dan, Sep 4, 2008
    #28
  9. but what about the molecular ash reorganizers ??
     
    Roger Abell [MVP], Sep 5, 2008
    #29
  10. Spin

    Dan Guest

    Seriously or a Joke <grins>

     
    Dan, Sep 5, 2008
    #30
  11. Spin,

    I've seen a couple of companies using product provided by Autocipher -
    www.autocipher.com....this is an agentless password management solution for a
    windows environment.....It simply does the job!

    Let me know if you have any questions.

    Matt
     
    Matt Maslowski, Oct 13, 2008
    #31
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.