General Password questions

Rudy Schockaert rudy.schockaert at pandora.be
Thu Oct 2 13:13:00 EDT 2003


>>I think the NT/W2K model allows for encryption based on keys that
>>only the specific user can use (i.e. you have to actually be logged
>>in as that user; I'm not sure if the adminstrator can fake it).

This is the BIG security hole in NT/W2K. As an admininstrator you have 
several ways to start a new process running in the security context of 
someone else.

There are some approvements in W2K3 though. Still didn't find a way to 
let Administrator impersonate as someone else.





More information about the Python-list mailing list