This is just *way* too easy.  The big problem here is that the registry is a
terribly insecure place to store this information.   I can see now why the
documentation essentially says that the registry usage system is a crude
"short-term"  hack.

----- Original Message -----
From: "Niko Papula" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, 2002-04-20 02:30
Subject: RE: vncpasswd for Windows


> Hello
>
> Jacob Hoover wrote:
>  >What OS's are you running on?  I may be able to help you.  I took the
>  > vnc password source and put it into a separate app with registry
>  > access.  It allows you to read and write passwords on the local and
>  > remote machines. However, I have only tested it on NT 4.0 -> NT 4.0
>  > scenario's.
>
> I have done similar thing. Reading and writing VNC password to Windows
> registry is no problem if you know the encryption scheme and encryption
> key. Easiest way would be to use the corresponding file from VNC source.
>
> I have implementation that works on at least W95, W98, WNT, W2000 so I
> expect Jacob4s implemention to work on these same OSes as well.
>
> Regards
>
>
> Niko Papula
>
> P.S. The easy decryption of VNC password in registry is a security risk.
> ---------------------------------------------------------------------
> To unsubscribe, mail [EMAIL PROTECTED] with the line:
> 'unsubscribe vnc-list' in the message BODY
> See also: http://www.uk.research.att.com/vnc/intouch.html
> ---------------------------------------------------------------------
---------------------------------------------------------------------
To unsubscribe, mail [EMAIL PROTECTED] with the line:
'unsubscribe vnc-list' in the message BODY
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------

Reply via email to