Talk:Security Account Manager
Disable LM hashes
The article states that Windows can be configured to disable LM hashes, but there is no mention of how this would be done. Therefore, a link to Microsoft's Knowledge Base where this is explained in detail  could prove useful. —Preceding unsigned comment added by 184.108.40.206 (talk) 21:56, 27 June 2009 (UTC)
This is not completely true. on Windows XP, you could remove the file, login to the Administrator account, which allowed you to modify any accounts password. —Preceding unsigned comment added by 220.127.116.11 (talk) 11:02, 29 January 2008 (UTC)
Related Attacks section
Multiple tools do exist for the purpose of cracking these hashes, perhaps most notably BackTrack, specifically the Jack the Ripper (I think that's the name) utility. Flashgamer001 (talk) 23:49, 19 December 2012 (UTC)
John the Ripper is used to get the password from a hash stored in a file. BackTrack uses another utility called chntpw(pogostick.net/~pnh/ntpasswd/) to make Windows password blank. — Preceding unsigned comment added by Shrimadhav (talk • contribs) 10:31, 7 August 2014 (UTC)
Security Account Manager
The article should be renamed Security Account Manager. Although it manages multiple accounts, the name of the tool / technology is singular. See Security Account Manager. -- Dave Braunschweig (talk) 16:38, 29 May 2013 (UTC)
- I agree. It is the official MS TechNet name.
- It should be renamed to "Security Account Manager" and a redirect page should be added. dudeprgmtalkϝɑɼĸ 19:27, 10 May 2015 (UTC)
"Only recently, Microsoft released a utility called LockSmith, which is part of MSDart. MSDart is not freely available to end-users, however."