There is an exploit that allows users to reset the Administrator password on Windows. It is done by booting from a repair disk, starting command prompt, and replacing C:\Windows\System32\sethc.exe with C:\Windows\System32\cmd.exe.
When the sticky key combination is pressed at the logon screen, users get access to a command prompt with Administrator privileges.
This is a huge security hole, makes the OS vulnerable to anyone with even the slightest IT knowledge. It almost makes you want to switch to Mac or Linux. How can it be prevented?
Best Answer
In order to prevent an attacker from booting from a repair disk and using that to gain access to your system, there are several steps you should take. In order of importance: