欢迎来到我的地盘:今天是

若得山花插满头,莫问奴归处!

  博客园 :: 首页 :: 博问 :: 闪存 :: 新随笔 :: 联系 :: 订阅 订阅 :: 管理 ::

the secret is to hack the um.dat file to remove the Admin password

from offset 80 the bytes are (all numbers are hex)

0:80  55 55 bc 7f 41 64 6d 69 6e 00 00 00 00 00 00 00
0:90  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0:a0  00 00 00 00 90 6e 00 00 a8 01 00 00 00 00 00 00

Just load the um.dat file into a hex editor and change the bytes from =
offset 80 to exactly what is shown above. When the SourceSafe admin tool =
starts it believes that the admin password has never been set.

the hex values above are taken from a 'virgin' um.dat file

of course, you didn't get this from me....and ALWAYS backup first (just =
in case I'm wrong)

有朋友看不懂,我用中文解释一下:

如果忘记了密码,打开你vss数据库所在的文件夹,打开data目录,找到um.dat文件,用hex编辑器打开编辑它,从offset 80的55 55 开始将值改为如上文所述的样子,然后保存,这样um.dat文件就回到了初始状态(virgin ?  :)),然后打开vss admin,用admin用户登录,不需要密码了!

 

posted on 2007-07-17 15:59  莫问奴归处  阅读(730)  评论(0编辑  收藏  举报
轩轩娃