Microvax 3100 VMS 7.3 password reset
bill.gunshannon at hotmail.com
Thu Nov 12 09:42:06 CST 2020
On 11/12/20 10:02 AM, Antonio Carlini via cctalk wrote:
> On 12/11/2020 13:56, Bob Smith via cctalk wrote:
>> I have a copy of the process in my stash.... it is findable on the web.
>> I used to wear this funny hat, and used the methoo a few times - even
>> on my cluster at home.
>> It does work.
>> On Thu, Nov 12, 2020 at 8:13 AM Richard Curtis via cctalk
>> <cctalk at classiccmp.org> wrote:
>>> I beg to differ with HP's recommendation (in their doc set) for
>>> Devin'ssituation. HP's description is meant for customer sites to
>>> have a copyof usernames/passwords to which they can revert for nasty
>>> situationssuch as a corrupted SYSUAF.DAT. *If* this system has the
>>> 'alternate'file, it should have the same problem as the original, of
>>> unknownpasswords. What Devin needs is instructions to break into the
>>> I happen to know how to do that (used to work in OpenVMS
>>> Engineering).Is that something that should be discussed here?
> "breaking in if you have physical console access" is not at all secret:
> it used to be in the OpenVMS FAQ and (iirc) in the manuals. It's fine to
> discuss it anywhere. VMS Engineering would have told you to make sure
> you ensured that physical console access was only available to
> authorised personnel.
FREEWARE60/VMSFAQ Item 5.5.1
As an interesting aside, I was very surprised at how hard it was
to find this on the Web. The notion that everything on the Internet
is preserved for posterity is really becoming silly.
As another aside, it is rather interesting how many hits for VAX and
VMS I got that have nothing to do with what we think of as VAX and VMS.
More information about the cctech