Forum Discussion
bypassnro Removal
The Windows 11 Insider Preview Build 26200.5516 release notes reads "We're removing the bypassnro.cmd script from the build to enhance security and user experience of Windows 11".
Given the many users who experience scores of unauthorized login-attempts and eventually losing their account to hackers, https://answers.microsoft.com/en-us/outlook_com/forum/all/why-do-i-have-so-man-unsuccessful-sign-in-attempts/fe4d3329-068f-40ce-8830-9bd9f118a0af,
it probably should have read "We're removing the bypassnro.cmd script from the build because we're tired of people trying to prevent us from data mining their accounts".
Great work Microsoft!
JourneymanMC wrote:the many users who experience scores of unauthorized login-attempts and eventually losing their account to hackers
If you're wondering what happens to your attackers, people who actually do this get an IP ban, regardless of whether or not Microsoft allows you to skip the OOBE using a registry key. If you use a NIST-Approved Cryptographically Secure Random Number Generator, and the full range of printable Unicode ( UTF8 / UTF16 ) Characters, generating a character array with 16 values, each value not being a duplicate of another reference type in that array, along with two factor authentication, then you should have no issues with crude dictionary-based attacks that utilize a brute force method of repeated logins. I also use Transparent SME ( AMD version of Intel's TME / "Total Memory Encryption" ), and a password manager that encrypts the values in memory, as a byte array, to achieve FIPS-140 compliance, for my own personal benefit. It is true that it is faster to use an encrypted byte array using the index to represent each Unicode character, as character types are reference types, not value types, so when it comes time to update a form control, display the values on a console, or save them to a file, it is a one step process to convert them, so you don't have to recast reference types every single time something changes ( for this reason it is smarter to use C#, C++, GOLANG, etc, and not RUST. ) I also use SysInternal's Secure Delete to erase my browsing history or leftover files, while zeroing the drive itself every once in awhile, even if it seems like it would have a trivial impact on the outcome, due to the fact that the MFT records are difficult to recover even using the Windows File Recovery Tool.
- JourneymanMCApr 03, 2025Iron Contributor
What a load of cr*p, time and time again I read peoples helpless vailing that their MS-account have been hacked, blocked or meddled with. It is every day, all day, again and again listed on Microsoft Community Support.
And none of the cr*p you've listed can be set up by the average Windows users.