{"id":201,"date":"2005-12-16T22:06:00","date_gmt":"2005-12-16T22:06:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm"},"modified":"2007-05-28T15:24:57","modified_gmt":"2007-05-28T14:24:57","slug":"securing-your-windows-computer-with","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm","title":{"rendered":"Securing your Windows computer with syskey"},"content":{"rendered":"<p><!--113477187347617420-->At an event a few weeks back, <a href=\"http:\/\/blogs.technet.com\/steve_lamb\/\">Steve Lamb<\/a> mentioned using the syskey utility to secure a Windows system.  Even though it&#8217;s a standard Windows utility, I&#8217;d never heard of it before and <a href=\"http:\/\/blogs.technet.com\/steve_lamb\/archive\/2005\/11\/25\/415098.aspx\">Steve has now written about syskey on his blog<\/a>, along with <a href=\"http:\/\/blogs.technet.com\/steve_lamb\/archive\/2005\/11\/27\/415143.aspx\">a follow up post on storing the keys on a USB token<\/a> (think of it as a kind of ignition key for a Windows computer).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At an event a few weeks back, Steve Lamb mentioned using the syskey utility to secure a Windows system. Even though it&#8217;s a standard Windows utility, I&#8217;d never heard of it before and Steve has now written about syskey on his blog, along with a follow up post on storing the keys on a USB &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Securing your Windows computer with syskey<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[99,43],"class_list":["post-201","post","type-post","status-publish","format-standard","hentry","tag-windows-xp","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing your Windows computer with syskey - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing your Windows computer with syskey - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"At an event a few weeks back, Steve Lamb mentioned using the syskey utility to secure a Windows system. Even though it&#8217;s a standard Windows utility, I&#8217;d never heard of it before and Steve has now written about syskey on his blog, along with a follow up post on storing the keys on a USB &hellip; Continue reading Securing your Windows computer with syskey\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2005-12-16T22:06:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-05-28T14:24:57+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/12\\\/securing-your-windows-computer-with.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/12\\\/securing-your-windows-computer-with.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Securing your Windows computer with syskey\",\"datePublished\":\"2005-12-16T22:06:00+00:00\",\"dateModified\":\"2007-05-28T14:24:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/12\\\/securing-your-windows-computer-with.htm\"},\"wordCount\":77,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Microsoft Windows XP\",\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/12\\\/securing-your-windows-computer-with.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/12\\\/securing-your-windows-computer-with.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/12\\\/securing-your-windows-computer-with.htm\",\"name\":\"Securing your Windows computer with syskey - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2005-12-16T22:06:00+00:00\",\"dateModified\":\"2007-05-28T14:24:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/12\\\/securing-your-windows-computer-with.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/12\\\/securing-your-windows-computer-with.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/12\\\/securing-your-windows-computer-with.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing your Windows computer with syskey\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing your Windows computer with syskey - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm","og_locale":"en_GB","og_type":"article","og_title":"Securing your Windows computer with syskey - markwilson.it","og_description":"At an event a few weeks back, Steve Lamb mentioned using the syskey utility to secure a Windows system. Even though it&#8217;s a standard Windows utility, I&#8217;d never heard of it before and Steve has now written about syskey on his blog, along with a follow up post on storing the keys on a USB &hellip; Continue reading Securing your Windows computer with syskey","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm","og_site_name":"markwilson.it","article_published_time":"2005-12-16T22:06:00+00:00","article_modified_time":"2007-05-28T14:24:57+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Securing your Windows computer with syskey","datePublished":"2005-12-16T22:06:00+00:00","dateModified":"2007-05-28T14:24:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm"},"wordCount":77,"commentCount":2,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Microsoft Windows XP","Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm","name":"Securing your Windows computer with syskey - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2005-12-16T22:06:00+00:00","dateModified":"2007-05-28T14:24:57+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Securing your Windows computer with syskey"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":700,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/04\/putting-pki-into-practice.htm","url_meta":{"origin":201,"position":0},"title":"Putting PKI into practice","author":"Mark Wilson","date":"Sunday 9 April 2006","format":false,"excerpt":"Recently, I blogged about public\/private key cryptography in plain(ish) English. That post was based on a session which I saw Microsoft UK's Steve Lamb present. A couple of weeks back, I saw the follow-up session, where Steve put some of this into practice, securing websites, e-mail and files. Before looking\u2026","rel":"","context":"In \"Microsoft Windows\"","block_context":{"text":"Microsoft Windows","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":815,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/06\/improvements-to-the-windows-firewall-in-vista.htm","url_meta":{"origin":201,"position":1},"title":"Improvements to the Windows firewall in Vista","author":"Mark Wilson","date":"Wednesday 13 June 2007","format":false,"excerpt":"I recently attended a Windows Vista security session at Microsoft, presented by Steve Lamb. Windows Vista security is too broad to cover in a single presentation (or even in a single blog post!) but some of the key points that Steve concentrated on were around the Windows firewall and IPsec.\u2026","rel":"","context":"In \"Microsoft Windows Vista\"","block_context":{"text":"Microsoft Windows Vista","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows-vista"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":749,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm","url_meta":{"origin":201,"position":2},"title":"Secure, remote administration of a Mac OS X computer from within Windows","author":"Mark Wilson","date":"Thursday 22 March 2007","format":false,"excerpt":"In a recent post about multimedia file format conversions, ripping DVDs, playback and more, I linked to a number of Mark Pilgrim's \"How To\" articles; however there was one which wasn't relevant to that particular post - how to use your Mac from anywhere (although it is intended for remote\u2026","rel":"","context":"In \"Apple Mac OS X\"","block_context":{"text":"Apple Mac OS X","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/mac-os-x"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":750,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-linux-computer-from-within-windows.htm","url_meta":{"origin":201,"position":3},"title":"Secure, remote administration of a Linux computer from within Windows","author":"Mark Wilson","date":"Friday 23 March 2007","format":false,"excerpt":"Yesterday I wrote about using SSH to securely connect to a Mac from a Windows PC. At the time, I suggested that the advice should be equally applicable to a Linux system, or even to a Windows Server with an SSH server installed and I've since tested it with a\u2026","rel":"","context":"In \"Linux\"","block_context":{"text":"Linux","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/linux"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":751,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-windows-computer.htm","url_meta":{"origin":201,"position":4},"title":"Secure, remote administration of a Windows computer","author":"Mark Wilson","date":"Saturday 24 March 2007","format":false,"excerpt":"I was going to call this post \"secure, remote administration of a Windows computer from within Windows\" but that sounds a bit odd, unless you realise that the last two posts have been \"secure, remote administration of a Linux computer from within Windows\" and \"secure, remote administration of a Mac\u2026","rel":"","context":"In \"Microsoft Windows\"","block_context":{"text":"Microsoft Windows","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":115,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/05\/scripting-changes-to-resource.htm","url_meta":{"origin":201,"position":5},"title":"Scripting changes to resource permissions in Windows","author":"Mark Wilson","date":"Wednesday 12 May 2004","format":false,"excerpt":"Earlier today, I needed to include some registry permissions changes within a command line script that I was writing. Microsoft knowledge base article 245031 discusses a method using the regini.exe resource kit tool for Windows NT 4.0; however, for Windows 2000, XP and Server 2003 there is the SubInACL utility\u2026","rel":"","context":"In \"Microsoft Windows\"","block_context":{"text":"Microsoft Windows","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=201"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/201\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}