|Lets assume that software X is design to alter some shells in windows xp sp3 from computer A to computer B.<both running windows xp sp3> (where computer A is the sw developer's PC.)|
Computer A has a user account named: User Y and is password protected.
Software X is build with shells collected from computer A. The shells and files are:
Then software X is installed on computer B, the latter shows the account of user Y and request for a password..how can this be possible? (Note that computer B was not password protected before sw X