akreel
Member
A few months ago, we floated a topic about trojan horses and passwords in programs. Consider this little gem:
A customer called, asking if there was any way to bypass the password in one of our PLCs. Apparently, the guy who wrote the program for dozens of machines took the source code with him when he "left the company." All of the installed units are password protected. You can't get the program out, and they have no source code to dump in if they clear the memory. Right now, they're trying all the password combinations, one at a time in order to recover the source code.
A customer called, asking if there was any way to bypass the password in one of our PLCs. Apparently, the guy who wrote the program for dozens of machines took the source code with him when he "left the company." All of the installed units are password protected. You can't get the program out, and they have no source code to dump in if they clear the memory. Right now, they're trying all the password combinations, one at a time in order to recover the source code.