Tuesday, July 01, 2008

Windows XP Service Pack 3 FAQ

It's time to say goodbye to an old friend. Windows XP Service Pack 3 (SP3), due in the second quarter of 2008, will be the final XP service pack , according to Microsoft. It can't come a moment too soon: XP SP2 (see my review) shipped over three years ago at this writing, and the company has since shipped hundreds of hot-fixes for the OS, giving users a painful updating experience, with multiple reboots. XP SP3 will consolidate all of these fixes into a single package and, surprisingly, add a few new features, including some that--go figure--debuted first in XP's successor, Windows Vista. Here's what I know about Windows XP Service Pack 3.

Q: What is Service Pack 3?
A: Windows XP Service Pack 3 (SP3) is the final Windows XP service pack, a collection of previously-released fixes and product enhancements, as well as a few new features that are unique to this release.
Q: Does SP3 include everything from SP1 and SP2 or do I need to install those first?
A: Though XP SP3 aggregates all of the previously-released XP fixes, Microsoft now says that you will need to install at least SP1 on XP before installing SP3. The company recommends installing SP2 first as well, though that is not required.
Q: What versions of Windows XP will work with SP3?
A: You can apply Service Pack 3 to Windows XP Home Edition, Professional Edition, Tablet PC Edition (any version), or Media Center Edition (any version).
Q: What about Windows XP Professional x64 Edition?
A: SP3 does not apply to the x64 version of Windows XP. Instead, that operating system is updated via service packs aimed at Windows Server 2003. The latest Windows 2003 service pack is SP2.
Q: Windows XP SP2 was released over three years ago. Why the delay on SP3?
A: While Microsoft is an enormous company with over 77,000 employees worldwide and over $50 billion in annual revenues, its organizational structure actually constrains which products are actively developed in some cases. For example, while a large team of developers, product managers, and program managers are involved during the ramp-up to any major OS release, Microsoft then pushes the product into its support organization for follow-up development in the form of hot-fixes, service packs, and so on. Other teams work on out-of-band updates that are typically shipped via the Web and, eventually, a new or existing team is constituted to work on the next major release and the entire process begins anew.
With Windows XP, however, Microsoft was forced to temporarily halt development on XP's successor, Windows Vista, in order to complete XP SP2. That's because this release, though provided to customers for free as a typical service pack, was in fact a major OS upgrade and was developed outside of the company's support structure, a first for any service pack release. After XP SP2 was completed, the people involved with that project moved onto other things, typically Vista or Windows Server 2008.
In the case of Windows XP SP3, Microsoft simply dedicated every available employee it could to completing Windows Vista, which by that time was years behind schedule. So it's only been since the beginning of this year that anyone turned their attention back to XP's next and neglected service pack.
Q: What are these new features I keep hearing about?
A: Windows XP Service Pack 3 will not include any major new features, but it will include four minor new features that improve the system's reliability and security. Contrary to reports, Microsoft has been very up-front about these functional additions for quite some time now.
These new features include:
Network Access Protection compatibility. Announced years ago, this feature allows Windows XP machines to interact with the NAP feature in Windows Server 2008. This functionality is built into the RTM version of Windows Vista as well.
Product Key-less install option. As with Windows Vista, new XP with SP3 installs can proceed without entering a product key during Setup.
Kernel Mode Cryptographics Module. A new kernel module that "encapsulates several different cryptographic algorithms," according to Microsoft.
"Black hole" router detection algorithm. XP gains the ability to ignore network routers that incorrectly drop certain kinds of network packets. This, too, is a feature of Windows Vista.
And that's about it. Nothing dramatic, as promised.
Q: That's it? Is there anything else?
Nothing major. Some features have actually been removed, like the taskbar-based Address Bar option.
Q: Why is Microsoft even bothering to release this update? Isn't everyone moving to Windows Vista?
A: Given the relative security, stability, and reliability of XP with SP2, and the subsequent release of Vista, XP SP3 may seem like a pointless update, but nothing could be further from the truth. Many businesses will roll out new XP-based PCs in the coming years, and as anyone who's had to update an XP SP2 system can tell you, the 100+ updates that Microsoft has shipped since SP2 can be a nightmare to deploy. If you're already running XP and have been regularly updating your systems all along, the release of XP SP3 will be a minor event. But if you have planned XP deployments in the future, look very carefully at this release and consider it the baseline for your next generation of PCs. Or, you could always consider Vista, which will of course be updated with genuine new features far longer than will XP.
Q: When will Microsoft ship XP SP3?
A: Microsoft finalized Windows XP Service Pack 3 on April 21, 2008 and released it publicly to the Web on April 29, 2008.
Here's the complete Windows XP SP3 release schedule:
RTM (release to manufacturing): April 21 Windows Update (optional update): April 29 Microsoft Download Center: April 29 MSDN/TechNet download: May 2
Q: Is it possible to slipstream or integrate SP3 with Windows XP?
A: Yes! My complete Windows XP Service Pack 3 Slipstreaming Guide is now available.

AirPort Utility and Firmware updated

In addition to releasing Mac OS X 10.5.4, Apple updated its AirPort Utility software and Firmware for the AirPort wireless base stations.
AirPort Utility 5.3.2 includes “general fixes and compatibility updates,” according to notes provided with the update. The Firmware is compatible with Time Capsule, AirPort Extreme and AirPort Express with 802.11n.
Firmware 7.3.2 includes “bug fixes” according to Apple.
There are three updates available – one for Leopard, another for Tiger and a third for Windows.

Sorting through the Mac OS X 10.5.3 update

Editor’s Note: Due to an error, the original article analyzed the wrong bom file. The original article below has been corrected to reflect the correct file, and an explanation for the mistake can be found elsewhere on the site.

Eight months into the Leopard era, Apple unleashed the third update to Leopard, with Wednesday’s release of OS X 10.5.3. By way of comparison, the 10.3.3 and 10.4.3 updates both came within five months of the release dates for Panther and Tiger, respectively.
As with most of Apple’s recent OS X updates, the 10.5.3 version just screams for a broadband connection, weighing in at more than 400MB, depending on which Mac you have and which version your machine deems you to require. So what do you get in exchange for your download time investment? Apple details many—but not all—of the changes in this Knowledge Base document. I won’t bother repeating everything listed there, but here are a few of the more important highlights:
Spotlight searching on mounted AFP volumes has been improved.
Wireless connectivity has been improved, both for AirPort in general and when using Time Capsule.
A number of Automator bugs have been fixed, which is great news for many people, myself included. One in particular—a bug wherein a Finder plug-in wouldn’t work if the first step was “Get Selected Finder Items”—had affected a number of plug-ins that I use regularly. These now all work in 10.5.3.
Some bugs with Spaces have been fixed, including one where switching to another application via the Dock takes you to another Space, even if that program had an active window in the current space.
A number of Time Machine bugs have been fixed, and Time Machine backups can now be run when your Mac is running on its battery. Previously, you had to connect to a power supply before Time Machine would run.
There are fixes in other programs as well, covering programs such as iCal, iChat, Parental Controls, Voice Over, and the Finder, all of which are detailed in the linked Knowledge Base document.
But what else has changed in OS X 10.5 that Apple hasn’t told us about? I’ve been digging through the new release, looking for any areas that have received updates beyond what’s been disclosed. The only substantive visible change I found is in iCal, where there’s a new setting in the General section of the calendar app’s preferences for controlling how scrolling works in Week View mode. You can now choose between scrolling by weeks (the way OS X 10.5.2 worked) or by days.
It would’ve been nice if Apple gave us a hidden key override to toggle the settings in real time while scrolling (i.e. holding Option would scroll by weeks if you had the pref set to days), but if the update offers that, I can’t find it.
Beyond that visible change, there are many behind-the-scenes changes in 10.5.3, including both major and minor alterations. Here’s what I’ve discovered—and this is by no means a comprehensive list, so feel free to add your own observations as you use this latest update.
Something that’s not mentioned at all in Apple’s note, but is clearly quite important, are the revised graphics drivers for ATI and Nvidia graphics cards. The 10.5.3 update supposedly delivers improved graphics performance—something that was hinted at in this week’s news on Delicious Library 2.0, which shipped with a warning that those not running 10.5.3 will experience graphics slowdowns. Digging through the installer file, I can see that there are updated extensions for a large number of ATI and Nvidia cards (including on-board video in the mini and MacBooks) in the 10.5.3 update.
Other system extensions have also received updates—everything from AirPort to the keyboard backlight to fan management to power management to RAID to storage management. The Multitouch gesture capabilities get an update, as do USB, FireWire, and Bluetooth.
There are a ton of modified files in the CoreServices folder, where many critical features of OS X reside. Changes here include the Dock, the Finder, file synchronization, the installer, various menu extras, and the process that manages Time Machine, among others.
A number of Dashboard Widgets have been updated—the iCal widget, Unit Converter, and Weather. The Web Clip widget received updates to its non-English language files.
iSync received an update.
A number of other applications received updates of some kind, but the changes were either minor (noted in parentheses below), or I can’t find any detail on what’s changed. Items on this list include Dictionary (something to do with Wikipedia support), Exposè, Photo Booth, Preview, Safari (some language changes on preference panels; help files), Bluetooth File Exchange, Directory, Disk Utility (changes in many plug-ins, including those that handle disk first aid, info windows, partitioning, and RAID), Migration Assistant (lots of changes and a new version number, 1.2.1), RAID Utility (changes in the main window and menu), Remote Install OS X, and X11.
Whew. That’s a heck of a lot of stuff to update, and it’s nowhere near complete—these are only the things that seemed worthy of highlighting, out of more than 21,000 changed files in this update.
As an aside, if you’re curious as to how you can see what’s been installed by the 10.5.3 update yourself, the key is reading the “bom” file that’s created when you run the installer. You’ll have to use Terminal to read the file, but here’s how you can dump its contents to a text file in one command. Open Terminal and type the following, then press Return:lsbom /Library/Receipts/boms/com.apple.pkg.update.os.10.5.3.bom > ~/Desktop/1053changes.txt
You can then open the 1053changes.txt file (which will be on your Desktop) in any text editor, and see each and every file that was modified by the installer. Keep in mind that just because a given file was changed, that doesn’t mean you’ll see new features in that program—the changes could have been behind-the-scene bug fixes, or minor changes in language that only appear on certain screens. Still, scanning this file gives you a good sense of the breadth of this update.
In my limited time with 10.5.3, I haven’t found any new bugs that this update has introduced. That doesn’t mean Apple has fixed all the bugs in Leopard, of course—I’m still waiting for the ability to view more than three columns in Spotlight’s search results, as but one example. But Apple’s focus on continual improvements in OS X 10.5 is good news for all of us consumers.

Inside the OS X 10.5.4 update

The most significant thing about what’s changed in OS X 10.5.4 may be what hasn’t changed with Monday’s release of the OS X update. The ARDAgent security hole—discovered just a few weeks ago—remains unplugged. This actually isn’t all that surprising—if the chatter around the Internet is to be believed, Apple has been working on the 10.5.4 update for quite a while, predating the discovery of the ARDAgent issue. System updates are complex things with many inter-related parts, and adding in a fix for the ARDAgent issue would have required more testing, and perhaps delayed the release of 10.5.4.
So what will happen with the ARDAGent hole? Only Apple knows, of course, but I think we’ll see a standalone security update released in the near future to address that issue (as well as any other security issues that haven’t been patched with the 10.5.4 release).
As for new things introduced in OS X 10.5.4, I dug around a bit in the bom files, as I did with May’s 10.5.3 release. This latest update is much smaller than 10.5.3, and I didn’t find anything nearly as interesting as I did last month, other than the non-fix for ARDAgent. There are a slew of extension updates, though it’s tough to figure out exactly what changes those may entail.
There were a number of updates to PDF-related utilities, including the Mail PDF, Save as PDF-X, and Save PDF to Web Receipts Folder workflows, as well as changes to many PDF-related Automator actions. Non-English language files in many programs were updated, and there was some sort of change to Mail’s preferences, though I couldn’t see any obvious change when compared with Mail on a 10.5.3 machine. iChat received updates to the balloons, boxes, and compact styles, as well as some (also not obvious) changes in its preferences.
The Apple-provided dictionary in Dictionary was also updated, adding (at a minimum) the definition of MobileMe, Apple’s soon-to-launch online service:
An Internet service from Apple Inc. for Macintosh computers, iPhone, iPod touch, and PCs. A MobileMe subscription provides push email, push contacts, and push calendar to keep your data automatically up-to-date on all your devices.
Given the size of the updated file, I expect there are more new definitions, but MobileMe was the only one I could think to check.
There are also changes on the Unix side of OS X. Some Perl and Ruby related bits were updated, as were snmp-related Unix programs, and various other Unix components, such as the pasteboard server.
I’ve been running 10.5.4 on two machines now for a few hours, and haven’t experienced any issues—though as with any update, I strongly recommend having a current backup before proceeding.

Setting up file Sharing on APPLE PC's

In order to use a synchronization utility to sync two Macs, one computer must be able to access the other's hard drive.
On a Local Network The easiest way to set up file sharing is with OS X's built-in file-sharing feature. To turn it on, open the Sharing preference pane and select the File Sharing option (see "Sharing Preference Pane"). Click on the plus-sign (+) button under Shared Folders, and select a folder or volume to share; note that you'll be able to synchronize only items within this folder or volume, so you'll likely want to choose your user folder. Your name should appear in the Users list with read and write access, so you can use your own user name and password to log in to this computer from another Mac. To enable another user to connect with a password different from yours, click on the plus-sign button under Users, select an existing name or click on New Person, and enter a user name and password.
Now, on another Leopard-running Mac, look in the sidebar of any Finder window; the computer you just activated file sharing on should appear under Shared. Select that computer's icon, click on Connect As, and enter the user name and password you set up for that computer. Once you're connected, double-click on the name of the shared folder or volume to mount it-the other computer's files should now be visible to any synchronization utility.
By adding your user folder (or another folder) to the Sharing pane, you can make it available to other Macs on your network.
Over the Internet-Back to My Mac Accessing another Mac is trickier when the two computers are not on the same local network. If you're a .Mac member running Leopard and you've activated Back to My Mac (via the the .Mac preference pane's Back To My Mac tab) on each computer, you should be able to see your other computers even when you're on different networks (say, one computer at home and the other at work), though you may have to configure your router or firewall to enable outside access. (Apple provides detailed usage and troubleshooting information; check it out if the feature doesn't work as expected).
Over the Internet-Other Options If you're not a .Mac member or you're not running Leopard, accessing a Mac remotely requires more effort. One approach is to use a VPN (virtual private network). For example, if you have file sharing turned on at work and you connect to your corporate network from home via a VPN, your work Mac's volume should be accessible as with a local Mac.
Going in the other direction (accessing your home computer from work) without a VPN requires that you know your home Mac's public IP address. (To find this out, open a Web browser on your home Mac and go to whatismyip.com. If you don't have a static IP address, try a Dynamic DNS service such as DynDNS (basic service is free) to assign a domain name to your home Mac; then the included software informs the company's name servers whenever your Mac's IP address changes, so you can always connect using the domain name regardless of the current IP address.
In addition to knowing your home Mac's IP address or domain name, you may need to set up your router to use port forwarding, in which all requests from outside your home network directed to a particular port (such as 548, the one used by AFP for file sharing) go to a specific computer on your network. You can learn more about setting up port forwarding at PortForward.com.
Once you have port forwarding configured at home, go to your work Mac and choose Go: Connect To Server in the Finder. In the Server Address field, enter afp:// followed by your home computer's IP address or domain name, and click on Connect. If everything goes well, your home Mac's drive will mount in the Finder.
If All Else Fails If you lack the geek mojo to work through all those details but you still need to sync, say, a home computer and a work computer, consider a slightly lower-tech alternative: an external hard drive that you shuttle between locations. You can either use the drive to store all the files you need to access in both places, or synchronize your work Mac with the drive before and after switching locations.

Wednesday, June 25, 2008

Microsoft Extends Support for Windows XP To 13 Years

With many business and individual PC users rejecting Windows Vista, Microsoft took an unprecedented step this week by promising support for Windows XP for a full 13 years. That is three years longer than it has allowed for previous Windows operating systems.

In a letter sent to customers this week, Bill Veghte, a Microsoft vice president, also seemed to confirm that Windows 7 will be released in 2010. That OS, Veghte wrote, will ship "approximately three years" after Vista became available in January 2007.

Avoiding Vista

Meantime, security patches and updates to Windows XP will be provided until April 2014, Veghte promised. In what could be considered an understatement, he wrote, "Our ongoing support for Windows XP is the result of our recognition that people keep their Windows-based PCs for many years."

Many large businesses have avoided upgrading to Windows Vista, which has been plagued with widely publicized problems, including incompatibilities with drivers for legacy hardware and applications. Upgrading to Vista could also be very expensive for enterprises that would need to upgrade older hardware. Many businesses and individuals have opted to buy Windows XP on new PCs.

While June 30 remains the cutoff date for selling Windows XP, retailers such as Dell are still selling preconfigured PCs with XP. And enterprises with volume licensing contracts will still be able to install XP even on new machines.

Downgrade Option

In addition, Microsoft has promoted a licensing loophole that allows new hardware buyers to purchase Windows Vista and then downgrade it to a previous version of Windows. Microsoft has cited such purchases as evidence of support for Vista, but many Web postings have disputed that.

"It's true that we will stop selling Windows XP as a retail packaged product and stop licensing it directly to major PC manufacturers," Veghte's letter says. "But customers who still need Windows XP will be able to get it."

Microsoft will also continue to sell a version of Windows XP to makers of low-cost computers through June 2010. Such machines as the Asus Eee PC are incapable of running Vista and the alternative would be for the makers to install open-source Linux as the operating system.

Friday, May 30, 2008

Symantec Admits Fault in Windows XP SP3 Registry Corruption

You may recall my earlier story on registry corruption for certain users upgrading to Windows XP SP3. The cases of registry corruption seemed to have a common thread: Symantec security products. Originally Symantec blamed Microsoft, but in a post on a Symantec support forum, a senior manager with Symantec indicated the fault may indeed lie with Symantec's products.
Reese Anschultz said users of Norton Internet Security, Norton AntiVirus and Norton 360 should switch off the "SymProtect" feature before trying to install XP SP3.
After a lot of testing, we’ve reproduced a number of different cases where applying the XP SP3 upgrade adds additional registry keys within already existing Symantec registry keys. The Symantec keys affected vary from machine to machine and the effects of these added keys vary as well. We are still trying to understand why the upgrade is adding these keys. We have determined that the SymProtect feature is involved, though this issue is not exclusive to Symantec customers. We’ve seen reports from various users who are not running Symantec products.
To help prevent this issue from occurring, you should disable SymProtect prior to installing the Windows XP SP3 upgrade. This setting, in Norton Internet Security 2008 and Norton AntiVirus 2008, can be found within the Options page as “Turn on protection for Norton products.” In this case you should uncheck the box prior to the upgrade. After the upgrade is complete, please remember to re-enable this feature.
It should be noted, however, that this workaround only addresses issues with Symantec products. You may still run into similar problems with other products affected by this XP SP3 upgrade issue. For Norton SystemWorks 2008 you have to go to the Advanced Options UI that is under Settings. Next, click on "Norton SystemWorks Options" and select the General tab. Lastly, uncheck the box that says, "Turn on protection for my Symantec product”.
For Norton SystemWorks 2008 Premier you can use either the previous instructions or the Norton AntiVirus instructions.
For Norton 360, disable the "SymProtect Tamper Protection" quick control within the settings page.
For those who have already applied the upgrade and are running into problems, we’re working on a stand-alone tool that would delete the extraneous registry keys. We’ll post that on this forum as soon as it’s available.
No post of a tool yet. Additionally, a later post on the same thread seemed to indicate a similar issue with the installation of Vista SP1, although that same Symantec manager noted they hadn't noted such reports previously.
Last week, Symantec blamed a Microsoft file named fixccs.exe, part of the XP SP3 upgrade package, for the extra registry entries. Now, however, it seems that it was a combination of fixccs.exe and SymProtect which caused the issue. SymProtect is technology designed to protect Symantec security software from being hacked by malware.
"Fixccs.exe adds registry keys during the SP3 update process and then attempts to delete them," said a Symantec spokeswoman. "SymProtect prevents changes to the registry keys. Thus, it prevents the deletion of the keys added by fixccs.exe."
Makes sense, right? Of course, as noted in the forum post, Symantec continues to contend that the registry problems are not exclusive to Symantec products.

Source: By Tech Ex http://technologyexpert.blogspot.com/

Windows XP Service Pack 3 Issues

The latest service pack for Windows XP continues to cause problems for users. According to an online user forum, the latest glitch in Windows XP Service Pack 3 (SP3) causes problems with the remote desktop access feature of Windows Home Server.
On the We Got Served U.K.-based Windows user forum, Windows XP users running Windows Home Server, Microsoft's home storage and local networking server, report that SP3 is cutting off their access to the server from their PCs. The remote desktop access feature would ask users to add their home server's Web site address in order to access it even after they already had, users reported.
According to a user on Microsoft's Windows Home Server forum, the problem arose because Windows XP SP3 by default disables Terminal Services Active X control as part of its security model. The user, ColinWH, posted a fix for the problem that outlines how to enable the Terminal Services ActiveX control in Internet Explorer.
The Windows Home Server problem is not the first that users -- or Microsoft -- have had with the latest XP service pack. Scheduled for release on April 29, Windows XP SP3 was held up for a week by Microsoft because of incompatibilities between the service pack and one of Microsoft's own applications, retail chain management software called Microsoft Dynamics RMS. The problem even affected the Windows Vista Service Pack 1 set of updates.
Then, after the service pack's release on May 6, users reported that XP SP3 put some AMD-based PCs into endless reboots. Eventually, the problem was identified as affecting certain Hewlett-Packard PCs, and Microsoft posted information for fixing it on the Web.
Microsoft could not be immediately reached for comment on Monday.

Friday, May 16, 2008

Windows XP Outlook Express Headaches: When I try to download mail, I sometimes get a server timeout message.

Cause Outlook Express provides a timeout message

after a certain period of time when there is no activity with the mail server. If you are getting this message, you can increase the timeout value.
The Pain Killer To increase the timeout value, follow these steps:
In Outlook Express, click Tools Accounts.

1. Click the Mail tab. Select your account, and click the Properties button.
2. Click the Advanced tab, shown here. In the Server Timeouts section, increase the value by moving the slider bar to the right. Click OK when you are done.

How Do They Crack Your Password?

Reader Rich Brozenec writes: I read your story about passwords. I have a question. Almost all my internet accounts (banks, Amazon, credit cards, etc.) have a limit on the number of password tries they allow [before timing out additional attempts]. Your story implies an infinite number of attempts using various combinations of letters and numbers, but is that really the case, or is there a way around these limits?
A little backstory on how passwords are cracked is in order. As some emailers and commenters have noted, "brute force" password cracking is probably not the most popular method by which passwords are broken. Social engineering, phishing, and other nefarious methods are actually much easier: All of these involve you willingly giving up your password to a malicious hacker through some form of misdirection and deceit. You may get a call from "your bank" with a problem on your account. Or you may get an email from "eBay" with a question about your listing... which takes you to a phony website.
The most secure password in the world won't protect you against hacking attempts like these. If you actually tell someone your password, you're out of luck.
The kind of password attacks I'm talking about when I write stories about password security and strength involve brute force attacks of various sorts. These attacks typically involve the theft of password records by various means. You read about them every day: Hackers compromise networks and abscond with user data. Or, more commonly, someone steals a laptop loaded with user records for some company or another. (User IDs are usually not encrypted and are linked directly to the hashed password.)
Most of the time, though, just having this user data doesn't mean your password is now in the hands of hackers (though if you read that a company you deal with has been victimized, you should always change your password as a matter of precaution). That's because most companies store passwords in encrypted formats called hashes. A hash is created by taking your password, applying a mathematical function to it, then storing the result of that function in the database instead of the actual password. When you log in to a website, the site runs that same math function against your password, then checks the database to see if the hashes match. If they do, you're in.
The reason hashes are secure is that they are not reversible. Say your password is daisy123; its hash may be 1b3c2c45d0a977b508f637097a94cbfb. (And in fact, it really is in one of the most common hash systems.) It's easy to go from daisy123 to the hash. Not so easy to go the other way. Thus, it's much safer to store the hash. Make sense so far?
So, what happens if a hacker knows the hash of your password? He tries out likely passwords to see if he can get a match. Again, it's easy to hash several hundred passwords per second, and eventually he'll get to daisy123, since it is, as noted in a prior article, a quite insecure password. But if your password is appropriately complex, he'll probably never be able to crack it: Having the hash will be as useless as having no information about your password.
There are copious other methods for cracking passwords (and there are even online databases of hashes that make looking up common passwords child's play), but this is the most common way, especially when cracking passwords in bulk (when you have thousands or millions of hashes to look through). It shakes out pretty much the same way every time: If a thief absconds with 100,000 user records, a relatively simple brute force attack against those hashes using common cracking software will probably net 20,000 passwords he can use.
In other words: Be safe out there.