NoLMHash - A utility to help you disable LAN Manager hash (LM hash)
As seen in Microsoft's knowledge base:
How to prevent Windows from storing a LAN manager hash of your password in Active Directory and local SAM databases http://support.microsoft.com/default.aspx?scid=KB;EN-US;q299656& (support.microsoft.com)
Instead of storing your user account password in clear-text, Windows generates and stores user account passwords by using two different password representations, generally known as "hashes." When you set or change the password for a user account to a password that contains fewer than 15 characters, Windows generates both a LAN Manager hash (LM hash) and a Windows NT hash (NT hash) of the password. These hashes are stored in the local Security Accounts Manager (SAM) database or in Active Directory.
The LM hash is relatively weak compared to the NT hash, and it is therefore prone to fast brute force attack. Therefore, you may want to prevent Windows from storing an LM hash of your password. This article describes how to do this so that Windows only stores the stronger NT hash of your password.
Download version 1.0.0 (click here for .exe) 2005/04/05
Application written by Christopher Carey using Visual Basic .NET 2003