I've looked through both text files and I do not see any semblence my password whatsoever.

Also...the account is a local admin on pc's here but only on client machines (it's not a domain admin or anything). Our GPO settings prevent this account from accessing machines remotely so the worst a user can do is mess up his own client machine. You could just as easily have a user throw lophcrack on a machine and crack the local admin password...then remove it.

I've never had one problem with using the editor. Also....the temp files remove themselves when the script is complete and users do not have the ability to access a machine remotely nor can they access their console while the script is executing so it would be very hard for them to even get to these text files in the first place.

A good hack can get in just about anywhere but if he hacks the local admin pass I'm not that worried about it.....I think it has happened twice since I've been here and both times due to loph crack (so we shut that sown with another GPO setting).