Windows 7 and Windows 2008 does not store passwords in the same format that Windoz 95, 98 did. You have to go in and manually specify that you want it to do LM or NTLM. Which I might add you can also do on any linux machine. So are linux passwords weak because you can specify a weak NTLM hash or MD5? Not because anyone in their right mind does? The thing that kills me on the "weak windows" argument here is that the only reason people usually enable old NTLM on a windows AD is to get some Mac or open source code to authenticate properly.
The problem with trying to prepare for an offline hash attack is that you can't. Well if you issue users yubikey or RSA tokens, then you can. But that is a little impractical. I would submit the idea that a strong password is still your best defense. And that the password listed was a poor example in this situation because with a modern windows or linux salt, it would take a very long time to get.
I don't think anyone has noticed that all the passwords in the hashes referenced have not been found yet. There are references to ALL accounts have been found, they have not at this point in time. Strong passwords in this situation have proven themselves. Also in most cases, when you have broken in to a machine to where you have access to that hash file, the password guessing game is over and moves on to replaced gina, keystroke logger, stolen hash etc. All the easy stuff. It comes back to the admin having a strong password and patching on time.