Shadow/CrackLib - A compromise?

Archaic archaic at linuxfromscratch.org
Sun Aug 7 23:07:48 PDT 2005


On Mon, Aug 08, 2005 at 12:57:56AM -0500, Randy McMurchy wrote:
> 
> Exploiting weak passwords are the single most widely used method to
> gain access to a machine.

FWIW, the SANS Top 20 lists weak passwords as the 5th likeliest
vulnerability in Windows, and the 3rd likeliest in Linux. For linux, #'s
1 and 2 are both server-specific and therefore not applicable to LFS.

-- 
Archaic

Want control, education, and security from your operating system?
Hardened Linux From Scratch
http://www.linuxfromscratch.org/hlfs




More information about the lfs-dev mailing list