Shadow/CrackLib - A compromise?
archaic at linuxfromscratch.org
Sun Aug 7 23:07:48 PDT 2005
On Mon, Aug 08, 2005 at 12:57:56AM -0500, Randy McMurchy wrote:
> Exploiting weak passwords are the single most widely used method to
> gain access to a machine.
FWIW, the SANS Top 20 lists weak passwords as the 5th likeliest
vulnerability in Windows, and the 3rd likeliest in Linux. For linux, #'s
1 and 2 are both server-specific and therefore not applicable to LFS.
Want control, education, and security from your operating system?
Hardened Linux From Scratch
More information about the lfs-dev