Shadow/CrackLib - A compromise?

Archaic archaic at
Sun Aug 7 23:07:48 PDT 2005

On Mon, Aug 08, 2005 at 12:57:56AM -0500, Randy McMurchy wrote:
> Exploiting weak passwords are the single most widely used method to
> gain access to a machine.

FWIW, the SANS Top 20 lists weak passwords as the 5th likeliest
vulnerability in Windows, and the 3rd likeliest in Linux. For linux, #'s
1 and 2 are both server-specific and therefore not applicable to LFS.


Want control, education, and security from your operating system?
Hardened Linux From Scratch

More information about the lfs-dev mailing list