1 |
On 8/26/05, Fernando Meira <fmeira@×××××.com> wrote: |
2 |
> |
3 |
> |
4 |
> You're lacking optimism... Of course the brute-force attack was not |
5 |
> supposed to be done remotely! You can pull passwd to your local machine and |
6 |
> the let your computer handle it without interruptions. If some proprieties |
7 |
> of the password are known beforehand, then sooner would be a matter of hours |
8 |
> and later a couple of days. This is not even putting into the game some |
9 |
> distributed computing... |
10 |
> |
11 |
> |
12 |
True, but if you use shadow to store your passwords your in much better |
13 |
shape since the average hacker can't get a hold of the root owned shadow |
14 |
file. |
15 |
|
16 |
-Mike |
17 |
|
18 |
-- |
19 |
________________________________ |
20 |
Michael E. Crute |
21 |
Software Developer |
22 |
SoftGroup Development Corporation |
23 |
|
24 |
Linux, because reboots are for installing hardware. |
25 |
"In a world without walls and fences, who needs windows and gates?" |