On Thu, Feb 24, 2011 at 04:51:30PM -0600, Boyd Stephen Smith Jr. wrote: > For example, you might let one user "sudo" without a password, disable root > logins via ssh, have every other user (including root) be disabled in > /etc/shadow, disable password logins via ssh, and have all other non-root > users have a bogus shell like /bin/false. That user of course only have one > entry in authorized_keys, and it is a 4242-bit key.
Or you could an SQL injection, or you could attack a web form, or you could... -- . o . o . o . . o o . . . o . . . o . o o o . o . o o . . o o o o . o . . o o o o . o o o
signature.asc
Description: Digital signature