On Thu, Feb 24, 2011 at 04:51:30PM -0600, Boyd Stephen Smith Jr. wrote:
> For example, you might let one user "sudo" without a password, disable root 
> logins via ssh, have every other user (including root) be disabled in 
> /etc/shadow, disable password logins via ssh, and have all other non-root 
> users have a bogus shell like /bin/false.  That user of course only have one 
> entry in authorized_keys, and it is a 4242-bit key.

Or you could an SQL injection, or you could attack a web form, or you
could...

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o

Attachment: signature.asc
Description: Digital signature

Reply via email to