On Mon, Aug 08, 2005 at 12:57:56AM -0500, Randy McMurchy wrote:
> 
> Exploiting weak passwords are the single most widely used method to
> gain access to a machine.

FWIW, the SANS Top 20 lists weak passwords as the 5th likeliest
vulnerability in Windows, and the 3rd likeliest in Linux. For linux, #'s
1 and 2 are both server-specific and therefore not applicable to LFS.

-- 
Archaic

Want control, education, and security from your operating system?
Hardened Linux From Scratch
http://www.linuxfromscratch.org/hlfs

-- 
http://linuxfromscratch.org/mailman/listinfo/lfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to