On Mon, Aug 08, 2005 at 12:57:56AM -0500, Randy McMurchy wrote: > > Exploiting weak passwords are the single most widely used method to > gain access to a machine.
FWIW, the SANS Top 20 lists weak passwords as the 5th likeliest vulnerability in Windows, and the 3rd likeliest in Linux. For linux, #'s 1 and 2 are both server-specific and therefore not applicable to LFS. -- Archaic Want control, education, and security from your operating system? Hardened Linux From Scratch http://www.linuxfromscratch.org/hlfs -- http://linuxfromscratch.org/mailman/listinfo/lfs-dev FAQ: http://www.linuxfromscratch.org/faq/ Unsubscribe: See the above information page