On Fri, Nov 20, 2015 at 6:27 PM, Lisi Reisz wrote:
> On Friday 20 November 2015 08:47:25 Chris Bannister wrote:
> > On Thu, Nov 19, 2015 at 07:01:41PM +0530, Himanshu Shekhar wrote:
> > > This reminds of an outcome that makes your system vulnerable to data
> > > theft. Following the above steps,
On Friday 20 November 2015 08:47:25 Chris Bannister wrote:
> On Thu, Nov 19, 2015 at 07:01:41PM +0530, Himanshu Shekhar wrote:
> > This reminds of an outcome that makes your system vulnerable to data
> > theft. Following the above steps, anyone having physical access to the
> > device by
>
> What a
Himanshu Shekhar a écrit :
> This reminds of an outcome that makes your system vulnerable to data theft.
> Following the above steps, anyone having physical access to the device by
> any means (which is more likely in case of mobile devices), could gain root
> access and do whatever one wants to do
On Thu, Nov 19, 2015 at 07:01:41PM +0530, Himanshu Shekhar wrote:
> This reminds of an outcome that makes your system vulnerable to data theft.
> Following the above steps, anyone having physical access to the device by
What above steps? The context is lost! :(
--
"If you're not careful, the new
[Thu, 19 Nov 2015 09:20:03 -0500] Dan Ritter
wrote:
> On Thu, Nov 19, 2015 at 07:01:41PM +0530, Himanshu Shekhar wrote:
> > This reminds of an outcome that makes your system vulnerable to
> > data theft. Following the above steps, anyone having physical
> > access to the device by any means (which
How about encrypting disks with luks?
Eero
19.11.2015 3.32 ip. "Himanshu Shekhar" kirjoitti:
> This reminds of an outcome that makes your system vulnerable to data theft.
> Following the above steps, anyone having physical access to the device by
> any means (which is more likely in case of mobi
On Thu, Nov 19, 2015 at 07:01:41PM +0530, Himanshu Shekhar wrote:
> This reminds of an outcome that makes your system vulnerable to data theft.
> Following the above steps, anyone having physical access to the device by
> any means (which is more likely in case of mobile devices), could gain root
>
This reminds of an outcome that makes your system vulnerable to data theft.
Following the above steps, anyone having physical access to the device by
any means (which is more likely in case of mobile devices), could gain root
access and do whatever one wants to do with the system as well as the dat
On Thu 19 Nov 2015 at 00:12:31 +0100, Dan wrote:
> On Wed, Nov 18, 2015 at 8:42 PM, Brian wrote:
> > On Wed 18 Nov 2015 at 20:05:38 +0100, Dan wrote:
> >
> >> If a wrong password is used many times to log as root, does the root
> >> account gets locked?
> >
> > No.
> >
> >> I was in a hurry and i
On Wed, Nov 18, 2015 at 8:42 PM, Brian wrote:
> On Wed 18 Nov 2015 at 20:05:38 +0100, Dan wrote:
>
>> If a wrong password is used many times to log as root, does the root
>> account gets locked?
>
> No.
>
>> I was in a hurry and introduced a wrong password for root a few times
>> and now I can not
On Wed 18 Nov 2015 at 20:05:38 +0100, Dan wrote:
> If a wrong password is used many times to log as root, does the root
> account gets locked?
No.
> I was in a hurry and introduced a wrong password for root a few times
> and now I can not log as root.
>
> I think that I'm using the right passwo
Hi,
If a wrong password is used many times to log as root, does the root
account gets locked?
I was in a hurry and introduced a wrong password for root a few times
and now I can not log as root.
I think that I'm using the right password (although I can not be sure
100%). I checked the modificati
12 matches
Mail list logo