On Mon, 2011-04-25 at 13:52 -0600, AJ ONeal wrote: > How can you use jack the ripper to get into any of these?
Uhm... that's not what jack the ripper is for. Jack the ripper is orthogonal to proper policy like locking accounts after a certain number of failed login attempts. After successfully compromising a password database, jack is used to discover the original password based on the known hash. Once you discover the password, you use it to attempt login to other systems. Everything Aaron said was right. Everything you used as counter examples was unrelated. -------------------- BYU Unix Users Group http://uug.byu.edu/ The opinions expressed in this message are the responsibility of their author. They are not endorsed by BYU, the BYU CS Department or BYU-UUG. ___________________________________________________________________ List Info (unsubscribe here): http://uug.byu.edu/mailman/listinfo/uug-list
