-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Sunday 12 January 2003 12:26, Richard Jenniss wrote:
> Does Lindows run soley as root?
you can run it as a user, but default it runs as root. which is why most sane
people don't recommend Lindows... what does lindows have to do with his RH8
question?
> I think I read somewhere that it did... In that case, yeah antivirus
> software would be a good idea.
he's running Red Hat, not lindows. again: what does Lindows' sorry excuse for
security have to do with RH or any other half-decent Linux distro?
> Linux can be rooted, and if it's rooted it's easily infected.
if it's rooted, the least of your worries are virus infections.
> I'm curious as to the possible ways Linux can be rooted.
there's lots of information out there on the topic. easier is to answer how
not to be rooted: keep up with security updates as they arrive, don't run
unecessary services, don't allow unecessary privelege to users or data,
encrypt as much network traffic as possible.
> Bad password, no password.
automated attacks rarely use password attacks since to make password attacks
effective requries intelligence; it's much easier to take advantage of less
variable and more automatable attacks due to things such as buffer overruns
or poorly formed format strings...
> Is there anyway to hash the password off of shadow?
i'm not sure what you mean by this question. passwords are, by default, hashed
and kept out of /etc/passwd when using shadow passwords..
- --
Aaron J. Seigo
GPG Fingerprint: 8B8B 2209 0C6F 7C47 B1EA EE75 D6B7 2EB1 A7F1 DB43
"Everything should be made as simple as possible, but not simpler"
- Albert Einstein
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE+Ic0P1rcusafx20MRApgsAJ9SANTnaNkyyaToVVHxxlBpcgSfsgCeLids
EDf1+Pb00tMRFSUb31zf3c0=
=AH2k
-----END PGP SIGNATURE-----