-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Sunday 12 January 2003 12:26, Richard Jenniss wrote:
> Does Lindows run soley as root?

you can run it as a user, but default it runs as root. which is why most sane 
people don't recommend Lindows... what does lindows have to do with his RH8 
question?

> I think I read somewhere that it did... In that case, yeah antivirus
> software would be a good idea.

he's running Red Hat, not lindows. again: what does Lindows' sorry excuse for 
security have to do with RH or any other half-decent Linux distro?

> Linux can be rooted, and if it's rooted it's easily infected.

if it's rooted, the least of your worries are virus infections.

> I'm curious as to the possible ways Linux can be rooted.

there's lots of information out there on the topic. easier is to answer how 
not to be rooted: keep up with security updates as they arrive, don't run 
unecessary services, don't allow unecessary privelege to users or data, 
encrypt as much network traffic as possible.

> Bad password, no password.

automated attacks rarely use password attacks since to make password attacks 
effective requries intelligence; it's much easier to take advantage of less 
variable and more automatable attacks due to things such as buffer overruns 
or poorly formed format strings...

> Is there anyway to hash the password off of shadow?

i'm not sure what you mean by this question. passwords are, by default, hashed 
and kept out of /etc/passwd when using shadow passwords..

- -- 
Aaron J. Seigo
GPG Fingerprint: 8B8B 2209 0C6F 7C47 B1EA  EE75 D6B7 2EB1 A7F1 DB43

"Everything should be made as simple as possible, but not simpler"
    - Albert Einstein
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE+Ic0P1rcusafx20MRApgsAJ9SANTnaNkyyaToVVHxxlBpcgSfsgCeLids
EDf1+Pb00tMRFSUb31zf3c0=
=AH2k
-----END PGP SIGNATURE-----

Reply via email to