Good luck easily hacking over a GPRS connection. Make your password longer than 6 characters, a ban after retry attempts, take it off port 22 and that will save 95% of attacks from script kiddies. (everything I listed is controllable on sshd_config, I believe)

Just imho it helps, opinion and experience :)

But overall, I agree, but your privileges are only as safe as your software.
(eg when you run a socket based process as root, you trust it.)

However, you make a good point :)

Kde and gnome take that precaution with gtk based Sudo when you login as a normal user (at least in debian/ubuntu) and I like that method.

--------------------------------
Brandon

On Jan 10, 2008, at 3:43 PM, Denis <[EMAIL PROTECTED]> wrote:

But as far as I understand it's not secure, esp. for a device with
wi-fi, bluetooth, gprs and running ssh daemon! Linux gives us a great
power of user privilegies management but we waste it. Woldn't it be
better to run everything as an unprivileged user, or at least ask for
password at first run time?

_______________________________________________
OpenMoko community mailing list
[email protected]
http://lists.openmoko.org/mailman/listinfo/community

_______________________________________________
OpenMoko community mailing list
[email protected]
http://lists.openmoko.org/mailman/listinfo/community

Reply via email to