Randy McMurchy wrote:

From a technical standpoint Jim, you are just simply wrong. Exploiting
weak passwords are the single most widely used method to gain access to
a machine.
What's needed is a way to enforce a password scheme, passwords greater than 8 characters, must contain alpha characters and numeric characters. ie dinf3102.

Not something that checks a word file, I would go for a password scheme enforcement solution for shadow or even a replacement of shadow altogether.

--
------
[EMAIL PROTECTED]
[EMAIL PROTECTED]

LFS User # 2577
Registered Linux User # 299986

--
http://linuxfromscratch.org/mailman/listinfo/lfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to