[email protected] writes:

 > Not only that, but now whoever seeks to compromise your account has the 
 > added 
 > challenge of figuring out just what, exactly, the name of the
 > account is.

Usually attackers first try to enter -possibly using a faulty
service-, then to exploit some vulnerability. And grep is great in
finding 0:0 accounts :)

-- 
 /\           ___                                    Ubuntu: ancient
/___/\_|_|\_|__|___Gian Uberto Lauri_____               African word
  //--\| | \|  |   Integralista GNUslamico            meaning "I can
\/                 coltivatore diretto di software       not install
     giĆ  sistemista a tempo (altrui) perso...                Debian"

Warning: gnome-config-daemon considered more dangerous than GOTO


--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: http://lists.debian.org/[email protected]

Reply via email to