y...@marupa.net writes:

 > Not only that, but now whoever seeks to compromise your account has the 
 > added 
 > challenge of figuring out just what, exactly, the name of the
 > account is.

Usually attackers first try to enter -possibly using a faulty
service-, then to exploit some vulnerability. And grep is great in
finding 0:0 accounts :)

-- 
 /\           ___                                    Ubuntu: ancient
/___/\_|_|\_|__|___Gian Uberto Lauri_____               African word
  //--\| | \|  |   Integralista GNUslamico            meaning "I can
\/                 coltivatore diretto di software       not install
     giĆ  sistemista a tempo (altrui) perso...                Debian"

Warning: gnome-config-daemon considered more dangerous than GOTO


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/21159.19977.484330.793...@mail.eng.it

Reply via email to