y...@marupa.net writes: > Not only that, but now whoever seeks to compromise your account has the > added > challenge of figuring out just what, exactly, the name of the > account is.
Usually attackers first try to enter -possibly using a faulty service-, then to exploit some vulnerability. And grep is great in finding 0:0 accounts :) -- /\ ___ Ubuntu: ancient /___/\_|_|\_|__|___Gian Uberto Lauri_____ African word //--\| | \| | Integralista GNUslamico meaning "I can \/ coltivatore diretto di software not install giĆ sistemista a tempo (altrui) perso... Debian" Warning: gnome-config-daemon considered more dangerous than GOTO -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/21159.19977.484330.793...@mail.eng.it