Home page logo

pen-test logo Penetration Testing mailing list archives

Re: Unix Application,
From: Pranay Kanwar <warl0ck () metaeye org>
Date: Mon, 21 May 2007 22:29:59 +0530


1) The rationale is very simple, Openness,simple and compatible.

 a) Since it does not hide anything the model is open to evaluation
    and better feedback.
 b) Simple in the sense working on it with out without standard
    programs is easy.
 c) If you copy /etc/passwd and /etc/shadow to other systems
    you won't break anything, provided the UID's and GID's are the
    same intended. Though i would never recommend this.

2) Yes users will be still forced to change the password
independent of the shell.


warl0ck // MSG

This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]