Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: Unix Application,
From: Pranay Kanwar <warl0ck () metaeye org>
Date: Mon, 21 May 2007 22:29:59 +0530

Hi,


1) The rationale is very simple, Openness,simple and compatible.

 a) Since it does not hide anything the model is open to evaluation
    and better feedback.
 b) Simple in the sense working on it with out without standard
    programs is easy.
 c) If you copy /etc/passwd and /etc/shadow to other systems
    you won't break anything, provided the UID's and GID's are the
    same intended. Though i would never recommend this.

2) Yes users will be still forced to change the password
independent of the shell.

regards

warl0ck // MSG
http://www.metaeye.org


------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]