[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ale] admin



It probably is a bad idea, under many circumstances, to create this
parallel user, however, the thought was inspired in me that if you wanted
to create a more secure system, you could potentially change the name of
root to something else, thus making the system harder to hack for lack of
a known entry point :)


Critter at Wizvax.Net

Stealing is illegal... the government hates competition.

-----BEGIN GEEK CODE BLOCK-----
Version: 3.1
GCS/E/CC/IT/TW/O d+(--) s--:+ a- C+++$ ULAVH+++$ P- L++++ E+ W+ N-- w---$ !O M
V-- PS+++ PE++ Y+ PGP t+ 5++ X++ !R tv b DI+(+++) D--- G e++ h(---) r+++ y?
------END GEEK CODE BLOCK------

On Thu, 15 Oct 1998, Charles William Binko wrote:


  [NON-Text Body part not included]