Re: what percent of time are there unpatched exploits against default config?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 12/29/2011 06:45 PM, m.roth@xxxxxxxxx wrote:
> Ljubomir Ljubojevic wrote:
> <snip>
>> I like to use serial numbers from MB, HDD, etc., as passwords. I never
>
> The one problem with this is that *if* the attacker has the slightest idea
> of the hardware, their task is vastly smaller. I trust, for example, that
> you don't use Dell's s/n/"express code"; Penguin, not having sold 5
> gazillion servers, has the first few digits all the same, for years
> (they're being optimistic with s/n's that long).
> <snip>
>         mark


No. I got the idea from my first second-hand MB for NOC router/firewall, 
while I was on the grain silo needing to reinstall ClarkConnect on it 
(don't ask :-D ). You can use s/n from some old PC you have at your 
home, or discarded MB (or whatever).

Of course, using s/n's would be same as using some good random-generator 
script.


-- 

Ljubomir Ljubojevic
(Love is in the Air)
PL Computers
Serbia, Europe

Google is the Mother, Google is the Father, and traceroute is your
trusty Spiderman...
StarOS, Mikrotik and CentOS/RHEL/Linux consultant
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos


[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux