Le dimanche 07 octobre 2007 à 10:00 -0400, Steve Grubb a écrit : > A successful account breach requires 3 things: a machine name, a valid > account, and the password. Letting people know that an account is valid cuts > the attack down to a dictionary attack. However account names are terribly predictible anyway, so hiding them helps little. Script kiddies routinely scan ssh ports with common surnames, hoping to find accounts with no passwords. Also a lot of people use account names in public mails, so… -- Nicolas Mailhot
Attachment:
signature.asc
Description: Ceci est une partie de message =?ISO-8859-1?Q?num=E9riquement?= =?ISO-8859-1?Q?_sign=E9e?=
-- fedora-devel-list mailing list fedora-devel-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-devel-list