Home Blog Page 8778

This week in DotGNU – no 7

Author: JT Smith

This week in DotGNU - no 7 (December 1, 2001)
=============================================
See http://www.dotgnu.org for general information about DotGNU.

1. "Curse of Frogger" C# video game released
2. IRC meeting of DotGNU, GNUCOMM, GNU Enterprise, phpGroupWare
3. New FAQ page on the DotGNU website
4. Discussion of Virtual ID systems



"Curse of Frogger" C# video game released
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Rhys Weatherley has released "Curse of Frogger", a curses-based game
in the tradition of the "Frogger" arcade game.  It is written mostly
in C#, with a small amount of C to provide the curses glue logic via
PInvoke.  Version 0.2.6 or later of Portable.NET is required.  This
game is not just a mere amusement, but a demonstration that it is now
possible to implement real programs with DotGNU Portable.NET, and an
invitation to everyone to experiment with the C# compiler and
development tools.

Web Page: http://www.southern-storm.com.au/portable_net.html
Download: http://www.southern-storm.com.au/download/pnetcurses-0.0.1.tar.gz



IRC meeting of DotGNU, GNUCOMM, GNU Enterprise, phpGroupWare
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Bradley Kuhn has organized an IRC meeting with representatives of the
GNU projects DotGNU, GNUCOMM, GNU Enterprise and phpGroupWare to
discuss possible cooperation.  Consensus has been reached on the
following points:

  * GNU Enterprise folks will try to write a wrapper library for as many
    languages as possible that will abstract away the details of XML-RPC,
    SOAP, and other such protocols.  Other projects will adopt this
    library if and when it comes into being for their chosen
    implementation language.

  * In the meantime, GNUe, DotGNU, GNU Groupware Standards, and
    phpGroupWare will favor XML-RPC over other RPC protocols whenever
    possible.  SOAP is the second choice if XML-RPC is impossible for
    some reason.


New FAQ page on the DotGNU website
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
An FAQ page has been added to the DotGNU website which answers
32 questions about the DotGNU vision, about contributing to the
DotGNU project, and about licensing issues.  The most noteworthy
parts of the FAQ are the definition of "webservices", the discussion
of how DotGNU can solve the vendor lock-in problem, and the list of
packages which need to get ready in time for DotGNU 1.0

http://www.dotgnu.org/faq.html


Discussion of Virtual ID systems
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
A good, high-level discussion of Virtual ID systems has started on the
auth list.  Those who are not subscribed (yet) are encouraged to read
the conversation in the archives, starting with message
http://archive.dotgnu.org/pipermail/auth/2001-November/000377.html
You can subscribe to the list at
http://subscribe.dotgnu.org/mailman/listinfo/auth



                             *   *    *

Subscription information:  "This Week in DotGNU" is posted to the
DotGNU developers list, to subscribe please visit
http://subscribe.dotgnu.org/mailman/listinfo/developers

Spanish translations are made available on a regular basis, you
can subscribe at http://subscribe.dotgnu.org/mailman/listinfo/spanish

Translations of "This week in DotGNU" into other languages are
very welcome; please let me know about them.


"This week in DotGNU" is Copyright (C) 2001 by Norbert Bollow.
Verbatim copying and distribution of this entire issue is
permitted in any medium or format, provided this notice is
preserved.
==================================================================END.

Category:

  • Open Source

The great MS patch nobody uses

Author: JT Smith

Wired: “The flurry of virulent e-mail worms that attack Outlook users can be prevented by a free patch on Microsoft’s website. The problem: It’s impossible to find and cumbersome to install.”

Category:

  • Linux

Linux Security Week – December 3rd 2001

Author: JT Smith

LinuxSecurity: “This week, perhaps the most interesting articles include “Theo de Raadt Discusses OpenBSD and Security,” “Telecommuting:
Keeping Data Safe and Secure,” and “Vulnerability Life Cycles.” Also this week the “qmail Anti-Spam HOWTO” and “Securing
Debian HOWTO” was released.”

Category:

  • Linux

Ximian releases Evolution 1.0, announces ‘the missing link’ with Microsoft Exchange

Author: JT Smith

By Joe Barr

Ximian Inc. today officially releases its long awaited 1.0 version of
Evolution, a sophisticated mail client/address book/calendaring
package. Evolution has been in production for more than two years and consists of more
than 750,000 lines of code. In a second announcement, Ximian announced
an Evolution plug-in called Ximian Connector Exchange 2000. Ximian
Connector allows Evolution users to seamlessly interact with Microsoft Exchange 2000
servers.

Code-named “Lucy” after the so called “missing link” between man and ape discovered in Ethiopia in 1974, Ximian Connector will be available early next year. It will be followed by a second version compatible with Exchange 5.5.

While Evolution is much larger piece of work than Ximian Connector in
terms of lines of code and time and effort to develop, it may be that
Connector is the more important of the two to Ximian’s future. Unlike
Evolution, which is free software licensed under the terms of the GPL,
Connector is a proprietary add-on. This mix of proprietary and open
source represents a new business model for Ximian. And it’s sure to cause
some controversy in the Linux/Open Source communities.

I had a chance to spend a few minutes on the phone with Nat Friedman,
Ximian co-founder and vice president of product development, last Friday to
discuss the announcements. Friedman had the kind of elation in his voice
that comes at the end of a very long, very large development process.
He told me that Evolution 1.0 has been through about 20 preview
releases. About 10,000 people a day are downloading the nightly snapshot, and Friedman estimates that there are already about 100,000 people using
Evolution.

Friedman recounted Ximian’s goals when the team first began work on
Evolution. They saw that none of the existing Linux mail clients could really
step up to provide the full functionality and interoperability required
for acceptance on a corporate desktop. They wanted to deliver a
product which would increase the Linux presence on that desktop. In his
words, “We saw a major opportunity for Linux to penetrate the corporate
environment if the appropriate corporate tools were available.”

Evolution 1.0 will be available for download today for free,
from the Ximian site. It will also be part of the two boxed versions of
Ximian Desktop, which sells for $29.95 in the Standard Edition and
$49.95 in the Professional Edition. It debuts with support for Red Hat
versions 6.2 to 7.2, Mandrake versions 7.0 to 8.0, SuSE 6.4 to 7.2, Debian
2.2, and TurboLinux 6.0. Also supported are YellowDog 1.2 and 2.0, LinuxPPC
2000, and Solaris 8. More versions will be supported in the near
future, with Mandrake 8.1 coming as early as two weeks.

As you go over the feature list for Evolution, it becomes clear that it
is intended to become the Outlook/Outlook Express for Linux and Unix.
Except in regard to security, of course. Although I’ve asked Friedman
the question before, with the BADTRANS worm circulating the wild world
of Windows recently, I asked again if Evolution would be as vulnerable
to such things as Outlook and Outlook Express are. The answer was no. He
explained that “we do not provide the facility for executing code that
you receive in the mail.” Friedman added that Ximian “treats all the
data that comes off the network as hostile, and we audit the code which
is network facing.”

Turning to the subject of Ximian Connector, I asked if Ximian expected
flamage from the community for selling a proprietary software package.
He replied, “We expect less than we would have expected awhile ago. I
think that people understand that businesses have to survive. And the
people know that the bloody carcasses of Open Source companies line the
horizon right now.”

Selling proprietary software is a major step for Ximian, and Friedman
explained it is not a decision lightly made. Then he gave four reasons
why they decided on this course:

  • It doesn’t hurt the Open Source community.
  • Evolution, the core product, is completely open and GPLed.
  • Ximian has contributed more than 2 million lines of Open Source code.
  • The only customers who will buy Ximian Connector have already
    decided on a proprietary environment.

But the bottom line came when I asked if it had to be proprietary
because of the inclusion of proprietary Microsoft protocols or API. He said
no. Instead, Friedman said, “It is proprietary is because they (Ximian)
intend to make money from it.” He added that “it is an opportunity for
us to make money. This is business activity which will support us.” He
projects that sales of Ximian Connector will completely underwrite the
Open Source development of Evolution.

Although Friedman says Ximian does expect some criticism and debate over
the plan, he is completely comfortable with the model. He told me that
“I really like the model of having this core enormous piece of software
which is totally free, and then filling out little pieces on the side
for corporations.” And he has a question ready for all those who react
ideologically against it: Would they rather Evolution not exist at all?

Ximian Connector will sell for $69 a seat. Its value proposition is
that it can replace an entire Windows machine. In many large
corporations, there might be 50,000 Windows users and 5,000 Linux/Unix users.
But corporate standards might dictate the use of Microsoft Exchange for
mail and calendaring. Where that’s the case, a second PC has to be put
on the desk of the Linux/Unix users simply to comply. Ximian
Connector, Friedman says, “solves the two desktop problem” because now all the
needs can be met on a single Linux or Unix box.

Category:

  • Open Source

PostNuke / Rogue is released (v0.70)

Author: JT Smith

Harry Zink writes: “The PostNuke Project announces the release of version 0.70, codename ‘Rogue’. The latest version of PostNuke further enhances the lead over other CMS/WebLog systems with a new unified admin/user permissions system, MD5 passwords for added security, a db abstraction layer (based on the ADODB architecture), support for running multiple sites from one code-base, a language tool that assists in the creation of lingual files, support for wiki and bbcode for text input formatting, more modularizations, and now support for conversions from myPHPNuke… and a bugfix marathon has virtually eliminated all reported bugs. The Rogue release represents a milestone in PostNuke development.”

IIS receives royal assent as Queen dethrones Linux

Author: JT Smith

Fairfax IT reports that “the Queen of England has dumped a two-year association with the open source community by dumping Linux in favor of Microsoft.”

Category:

  • Linux

Weekly news wrap-up: How much money do you save by switching to Open Source?

Author: JT Smith

By Grant Gross

This week’s news featured a couple of conflicting studies about the cost of using Open Source or Free Software in business settings. In the more scientific study, the CRN news weekly’s Test Center found that a small Linux network of computers cost 93 percent less to set up than a similar Windows network.

The CRN Test Center concluded: “Linux and associated Linux applications can accomplish many of the same tasks as the Wintel standard at a much lower initial cost.” That’s something many Open Source/Free Software advocates have been preaching for a long time, but maybe studies like this will open the eyes of more businesspeople.

On the other hand, some people are still talking about the “hidden costs” of Open Source/Free Software. An article at Designtechnica.com (warning: not viewable in some browsers) suggests that running Linux and Free Software can be time-consuming. But the article doesn’t really put a cost to that time. Now if someone would do a study combining the cost-savings of Open Source software and the time spent, that might be really interesting. My guess, after you factor the time a business’ computer dudes spend on the security problems and frequent Blue Screens of Death that haunt Microsoft products, Open Source products save time after the initial set-up.

DMCA foes take a beating

Backers of the Digital Millennium Copyright Act, which many in the Open Source and Free Software communities have opposed for its anti-circumvention provisions, won a couple of battles in court this week.

A New York court ruled that 2600.com could be banned from publishing the DeCSS code, which allows Linux users to decode and play DVDs on their systems. Of course, dozens of other sites — we won’t name any names — have published or linked to that code, and it’s even been printed on a T-shirt.

This same week, a New Jersey judge dismissed the lawsuit of Princeton Professor Ed Felton’s research team against the music industry and the U.S. government over threats the team would be prosecuted for publishing its research on anti-copying technology. An appeal is planned.

As Wired.com summarized: “Copyright law foes lose big.”

IBM talks up grid computing

IBM this week announced that a computing grid, using Linux for critical functions, will help several university hospitals diagnose and research breast cancer. IBM execs are pitching grids as the next big thing in computing, and the company is using Linux with those grids.

Success story of the week

NewsForge freelancer Daniel P. Dern looks at how Turner Consulting Group is saving money and building affordable custom solutions for its customers by using Open Source software.

Newly reviewed

  • LinuxLaboratory.org likes the Galeon 1.0 browser (I’m using an earlier version to browse while I write this story) so much that the reviewer says it spells doom for competing Opera.

  • Freelancer Steven J. Vaughan-Nichols reviews the handful of options for running Windows programs on Linux, detailing each one’s strengths and weaknesses.

  • NewsForge’s Tina Gasperson checks out the qtella file-sharing program for Linux and finds it faster and more advanced than the competition.

    New at NewsForge and Linux.com

    Other stories that NewsForge and Linux.com reported first this week:

  • Gasperson reports that Lineo has granted unrestricted use of the CP/M technology, bringing a popular site about the operating system for microcomputers back online.

  • Business columnist Jack Bryar has some advice for Sony: Embrace Linux because Microsoft is out to get you.

  • NewsForge’s Robin “Roblimo” Miller addresses the problem of lack of hardware support in Linux by telling Linux fans to sell more people on the operating system.

    Stock news

    It was a mixed week for the tech-heavy Nasdaq index and Open Source-related stocks this week. Nasdaq ended the week at 1930.58, down Friday 2.68 points, but up from 1903.20 Nov. 23. Open Source-related stocks were mixed, but Linux-related companies Red Hat and Caldera both rose sharply this week, possibly because of IBM’s announcement it would support Red Hat on its server products.

    Among Open-Source related stocks going the other way this week: TiVO and MandrakeSoft.

    Here’s how Open Source and related stocks ended this past week:

    Company Name Symbol 11/23 Close 11/30 Close
    Apple AAPL 19.84 21.30
    Borland Software Int’l BORL 13.50 14.46
    Caldera International CALD 0.50 0.77
    Hewlett-Packard HWP 20.94 21.99
    IBM IBM 115.35 115.59
    MandrakeSoft 4477.PA e5.84 e5.40
    Red Hat RHAT 5.84 7.98
    Sun Microsystems SUNW 12.81 14.24
    TiVo TIVO 5.80 5.21
    VA Linux Systems LNUX 2.43 2.67
    Wind River Systems WIND 18.57 17.20

  • The evolution of Linux

    Author: JT Smith

    Slashdot is discussing a Kernel Trap article about the evolution of Linux from a discussion on the Linux Kernel mailing list (lkml).

    Category:

    • Linux

    Linux accomplishes Microsoft Windows tasks at 93 percent software cost savings

    Author: JT Smith

    Anonymous Reader writes “CRN features a cover story in its Dec. 3 issue in which its CRN Test Center put together a Microsoft Windows-free network with a Linux server and five workstations at a 93 percent software cost savings to a comparable Windows solution.
    Full story here

    Category:

    • Linux

    Reader-submitted tutorial: Linux password policies

    Author: JT Smith

    – by Shashank Pandey
    In this article we will discuss practical issues related to password policies, learn some basics about passwords, and teach our ‘Linux baby’ (ourselves) some good manners about password security.Lets start with some basics….

    “/etc/passwd” file: the password database

    Our Linux system stores its usernames and passwords in a special file : ‘/etc/password’. The passwords in this file are one way encrypted (hash-ed) through a password encryption function called ‘crypt’ using DES as the encryption algorithm. The good thing about ‘hashing’ is that you can not ‘decrypt’ the hashed passwords because the function used for hashing cannot be reversed (one-way traffic). DES generally uses keys (symmetric key cryptography) in which case things can be either encrypted or decrypted, but for encrypting passwords in Linux, only the ‘hashing’ implementation of DES is used.

    Now , from that, let’s move on to some more details about the ‘/etc/passwd’ file. Our file has user entries in the following format :

    user:encrypted-password:UID:GID:GECOS:home-directory:user-login-shell

    Or more specifically :

    username:Npge08pfz4wuk:503:100:Full Name:/home/username:/bin/sh

    Lets pause for a moment and analyse the second (the encrypted/encoded password ) field closely. Here, Np is the ‘salt’ and ge08pfz4wuk is the ‘encoded password’. The ‘salt’ is a two-character string chosen from the set [a-z A-Z 0-9./] so that a single password can be encoded in 4096 ways. The encoded salt/password could just as easily have been kbeMVnZM0oL7I and the two are exactly the same password, which is “password”.

    Now the other fileds… UID and GID are the numeric IDs of the user and the corresponding group to which he belongs , respectively. For ‘root’ both UID and GID = 0.

    The GCOS (General Electric Comprehensive Operating System) field contains user information like name, phone number, and organization. It can be left empty.

    The home directory field refers to the path of user’s home directory, which is generally ‘/home/‘.

    home directory for ‘root’ is ‘/root’.

    Login process

    When you login to a Linux system the login process encrypts the password provided by you (DES encryption), and compares it with the encrypted password in the ‘etc/passwd’ file. Since the two passwords have been encrypted using the same one-way hashing algorithm, if they are same the user is granted access. Otherwise the user is denied access.

    Here we face one problem: The passwd file has to be read by ‘everyone’ so that processes like ‘login’ are able to access it for authenticating the user. Therefore this passwd file can be accessed by any user and run through a dictionary based password cracker like ‘cracker’ or ‘john the ripper’ to get passwords in clear text.

    If you are wondering what a dictionary based password cracker is, let me explain. A dictionary based password cracking program takes words or combination of alphanumerics/numerics specified in a dictionary file and encrypts them using the same DES algorithm which /etc/passwd uses, to guess the real password. This process continues till the password cracker is out of dictionary words or the real password is found.

    To solve this problem , the concept of shadow passwords was conceived.

    Understanding shadow password suite

    If you are using a shadow password suite, your encrypted passwords are stored in the ‘/etc/shadow’ file and the ‘etc/passwd’ file will have ‘*’ in place of encrypted user passwords.

    After the shadow suite is installed, the ‘/etc/passwd’ file will look something like this:

    username:x:503:100:Full Name:/home/username:/bin/sh

    The shadow suite removes the paswwords from ‘/etc/passwd’ and puts them in ‘/etc/shadow’. Only root will be able to read and write to the /etc/shadow file.

    This means that any program that reads the ‘/etc/passwd’ for purposes other than authentication will still operate correctly.
    For instance, a program like ‘/bin/ls’ uses ‘/etc/passwd’ to map the user ID to the proper username in a directory listing. This dependency can be proved by a simple example: Suppose you remove all permissions from the /etc/passwd file so that, to any user other than root, this file is inaccessible and one of these users (other than root) does a ‘ls -l’. What he will get is a directory listing and his UID but never his username string.

    Some programs (like xlock) don’t need to be able to change passwords, they only need to be able to verify passwords (authentication). These programs can either be run SUID root (from the security point of view , this is not acceptable) or relatively better, you can set up a group shadow that is allowed read only access to the /etc/shadow file. Then the program can be run SGID shadow.

    Setting password aging

    An entry in the file :/etc/shadow has the following format:


    user name :encrypted password : last modified :min change : max change days : warn days : disable days : disable time : reserved

    here,

    username = The User Name

    passwd = The Encoded password

    last modified = Days since Jan 1, 1970 that password was last changed

    Min change(days) = Number of days before the user can change his/her
    password

    Max change(days) = Number of days after which the user has to change his/her
    password

    warn = Days before password is to expire that user is warned

    expire = Days after password expires that account is disabled

    disable = Number of days after the account has expired that it should be locked.

    disable time = Days since Jan 1, 1970 that account is disabled

    reserved = A reserved field

    Password aging can only be enforced by the ‘root’ for any user.

    The command used is :chage

    c
    Suppose we have a user ‘shash’ for whom the password aging has to be set. We use the command ‘chage’ (not change!) to specify all fields related to password policies in the ‘/etc/shadow’. When we run ‘chage ‘, we are confronted with a series of interactive options to play around with:

    (The arguments specified within ‘[ ]'(square brackets) are defaults and will be
    implemented in case you press without modifying any field.)

    [root@lord] chage shash

    Changing the aging information for shash –
    Enter the new value, or press return for the default

    1) Minimum Password Age [0]:
    this refers to the ‘min change’ field.The default value=0 for this field implies that the user can change his/her password anytime.

    2) Maximum Password Age [30]:
    Corresponds to ‘Max change’ field.default=30 days default is a pretty decent choice.

    3) Last Password Change (YYYY-MM-DD) [2001-09-20]:
    Corresponds to ‘last modified’ field.better leave it at default.

    4) assword Expiration Warning [7]:

    Corresponds to ‘warn ‘ filed

    5) Password Inactive [-1]:

    Corresponds to ‘expire’ field.The default value of ‘-1’ means -password never expires-.

    6) Account Expiration Date (YYYY-MM-DD) [1969-12-31]:
    Corresponds to ‘disable’ field.the default value(a ‘date’ going down in past)

    Now, if you want to see the password aging information of a user, do this :

    [root@lord] chage -l

    You would see all the aging information for this user.

    Also, just for the sake of awareness, there are other files that come in this
    whole ‘Linux passwords’ scene:

    /etc/login.defs = login definitions

    /etc/gshadow = shadow user group file

    /etc/groups = user group file

    Password auditing on Linux using John The Ripper

    Ok. Now it’s time to turn the tables on those crackers by using their favorite tool. There are lots of password crackers for *nix systems available in the wild. We are going to learn to use one of them to check the strength of our passwords.

    The object under consideration is a password cracker called ‘John the Ripper’.
    (nice name, and does a good job of it also 🙂 )

    Installation

    step 1: download source package from here :www.openwall.com/john

    step 2: (unpacking the archive)
    [root@lord] tar -zxvf john-1.5.tar.gz

    step 3: [root@lord] cd john1.5
    [root@lord] cd src
    [root@lord] make linux-x86-any-elf

    Just typing ‘make’ and pressing will confront you with some arguments to be supplied to make.Have a look at them and see if u want to use a different argument than the one we specified above.

    Since there is NO ‘make install’ step here, we will just copy the john executable(which is in /john1.5/run)to /usr/local/bin so that it’s in our ‘PATH’ –

    [root@lord] cp /john1.5/run/john /usr/local/bin

    Configuring

    The configuration file for john is ‘john.ini’.
    The only option which you really would like to configure is the name and path to the dictionary file that john is supposed to use. look for this line:

    ***snip*****john.ini*****

    #Wordlist file name, to be used in batch mode
    Wordfile = ~/password.lst

    *********snip*********

    Here you can give the name and path of the dictionary file you want john to use.
    The default is a file ‘password.lst’ in the current directory. A dictionary file is supposed to have a big collection of common words and numeric and alphanumeric combinations. The bigger your dictionary file, the more chances john has for cracking passwords.

    Note: Whenever I refer to ‘~/’ (current directory) here, it means we are referring to some file in the directory: /john1.5/run

    Running John the ripper

    Kindly note that the first 3 options specified here (a,b,c) are used for cracking passwords for systems which DO NOT have shadow suite installed. So effectively all encrypted passwords are assumed to be in ‘/etc/passwd’ and there is NO ‘/etc/shadow’.

    a)to make john make enough random tries to crack passwords :

    [root@lord] john /etc/passwd

    b)to make john launch a dictionary(here the wordfile/dictionary is in current
    directory) attack for password cracking :

    [root@lord]john -wordfile: /etc/passwd

    c) john stores the cracked passwords in the file: ~/john.pot.
    to read the cracked passwords, do:

    [root@lord]john -show /etc/passwd

    Now if you are using the shadow suite (wise choice!), ‘/etc/passwd’ and ‘/etc/shadow’ have to be merged for for john to be able to crack passwords. For this we have to invoke the john executable as ‘unshadow’.

    Lets start by creating a symbolic link for john as ‘unshadow’ :

    [root@lord] ln -s /usr/local/bin/john /usr/local/bin/unshadow

    and then invoke ‘unshadow’ :

    [root@lord] unshadow /etc/passwd /etc/shadow > mergedpass

    we now have the required ‘merged’ file called ‘mergedpass’ (you can give it any
    name you want) and we are ready to crack it as :

    [root@lord] john mergedpass

    or

    [root@lord] john -wordfile: mergedpass

    Eof.

    Now before you reach out for that asprin, lets consider those ‘good manners’ I was referring to in the beginning of this document:

    The following are the Do’s and DONT’s for a good password policy :

    DON’T use these things for your password

    • The username name .
    • Any word found in a dictionary
    • Names of people or things
    • Keyboard sequences like “asdf”
    • Any publicly available information about you e.g. your phone number or
      credit card number

    MUST DO’s:

    • Keep longer passwords(but Password should be a mixture of numbers and letters
    • Password should be a mixture of uppercase and lowercase letters
    • Do regular checks of the password strength of all your networked systems irrespective of the OS — they are running. You can use john-the-ripper for Linux systems and L0pht-crack (www.l0pht.com) for WindowsNT/2000 systems.

    Practically speaking, you should not keep password length more than 8 characters since the
    first 8 characters have more importance than the rest (if you’r using password length =>8), and somebody will only need to break the first chunk of 8 bytes to get around the other ones very easily. And anyway, it’s not very neurologically viable to remember passwords > 8 characters, especially when it doesn’t do any good!

    Please note that in most of the cases we have a hybrid network, i.e. a network comprising machines running different OSes, like some machines running Linux and others running WinNT etc. In theses cases it becomes absolutely essential to enforce similar security policies (and right now, the password policies) on all machines, because even if one system on your network gets penetrated, it can be effectively used to gain privileges over the whole network. If you have a NASA-like security policy for your Linux machines, and your connected Windows machines are as vulnerable as a ‘newly born bird’, you are a gonner!

    Conclusion

    • Implementing security is a chain of sequential events.
    • Each event is a link of this chain.
    • The strength of ‘each’ link shall make or break this chain. It’s no use spending your time, energy and money on all those firewalls and IDSs if anybody can login to your account using your wife’s first name as your password!

    To be very frank, no software, no hardware can protect your digital assets if you are not concerned enough. Its you who has to enforce security, be alert, and be paranoid about security.


    -------------------------------------
    Author : Shashank Pandey a.k.a ~AcE~
    E-mail : reach_shash@linuxmail.org
    -------------------------------------

    About the Author

    The author is an undergraduate student of Computer science and works as ‘I.T. Manager’ at a New Delhi (India) based Total I.T solutions organization. He is also actively involved as a freelance Information Security consultant, and swears by ‘information dissemination’.

    (c)CopyLeftRightandCenter 2001. Shashank Pandey
    All Rights reserved. Unauthorized copying or duplication of this document is prohibited.

    Category:

    • Linux