root

Brandon Kruse admteamkruz at gmail.com
Thu Jan 10 22:56:49 CET 2008


Good luck easily hacking over a GPRS connection. Make your password  
longer than 6 characters, a ban after retry attempts, take it off port  
22 and that will save 95% of attacks from script kiddies. (everything  
I listed is controllable on sshd_config, I believe)

Just imho it helps, opinion and experience :)

But overall, I agree, but your privileges are only as safe as your  
software.
(eg when you run a socket based process as root, you trust it.)

However, you make a good point :)

Kde and gnome take that precaution with gtk based Sudo when you login  
as a normal user (at least in debian/ubuntu) and I like that method.

--------------------------------
Brandon

On Jan 10, 2008, at 3:43 PM, Denis <shulyaka at gmail.com> wrote:

> But as far as I understand it's not secure, esp. for a device with
> wi-fi, bluetooth, gprs and running ssh daemon! Linux gives us a great
> power of user privilegies management but we waste it. Woldn't it be
> better to run everything as an unprivileged user, or at least ask for
> password at first run time?
>
> _______________________________________________
> OpenMoko community mailing list
> community at lists.openmoko.org
> http://lists.openmoko.org/mailman/listinfo/community




More information about the community mailing list