P. 1
Linux Certification Bible

Linux Certification Bible

4.0

|Views: 2.327|Likes:
Publicado porMarcelo

More info:

Published by: Marcelo on Dec 18, 2008
Direitos Autorais:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/17/2013

pdf

text

original

Eighth, create authentication methods that protect the passwords; good security
practice suggests enabling both MD5 and shadow passwords. MD5 enables
encrypted passwords to be used, and shadow passwords prevent all users from
reading the encrypted passwords (in other words, the shadow password file is only
readable by the root user).

084881-6 ch05.F 11/12/01 8:29 AM Page 145

146Part II ✦Installation

You're Reading a Free Preview

Descarregar
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->