Preventing break-ins on your Linux system

Posted by bob on Jun 10, 2016 7:40 AM EDT
Opensource.com
Mail this story
Print this story

All too often we hear about breaches in security where usernames and passwords were obtained and published online. Most of the time, what's revealed is that most passwords are very simple or iterative of a previous version (e.g., 12345 followed by 123456 on the next change). Implementing password requirements can help keep weak passwords out of your environment. These forced changes have their pros and cons, but when it comes down to it there are still flaws in authentication. read more

Full Story

  Nav
» Read more about: Groups: Linux; Story Type: News Story

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.