On 8/26/05, Fernando Meira wrote: > > > You're lacking optimism... Of course the brute-force attack was not > supposed to be done remotely! You can pull passwd to your local machine and > the let your computer handle it without interruptions. If some proprieties > of the password are known beforehand, then sooner would be a matter of hours > and later a couple of days. This is not even putting into the game some > distributed computing... > > True, but if you use shadow to store your passwords your in much better shape since the average hacker can't get a hold of the root owned shadow file. -Mike -- ________________________________ Michael E. Crute Software Developer SoftGroup Development Corporation Linux, because reboots are for installing hardware. "In a world without walls and fences, who needs windows and gates?"