Date: Fri, 11 Dec 2009 13:53:36 -0600 From: J Sisson <sisson.j@gmail.com> To: "Svein Skogen (Listmail Account)" <svein-listmail@stillbilde.net> Cc: freebsd-questions@freebsd.org Subject: Re: Root exploit for FreeBSD Message-ID: <4297a9020912111153r1ec93838i12d1fd3aae5c61e@mail.gmail.com> In-Reply-To: <4B225077.3040009@stillbilde.net> References: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> <op.u4rt7sclqr96hw@zeta> <86tyvxlk68.fsf@ds4.des.no> <4B225077.3040009@stillbilde.net>
next in thread | previous in thread | raw e-mail | index | archive | help
2009/12/11 Svein Skogen (Listmail Account) <svein-listmail@stillbilde.net> > The easiest way of brute-forcing access to a FreeBSD server includes > locating the sysadmin and applying the common desk drawer. It's that > simple. > http://xkcd.com/538/ indeed.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4297a9020912111153r1ec93838i12d1fd3aae5c61e>