Unix Passwords & Security

You may think, “I don’t care if someone reads my mail” or “I don’t store important files in my directory, so who needs a good password?”

This is exactly what crackers count on. Many times, these crackers don’t want to read your mail or erase your files; they want to install their own programs that take up your computer time and Internet bandwidth. They steal resources from you and slow down your computer and Internet response time. They also install Trojan horse programs that allow them to break into your computer at a future date. These Trojan horses are designed to look and act exactly like other normal programs you expect to see on the machine.

When a cracker breaks into your computer system, your only course of ...

Get Mac OS X 10.4 Tiger: Visual QuickStart Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.