Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 13 Feb 2010 21:41:29 +0100
From:      Ruben de Groot <mail25@bzerk.org>
To:        John <john@starfire.mn.org>
Cc:        Julien Gormotte <gormi456@gmail.com>, freebsd-questions@freebsd.org
Subject:   Re: PASSWORD LOST!!
Message-ID:  <20100213204129.GA1016@ei.bzerk.org>
In-Reply-To: <20100212080524.B67483@starfire.mn.org>
References:  <0B47F5A9-A603-408F-A727-E81739E539C5@andersonbrothers.biz> <201002091059.27019.mike.jeays@rogers.com> <b79ecaef1002091144g6014eb0ak75955f63c82a4b4b@mail.gmail.com> <b121fe571002111714l2529f57bndd63d0d6ac404363@mail.gmail.com> <201002120124.o1C1OS3o015060@banyan.cs.ait.ac.th> <4B751F70.8060402@gmail.com> <20100212080524.B67483@starfire.mn.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Feb 12, 2010 at 08:05:24AM -0600, John typed:
> > >    
> > If this is a dedicated server (or a VPS, or RPS, or any type of server 
> > hosted by a server provider), you may have a rescue system, so you can 
> > boot it and chroot yourself to access the system. Or, in some cases, you 
> > can have a KVM-over-IP access, so you can boot into single user mode.
> 
> People, people - be careful that we are not creating a formula to
> break into FreeBSD servers around the world...

That formula is allready there (but fixed in more recent source off course)

http://seclists.org/fulldisclosure/2009/Nov/371




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100213204129.GA1016>