From owner-freebsd-hackers Thu Sep 7 11:43:14 1995 Return-Path: hackers-owner Received: (from majordom@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id LAA04095 for hackers-outgoing; Thu, 7 Sep 1995 11:43:14 -0700 Received: from tesla.cview.com (root@tesla.cview.com [204.95.57.17]) by freefall.freebsd.org (8.6.12/8.6.6) with SMTP id LAA04084 for ; Thu, 7 Sep 1995 11:43:10 -0700 Received: by tesla.cview.com (Smail3.1.29.0 #1) id m0sqltG-0001HKC; Thu, 7 Sep 95 13:41 CDT Message-Id: Date: Thu, 7 Sep 95 13:41 CDT From: malenovi@cview.com (Nik Malenovic) To: piero@strider.ibenet.it Subject: Re: root Telnet access Newsgroups: cview.freebsd.hackers In-Reply-To: Organization: CView Inc. Sender: hackers-owner@FreeBSD.org Precedence: bulk SET MODE /VERY_SARCASTIC /BLACK_HUMOR In article you write: >Quoting from dennis (Thu Sep 7 18:02:03 1995): >> How do you enable/allow root telnet access in FreeBSD? >By declaring all the ptys "secure" edit /etc/ttys. well you could also set /etc/hosts.equiv and put + + in it I'm sure it would solve the problem. or better yet, use vipw(1), end put blank field where root password is. heck, why not hack login(1) and delete the part that asks for password (and verifies it). I am sure it will help. >This question belongs to -question :) no it actually belongs to -brainless. If I wouldn't have NSA/FBI breathing through my phone line, I'd release a worm on your network. right before I'd cut your ISP link. balh Nik -- sin.com - Proudly running FreeBSD 2.0.5 486DX2/50 32 Mb RAM 1.5Gb SCSI Look at what Linux did - it made everyone aware of Unices, but it has put back the development of Unix-based OS for decades to come. Dont' ask what your PC can do for you, but what you can do for your PC - nuke Linux!