Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: nyu notesfiles V1.1 4/1/84; site down.FUN
Path: utzoo!watmath!clyde!burl!ulysses!allegra!princeton!down!pep
From: pep@down.FUN
Newsgroups: net.unix-wizards
Subject: Re: random password generator
Message-ID: <5200004@down.FUN>
Date: Fri, 17-Aug-84 22:32:00 EDT
Article-I.D.: down.5200004
Posted: Fri Aug 17 22:32:00 1984
Date-Received: Sun, 19-Aug-84 03:17:15 EDT
References: <1158@rti-sel.UUCP>
Organization: The Official Fun Machine of Princeton University EECS
Lines: 13
Nf-ID: #R:rti-sel:-115800:down:5200004:000:585
Nf-From: down!pep    Aug 17 22:32:00 1984

* down's root password has been internationally compromised! *

Needless to say, the perpetrators have been severely punished.
After forcing them to read every article about Stonehenge at
300 baud, they were obliged to create a sendmail config file
(without consulting a sample).  They were removed from the
premises in straitjackets by qualified attendants in white coats.
Their communication lines have been cut, their bits scattered.
They are banished from the FUN domain.
					pep (down!root)

PS - Since I couldn't think of a better root password, I've
	eliminated it altogether.