Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: nyu notesfiles V1.1 4/1/84; site down.FUN Path: utzoo!watmath!clyde!burl!ulysses!allegra!princeton!down!pep From: pep@down.FUN Newsgroups: net.unix-wizards Subject: Re: random password generator Message-ID: <5200004@down.FUN> Date: Fri, 17-Aug-84 22:32:00 EDT Article-I.D.: down.5200004 Posted: Fri Aug 17 22:32:00 1984 Date-Received: Sun, 19-Aug-84 03:17:15 EDT References: <1158@rti-sel.UUCP> Organization: The Official Fun Machine of Princeton University EECS Lines: 13 Nf-ID: #R:rti-sel:-115800:down:5200004:000:585 Nf-From: down!pep Aug 17 22:32:00 1984 * down's root password has been internationally compromised! * Needless to say, the perpetrators have been severely punished. After forcing them to read every article about Stonehenge at 300 baud, they were obliged to create a sendmail config file (without consulting a sample). They were removed from the premises in straitjackets by qualified attendants in white coats. Their communication lines have been cut, their bits scattered. They are banished from the FUN domain. pep (down!root) PS - Since I couldn't think of a better root password, I've eliminated it altogether.