ABSTRACT

The Heart of the Problem..................................................................................36 Contending with the Internet ............................................................................37 Statistics Don’t Lie...............................................................................................37 The Mathematics of Passwords .........................................................................39 UNIX and Linux ..................................................................................................40 Windows 95/Windows 98 ..................................................................................47 Windows NT 4.0 .................................................................................................51 Windows 2000.....................................................................................................55 UNIX/Linux..........................................................................................................58 Recommendations ...............................................................................................58

We live in a very untrusting world. Everywhere we look, we can find some cultural or organizational entity that seeks to police our actions, to keep us within the bounds of appropriate behavior that society has defined for us. At one point or another, each and every one of us has strayed from within these bounds, felt rebellious for doing so, and perhaps reflected on our infraction(s) with unbridled satisfaction. Hollywood has helped us escape the worldly restrictions placed on us — our allure for many movies lies in our envy for the fictional characters portrayed in them.