Introduction
When it comes to configuring systems, many users are reluctant to
change the default boot process. Visions of unbootable systems,
inaccessible data, and reinstalls dance in their heads. Yes, it is
good to be mindful of such things as they instill the necessary
attention to detail you'll need to use when making
changes. However, once you've taken the necessary
precautions, do take advantage of the hacks found in this chapter.
Many of them will increase the security of your system.
This chapter also includes several password hacks.
You'll learn how to create an effective password
policy and monitor compliance to that policy. You'll
find tools designed to assist you and your users in making good
password choices. You'll also learn how to configure
OTP, an excellent choice for when you're on the road
and wish to access your network's resources
securely.
|