13,420
edits
Changes
→Configuring a Service
===Configuring a Service===
*A common (if somewhat blatant way) to try to hack into a machine is to try to ssh as '''root''' and brute-force root's the password.
**The root user always exists, meaning the attacker doesn't need to try guessing what user names are on your system.
**And if they can get access to root, they can do anything.