Topic 1: Research
Research the /etc/shadow file. Explain what each value represents. The values will be separated by a colon. An example is below. Feel free to use this in your explanation.
sally:$6$EmoFkLZPkHkpczVN2XRcMdyj8/ZeeT5UnTQ:15505:0:-1:7:-1:-1:
Also, after explaining each value be sure to add comments on if the values are sufficient for security in today’s networks. Should they be changed? If so, what should the values be?
Topic 2: Alternate System Logging Services
Using the Internet and book resources, find some alternate system logging services in use on Linux. Which one would you recommend using in your company and why?