>>It's worth noticing that any serious OS must allow user impersonation (is there such a word in English?), thus, it must expose a method to programatically logon a user. So, any good system admin should limit the number of failed logons in order to protect the system against password "guessing".
>Yeah, we use the "user impersonation" term. :-) And I see your point here.
We've dropped it to 3rd logon fail gets a permanent lockout now, and you have to go to LAN security HQ and show ID badge to get it reset.
So, how is it that we see in all the movies some device checking all possible combinations with some neat-looking device, and breaking into the systems? Artificial, I guess, or poorly-secure systems :)
The Anonymous Bureaucrat,
and frankly, quite content not to be
a member of either major US political party.