They are all important, because they all fix critical security vulnerabilities.
What kind of incompetent fool would still use such a pathetically weak password hashing scheme?
C is always 'on error resume next'.
Will they forbid the interpretation of TCP sequence numbers without explicit user permission too?
You forgot to mention the existence of serial consoles in your eagerness to shill for VMWare.
Read http://lwn.net/ instead.
So why not open the LSE at the same actual *time* and ignore this political tomfoolery?
And that is exactly what you do in the real world.
e.g., pam_unix allows you to set the 'rounds' parameter to slow the calculations, in case the increased default is not paranoid enough for you.
The original article simply gives us a bunch of SHA1 hashes, unmodified, unsalted. Far too weak for real-world use, yes.
I refer you to "Interesting times for Linux Flash support" at http://lwn.net/Articles/389266/. I don't know why more (any) LWN articles aren't linked to from Slashdot.
Pfft. It says, right there, "on Linux". What else could that possibly mean?
A standard that Microsoft, Apple and Google would have ignored.