Classnotes | UNIX03 | RecentChanges | Preferences Using John the Ripper, scan your system's shadow file and see what users have weak passwords. Be sure to scan a copy of the shadow file so you don't risk ruining the original. Also be sure that the copy of the shadow file is still only readable by you so that no other user can gain access to it!
Correct any weak passwords.
After that, look through /etc/passwd and /etc/shadow and make certain that all system accounts are disabled or having passwords assigned to them.