- Status changed to Fixed
almost 2 years ago 10:30pm 19 January 2023 Automatically closed - issue fixed for 2 weeks with no activity.
The administrative account (uid 1) is commonly targeted by attackers because this account has superuser privileges which cannot be blocked or limited. Attacks that do things like change the administrator password, or even brute force or social engineering attacks could compromise the administrator password. Because the administrative account has such wide privileges it is a good idea to create a role for administrators and explicitly create these less privileged accounts. The administrative account can be unblocked by users with the "administer users" permission if you need to use the account at a later time. This model follows the general Unix one of not running as root.
Fixed
2.0
Code
Not all content is available!
It's likely this issue predates Contrib.social: some issue and comment data are missing.
Automatically closed - issue fixed for 2 weeks with no activity.