Chapter 4. Security issues of Linux-PAM