Frequently Asked Questions -------------------------- Since the software wasn't shown to anyone yet, there is no frequently asked questions! :) By the way, a few questions can be easily previewed: Q: Isn't the voice method more insecure than the standard one, using a typewritten phrase/word? A: No. Any method can be defined as insecure. As a malicious user can be recording the voice password using a powerful recorder, an attacker can also use cameras to whatch the keyboard sequence used in the password, or use a fake 'passwd' program to deviate the password to a file. Even more, the security of the method can be enhanced by the administrator, by changing the variables presented on the pam.conf module. See the README file for more informations about them. Q: Why did you choose voice, instead of iris or fingerprint recognition? A: Mostly because the lack of resources (money, get back!). Also, I like very much to work with music, so the voice method is closer to me than anything else ;) Q: Why PAM? A: Because a lot of another applications can make use of the authentication method without the need to be rewritten.