Unfortunately no one can be told what Phantom Linux OS is - you have to see it for yourself.
You are not logged in.
In the aftermath of the RockYou assault, safety researchers, each commercial and educational, did in depth analysis on the printed passwords and compiled lists of the mostly used passwords and figured out the recurring algorithms that people had.
my site :: ufac168
Here is my blog :: ufac168
Offline