And you completely miss the point. In the industry is the concept of an acceptable password. It varies, but it's usually between 8-12 characters, no dictionary, varying amount of numbers and symbols required. Passwords outside this wherever there is a password policy are rare, if not non-existant (I've never seen them). Windows and Linux have very easy methods to enforce this, even network-wide.
So the point is that the decent passwords are breakable on Windows, but not on Linux. Pretty severe passwords (stronger than any password policy I've seen, even in a classified environment) are breakable on Windows. A Rainbow Crack for Linux would say "only breaks up to six-character passwords" and most of us would consider that to be mostly useless. We can maybe hope to grab a few passwords on home machines with no known probability of success. Meanwhile, Rainbow Crack can crack 99.9%+ of Windows passwords in use today.
These are simple facts, not that difficult really.
this just proves you don't know jack. What makes a decent password is one that can't be broken--not the one that most people use.
In the past it was impractical to break 7 character passwords, but as computers advanced password standards have become more complex. Linux using salting allows them to keep the old standard (shorter less complex passwords) instead of requiring the user to us a longer more complex password. Once again giving the user a better password experience. It's that's simple, you don't even know when to shut up on your point. I've admitted this time and time again, but yet you just keep on going and going and going in circles and switching topics and points. It's a good thing GW doesn't take debate class from you, or we'd have President Gore or Kerry right now.