Sure, how about this:
Even a relatively long, hard password exceeding most guidelines for password security is breakable in Windows, yet secure in *NIX.
Nobody suggested password lengths go down when *NIX moved from Crypt() with a two-character salt to MD5 with an eight-character salt. The password requirements remained the same so security could go up.
The idea of being able to use a shorter password with *NIX never even occured to me. Only a Microsoftie would see something like this and think "Gee, now I can use a shorter password." instead of "Wow, my current password length now gives me better security."
I have to admit, the security mindset of many of its users is one of the problems Windows endures.
I think I'll have to end this discussion (if you can call it that). Your statement is stupid and either purposely ignores my previous posts or you're really not able to converse on the same level.
Passwords have increased in length overtime. Salting allows you to keep the same password requirements but making it harder to crack the password (not impossible, but harder) without requiring the user to change his password. I typed it earlier and explained this in detail several times. If you're too obtuse to understand that, we can't continue this dialogue.