Remember that everything in *nix is essentially exposed to the user as a file. Suppose Alice, Harry, and Bob decide to change their passwords because of the shenanigans above. How would they do this? The passwd command can be used to modify the /etc/shadow file, an encrypted file of user passwords. List the permissions on the /usr/bin/passwd and /etc/shadow files from the user consoles with this command and record these (screenshot or text). Note the inclusion of a new permission bit, s, on the passwd command file. This stands for SUID, which allows the user who starts a program to obtain the file owner's permission to execute the file. So while the user is running the passwd command, they can run it as root. If the SUID bit was removed, the user would not be able to change his or her password. Change the passwords of Harry, Alice, and Bob. Create a new table with their passwords and insert it into your report (screenshot or text). How strong are the requirements for passwords in this application?