Host security measures aim to comprehensively protect individual hosts through host-centric approaches tailored to the host's architecture and configuration. This involves securing configurations, access controls, permissions and services on Unix-like systems. Common weaknesses include password issues, exploitable services and improper permissions. Unix uses users, groups and world permissions on files and directories to control access. Proper configuration of these permissions and use of setuid programs is important for security. The Unix password system has evolved from storing passwords in plaintext to using shadow files and stronger encryption.