<--- Back to Details
First PageDocument Content
Computing / Sudo / Su / OTPW / Environment variable / Command-line interface / Privilege / Secure Shell / Umask / System software / Software / System administration
Date: 2014-01-06 13:00:43
Computing
Sudo
Su
OTPW
Environment variable
Command-line interface
Privilege
Secure Shell
Umask
System software
Software
System administration

SUDO(8) OpenBSD System Manager’s Manual SUDO(8)

Add to Reading List

Source URL: www.sudo.ws

Download Document from Source Website

File Size: 202,67 KB

Share Document on Facebook

Similar Documents

Cryptography / Computer access control / Computer security / Password / Security / Draw a Secret / Crypt / Key / Password strength / OTPW

Modeling user choice in the PassPoints graphical password scheme Ahmet Emir Dirik Nasir Memon

DocID: 1qnKy - View Document

Cryptography / Password / Security / Cryptographic hash functions / Salt / Random password generator / Passwd / Crypt / Dictionary attack / Password strength / OTPW

A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

DocID: 1lTzP - View Document

Computer access control / Computer security / Access control / Identity management / Cryptographic software / Cryptography / Federated identity / Password / Salt / LastPass / OTPW / Single sign-on

The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes

DocID: 1lbkU - View Document

Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

DocID: 1aQ6c - View Document

Access control / Identity management / Password / Salt / Passphrase / John the Ripper / Crypt / Security token / OTPW / Security / Computer security / Cryptography

The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

DocID: 1ahh2 - View Document