Passwd

Results: 95



#Item
81Unix / Configuration files / System administration / File system / Home directory / Path / Superuser / Batch file / Passwd / Computing / System software / Software

User Commands SUS(1) NAME sus − super user shell

Add to Reading List

Source URL: pdg.uow.edu.au

Language: English - Date: 2009-12-13 00:59:34
82Scripting languages / Unix shells / System administration / Unix / Passwd / Command-line interface / Cd / Find / Expect / Software / Computing / System software

UNIX Survival Guide Rafael Ostertag $Id: unixsurvivalguide.xml[removed]19:36:16Z rafi $ Copyright © [removed]Rafael Ostertag Permission is granted to copy, distribute and/or modify this document under the terms

Add to Reading List

Source URL: www.guengel.ch

Language: English - Date: 2009-04-18 09:08:28
83Unix shells / Environment variable / Variable / Bash / Filter / Command-line interface / Passwd / Friendly interactive shell / PWB shell / Computing / Software / Scripting languages

Scripting.fm Page 33 Wednesday, February 9, 2011 6:30 PM 33 Do not put spaces around the = symbol or the shell will mistake your variable name for a command name.

Add to Reading List

Source URL: www.admin.com

Language: English - Date: 2013-02-01 20:01:45
84Unix / System administration / Cross-platform software / Password / Passwd / User / Superuser / Command-line interface / Firebird / Software / System software / Computing

Firebird Password File Utility Norman Dunbar 11 October 2011 – Document version 1.4 Table of Contents Introduction ......................................................................................................

Add to Reading List

Source URL: www.firebirdsql.org

Language: English - Date: 2011-10-12 03:14:57
85Internet protocols / Internet standards / Scripting languages / Expect / Telnet / System administration / Password / Rlogin / Passwd / Computing / Software / System software

Handling Passwords with Security and Reliability in Background Processes Don Libes – National Institute of Standards and Technology ABSTRACT Traditionally, background automation of interactive processes meant giving up

Add to Reading List

Source URL: expect.sourceforge.net

Language: English - Date: 1999-09-29 11:26:31
86System administration / Computing / Shadow password / Unix security / Passwd / Group identifier / Home directory / Su / Password / System software / Unix / Software

UNIX Security By Rajib K. Mitra Copyright 1998 Rajib K. Mitra

Add to Reading List

Source URL: www.spy.net

Language: English - Date: 1998-07-10 17:12:27
87System administration / Computing / Unix security / Shadow password / Passwd / Group identifier / Su / Home directory / Password / System software / Unix / Software

RTF Document

Add to Reading List

Source URL: www.spy.net

Language: English - Date: 1998-04-07 23:15:13
88System administration / Unix / Password / Computer network security / Cryptography / Shadow password / LM hash / Passwd / Network security / Security / Computer security / Cyberwarfare

(U) The 60 Minute Network Security Guide

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-12 13:18:02
89Password / Salt / Shadow password / Crypt / Cryptographic software / Password cracking / Passwd / Password strength / System software / Cryptography / Computer security

A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack Udi Manber1

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-24 20:55:09
90Password / Computing / Passwd / Access token / Control key / Cyberwarfare / Computer network security / Kerberos / Computer security

Leash User Documentation Release[removed]Copyright 2004 by the Massachusetts Institute of Technology

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2004-09-13 18:00:56
UPDATE