In linux, when user logs in the [...] command runs silently and does authentication check against /etc/passwd, /etc/shadow, and also makes sure user is using right tty (teletypewriter/terminal) to login, etc.
Answer
login
Question
In linux, when user logs in the [...] command runs silently and does authentication check against /etc/passwd, /etc/shadow, and also makes sure user is using right tty (teletypewriter/terminal) to login, etc.
Answer
?
Question
In linux, when user logs in the [...] command runs silently and does authentication check against /etc/passwd, /etc/shadow, and also makes sure user is using right tty (teletypewriter/terminal) to login, etc.
Answer
login
If you want to change selection, open document below and click on "Move attachment"
11. User Accounts and Ownerships ost often gains access to the system through the login program. This program looks up the UID and GID from the passwd and group file and authenticates the user. The following is quoted from the <span>login man page, and explains this procedure in detail: login is used when signing onto a system. It can also be used to switch from one user to another at any time (most modern shells have su
Summary
status
not learned
measured difficulty
37% [default]
last interval [days]
repetition number in this series
0
memorised on
scheduled repetition
scheduled repetition interval
last repetition or drill
Details
No repetitions
Discussion
Do you want to join discussion? Click here to log in or create user.