- password change module
- модуль замены паролей
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Shadow password — In computing, Unix like operating systems use the shadow password database mechanism to increase the security level of passwords by preventing ordinary users from accessing encrypted password data.Unshadowed passwords On a system without shadowed … Wikipedia
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia
IBM System/34 — The IBM System/34 was a minicomputer marketed by IBM from 1978 to 1983. It was a multi user, multi tasking successor to the single user System/32. Most notably, it included two very different processors, one based on System/32 and the second… … Wikipedia
Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering … Wikipedia
Passwd (command) — passwd is a tool on most Unix and Unix like operating systems used to change a user s password. The passwd entered by the user is run through a key derivation function to create a hashed version of the new password, which is saved. Only the… … Wikipedia
Sirius Satellite Radio — Infobox Company company name = Sirius Satellite Radio company company type = Division of Sirius XM Radio company slogan = The Best Radio on Radio foundation = May 17, 1990 (as Satellite CD Radio, Inc.) location = New York City, New York, United… … Wikipedia
chsh — (an abbreviation of change shell ) is a command on Unix like operating systems that is used to change a login shell. Users can either supply the pathname of the shell that they wish to change to on the command line, or supply no arguments, in… … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Chsh — (an abbreviation of change shell ) is a command on Unix like operating systems that is used to change a login shell. Users can either supply the pathname of the shell that they wish to change to on the command line, or supply no arguments, in… … Wikipedia
VS/9 — was a computer operating system available for the Univac 90/60, 90/70 and 90/80 mainframe during the late 1960s through 1980s. It provided the capability to allow both interactive and batch operations on the same computer.BackgroundIn the late… … Wikipedia
Kernel (computing) — A kernel connects the application software to the hardware of a computer In computing, the kernel is the main component of most computer operating systems; it is a bridge between applications and the actual data processing done at the hardware… … Wikipedia