PAM - It's NOT The Non-Stick Cooking Spray

To combat brute force password cracking attempts in Unix, shadow passwords were introduced. While the user specific information remained in the /etc/passwd file, the encrypted password and other sensitive information was moved to an /etc/shadow file that was only readable by 'root'. This change in...
By
Susanne Ramsey
November 28, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg