To combat brute force password cracking attempts in Unix, shadow passwords were introduced. While the user specific information remained in the /etc/passwd file, the encrypted password and other sensitive information was moved to an /etc/shadow file that was only readable by 'root'. This change in...