Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Install
Faster access than browser!
 

Login

Index Login

In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves. [1]

34 relations: Access control, Authentication, Bulletin board system, Chip log, Command (computing), Computer, Computer security, Credential, Guestbook, Home computer, Hotspot (Wi-Fi), HTTP cookie, Identity document, Linux, Logbook, Login session, Login spoofing, Multi-factor authentication, OpenID, OS/2, Password, Password policy, Personal computer, Personal identification number, Public computer, Screensaver, Style guide, Time-sharing, User (computing), Utmp, Web browser, Website, Windows 8, Windows NT.

Access control

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource.

New!!: Login and Access control · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Login and Authentication · See more »

Bulletin board system

A bulletin board system or BBS (also called Computer Bulletin Board Service, CBBS) is a computer server running software that allows users to connect to the system using a terminal program.

New!!: Login and Bulletin board system · See more »

Chip log

A chip log, also called common log, ship log, or just log, is a navigation tool mariners use to estimate the speed of a vessel through water.

New!!: Login and Chip log · See more »

Command (computing)

In computing, a command is a directive to a computer program acting as an interpreter of some kind, in order to perform a specific task.

New!!: Login and Command (computing) · See more »

Computer

A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.

New!!: Login and Computer · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Login and Computer security · See more »

Credential

Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on.

New!!: Login and Credential · See more »

Guestbook

A guestbook (also guest book, visitor log, visitors' book, visitors' album) is a paper or electronic means for a visitor to acknowledge a visit to a site, physical or web-based, and leave details such as their name, postal or electronic address and any comments.

New!!: Login and Guestbook · See more »

Home computer

Home computers were a class of microcomputers entering the market in 1977, and becoming common during the 1980s.

New!!: Login and Home computer · See more »

Hotspot (Wi-Fi)

A hotspot is a physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local area network (WLAN) using a router connected to an internet service provider.

New!!: Login and Hotspot (Wi-Fi) · See more »

HTTP cookie

An HTTP cookie (also called web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.

New!!: Login and HTTP cookie · See more »

Identity document

An identity document (also called a piece of identification or ID, or colloquially as papers) is any document which may be used to prove a person's identity.

New!!: Login and Identity document · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Login and Linux · See more »

Logbook

A logbook (a ship's logs or simply log) is a record of important events in the management, operation, and navigation of a ship.

New!!: Login and Logbook · See more »

Login session

In computing, a login session is the period of activity between a user logging in and logging out of a (multi-user) system.

New!!: Login and Login session · See more »

Login spoofing

Login spoofings are techniques used to steal a user's password.

New!!: Login and Login spoofing · See more »

Multi-factor authentication

Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).

New!!: Login and Multi-factor authentication · See more »

OpenID

OpenID is an open standard and decentralized authentication protocol.

New!!: Login and OpenID · See more »

OS/2

OS/2 is a series of computer operating systems, initially created by Microsoft and IBM under the leadership of IBM software designer Ed Iacobucci.

New!!: Login and OS/2 · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Login and Password · See more »

Password policy

A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly.

New!!: Login and Password policy · See more »

Personal computer

A personal computer (PC) is a multi-purpose computer whose size, capabilities, and price make it feasible for individual use.

New!!: Login and Personal computer · See more »

Personal identification number

A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.

New!!: Login and Personal identification number · See more »

Public computer

A public computer (or public access computer) is any of various computers available in public areas.

New!!: Login and Public computer · See more »

Screensaver

A screensaver (or screen saver) is a computer program that blanks the screen or fills it with moving images or patterns when the computer is not in use.

New!!: Login and Screensaver · See more »

Style guide

A style guide (or manual of style) is a set of standards for the writing and design of documents, either for general use or for a specific publication, organization, or field.

New!!: Login and Style guide · See more »

Time-sharing

In computing, time-sharing is the sharing of a computing resource among many users by means of multiprogramming and multi-tasking at the same time.

New!!: Login and Time-sharing · See more »

User (computing)

A user is a person who utilizes a computer or network service.

New!!: Login and User (computing) · See more »

Utmp

utmp, wtmp, btmp and variants such as utmpx, wtmpx and btmpx are files on Unix-like systems that keep track of all logins and logouts to the system.

New!!: Login and Utmp · See more »

Web browser

A web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.

New!!: Login and Web browser · See more »

Website

A website is a collection of related web pages, including multimedia content, typically identified with a common domain name, and published on at least one web server.

New!!: Login and Website · See more »

Windows 8

Windows 8 is a personal computer operating system developed by Microsoft as part of the Windows NT family of operating systems.

New!!: Login and Windows 8 · See more »

Windows NT

Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993.

New!!: Login and Windows NT · See more »

Redirects here:

Automatic login, L-O-G-I-N, LOGIN, Log in, Log into, Log off, Log on, Log out, Log-in, Log-out, Logged in, Logged-in, Logging (computer security), Logging in, Logging out, Login (magazine), Login box, Login prompt, Login screen, Login system, Logoff, Logon banner, Logon screen, Logout, Sign in, Signing in, User Login.

References

[1] https://en.wikipedia.org/wiki/Login

OutgoingIncoming
Hey! We are on Facebook now! »