34 relations: Access control, Authentication, Bulletin board system, Chip log, Command (computing), Computer, Computer security, Credential, Guestbook, Home computer, Hotspot (Wi-Fi), HTTP cookie, Identity document, Linux, Logbook, Login session, Login spoofing, Multi-factor authentication, OpenID, OS/2, Password, Password policy, Personal computer, Personal identification number, Public computer, Screensaver, Style guide, Time-sharing, User (computing), Utmp, Web browser, Website, Windows 8, Windows NT.
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource.
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
A bulletin board system or BBS (also called Computer Bulletin Board Service, CBBS) is a computer server running software that allows users to connect to the system using a terminal program.
A chip log, also called common log, ship log, or just log, is a navigation tool mariners use to estimate the speed of a vessel through water.
In computing, a command is a directive to a computer program acting as an interpreter of some kind, in order to perform a specific task.
A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on.
A guestbook (also guest book, visitor log, visitors' book, visitors' album) is a paper or electronic means for a visitor to acknowledge a visit to a site, physical or web-based, and leave details such as their name, postal or electronic address and any comments.
Home computers were a class of microcomputers entering the market in 1977, and becoming common during the 1980s.
A hotspot is a physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local area network (WLAN) using a router connected to an internet service provider.
An HTTP cookie (also called web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.
An identity document (also called a piece of identification or ID, or colloquially as papers) is any document which may be used to prove a person's identity.
Linux is a family of free and open-source software operating systems built around the Linux kernel.
A logbook (a ship's logs or simply log) is a record of important events in the management, operation, and navigation of a ship.
In computing, a login session is the period of activity between a user logging in and logging out of a (multi-user) system.
Login spoofings are techniques used to steal a user's password.
Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).
OpenID is an open standard and decentralized authentication protocol.
OS/2 is a series of computer operating systems, initially created by Microsoft and IBM under the leadership of IBM software designer Ed Iacobucci.
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.
A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly.
A personal computer (PC) is a multi-purpose computer whose size, capabilities, and price make it feasible for individual use.
A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.
A public computer (or public access computer) is any of various computers available in public areas.
A screensaver (or screen saver) is a computer program that blanks the screen or fills it with moving images or patterns when the computer is not in use.
A style guide (or manual of style) is a set of standards for the writing and design of documents, either for general use or for a specific publication, organization, or field.
In computing, time-sharing is the sharing of a computing resource among many users by means of multiprogramming and multi-tasking at the same time.
A user is a person who utilizes a computer or network service.
utmp, wtmp, btmp and variants such as utmpx, wtmpx and btmpx are files on Unix-like systems that keep track of all logins and logouts to the system.
A web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.
A website is a collection of related web pages, including multimedia content, typically identified with a common domain name, and published on at least one web server.
Windows 8 is a personal computer operating system developed by Microsoft as part of the Windows NT family of operating systems.
Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993.
Automatic login, L-O-G-I-N, LOGIN, Log in, Log into, Log off, Log on, Log out, Log-in, Log-out, Logged in, Logged-in, Logging (computer security), Logging in, Logging out, Login (magazine), Login box, Login prompt, Login screen, Login system, Logoff, Logon banner, Logon screen, Logout, Sign in, Signing in, User Login.