Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!


Index Passwd

passwd is a tool on most Unix and Unix-like operating systems used to change a user's password. [1]

52 relations: Berkeley Software Distribution, Blowfish (cipher), Brute-force attack, Chsh, Collision resistance, Colon (punctuation), Command-line interface, Crypt (C), Crypt (Unix), Cryptographic hash function, File system permissions, Front and back ends, Gecos field, Getent, Group identifier, Hash function, Home directory, Kerberos (protocol), Key derivation function, Key stretching, Lightweight Directory Access Protocol, Line (text file), Linux, Login, Logname, Ls, MD5, Name Service Switch, Network Information Service, Passwd, Password, Password cracking, Plaintext, Pluggable authentication module, Rainbow table, Salt (cryptography), SHA-2, Shell (computing), Su (Unix), SunOS, Superuser, Telnet, Text file, Unix, Unix security, UNIX System V, Unix time, Unix-like, User (computing), User identifier, ..., Vipw, Xenix. Expand index (2 more) »

Berkeley Software Distribution

Berkeley Software Distribution (BSD) was a Unix operating system derivative developed and distributed by the Computer Systems Research Group (CSRG) of the University of California, Berkeley, from 1977 to 1995.

New!!: Passwd and Berkeley Software Distribution · See more »

Blowfish (cipher)

Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.

New!!: Passwd and Blowfish (cipher) · See more »

Brute-force attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.

New!!: Passwd and Brute-force attack · See more »


chsh (an abbreviation of "change shell") is a command on Unix-like operating systems that is used to change a login shell.

New!!: Passwd and Chsh · See more »

Collision resistance

Collision resistance is a property of cryptographic hash functions: a hash function H is collision resistant if it is hard to find two inputs that hash to the same output; that is, two inputs a and b such that H(a).

New!!: Passwd and Collision resistance · See more »

Colon (punctuation)

The colon is a punctuation mark consisting of two equally sized dots centered on the same vertical line.

New!!: Passwd and Colon (punctuation) · See more »

Command-line interface

A command-line interface or command language interpreter (CLI), also known as command-line user interface, console user interface and character user interface (CUI), is a means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines).

New!!: Passwd and Command-line interface · See more »

Crypt (C)

crypt is the library function which is used to compute a password hash that can be used to store user account passwords while keeping them relatively secure (a passwd file).

New!!: Passwd and Crypt (C) · See more »

Crypt (Unix)

In Unix computing, crypt is a utility program used for encryption.

New!!: Passwd and Crypt (Unix) · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Passwd and Cryptographic hash function · See more »

File system permissions

Most file systems have methods to assign permissions or access rights to specific users and groups of users.

New!!: Passwd and File system permissions · See more »

Front and back ends

In software engineering, the terms front end and back end refer to the separation of concerns between the presentation layer (front end), and the data access layer (back end) of a piece of software, or the physical infrastructure or hardware.

New!!: Passwd and Front and back ends · See more »

Gecos field

The gecos field, or GECOS field is an entry in the /etc/passwd file on Unix, and similar operating systems.

New!!: Passwd and Gecos field · See more »


getent is a unix command that helps a user get entries in a number of important text files called databases.

New!!: Passwd and Getent · See more »

Group identifier

In Unix-like systems, multiple users can be put into groups.

New!!: Passwd and Group identifier · See more »

Hash function

A hash function is any function that can be used to map data of arbitrary size to data of a fixed size.

New!!: Passwd and Hash function · See more »

Home directory

A home directory is a file system directory on a multi-user operating system containing files for a given user of the system.

New!!: Passwd and Home directory · See more »

Kerberos (protocol)

Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

New!!: Passwd and Kerberos (protocol) · See more »

Key derivation function

In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.

New!!: Passwd and Key derivation function · See more »

Key stretching

In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the time it takes to test each possible key.

New!!: Passwd and Key stretching · See more »

Lightweight Directory Access Protocol

The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.

New!!: Passwd and Lightweight Directory Access Protocol · See more »

Line (text file)

In computing, a line is a unit of organization for text files.

New!!: Passwd and Line (text file) · See more »


Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Passwd and Linux · See more »


In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.

New!!: Passwd and Login · See more »


In computer software, logname (stands for Login Name) is a program in Unix and Unix-like operating systems that prints the name of the user executing the command.

New!!: Passwd and Logname · See more »


In computing, ls is a command to list files in Unix and Unix-like operating systems.

New!!: Passwd and Ls · See more »


The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: Passwd and MD5 · See more »

Name Service Switch

The Name Service Switch (NSS) is a facility in Unix-like operating systems that provides a variety of sources for common configuration databases and name resolution mechanisms.

New!!: Passwd and Name Service Switch · See more »

Network Information Service

The Network Information Service, or NIS (originally called Yellow Pages or YP), is a client–server directory service protocol for distributing system configuration data such as user and host names between computers on a computer network.

New!!: Passwd and Network Information Service · See more »


passwd is a tool on most Unix and Unix-like operating systems used to change a user's password.

New!!: Passwd and Passwd · See more »


A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Passwd and Password · See more »

Password cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

New!!: Passwd and Password cracking · See more »


In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Passwd and Plaintext · See more »

Pluggable authentication module

A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API).

New!!: Passwd and Pluggable authentication module · See more »

Rainbow table

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes.

New!!: Passwd and Rainbow table · See more »

Salt (cryptography)

In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" data, a password or passphrase.

New!!: Passwd and Salt (cryptography) · See more »


SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

New!!: Passwd and SHA-2 · See more »

Shell (computing)

In computing, a shell is a user interface for access to an operating system's services.

New!!: Passwd and Shell (computing) · See more »

Su (Unix)

The Unix command su, sometimes described as substitute user, super user, switch user, or set user, is used by a computer user to execute commands with the privileges of another user account.

New!!: Passwd and Su (Unix) · See more »


SunOS is a Unix-branded operating system developed by Sun Microsystems for their workstation and server computer systems.

New!!: Passwd and SunOS · See more »


In computing, the superuser is a special user account used for system administration.

New!!: Passwd and Superuser · See more »


Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

New!!: Passwd and Telnet · See more »

Text file

A text file (sometimes spelled "textfile"; an old alternative name is "flatfile") is a kind of computer file that is structured as a sequence of lines of electronic text.

New!!: Passwd and Text file · See more »


Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Passwd and Unix · See more »

Unix security

Unix security refers to the means of securing a Unix or Unix-like operating system.

New!!: Passwd and Unix security · See more »

UNIX System V

UNIX System V (pronounced: "System Five") is one of the first commercial versions of the Unix operating system.

New!!: Passwd and UNIX System V · See more »

Unix time

Unix time (also known as POSIX time or UNIX Epoch time) is a system for describing a point in time, defined as the number of seconds that have elapsed since 00:00:00 Coordinated Universal Time (UTC), Thursday, 1 January 1970,.

New!!: Passwd and Unix time · See more »


A Unix-like (sometimes referred to as UN*X or *nix) operating system is one that behaves in a manner similar to a Unix system, while not necessarily conforming to or being certified to any version of the Single UNIX Specification.

New!!: Passwd and Unix-like · See more »

User (computing)

A user is a person who utilizes a computer or network service.

New!!: Passwd and User (computing) · See more »

User identifier

Unix-like operating systems identify a user within the kernel by a value called a user identifier, often abbreviated to user ID or UID.

New!!: Passwd and User identifier · See more »


vipw is a small computer program which enables a Unix system administrator to comfortably edit the "passwd" and "Shadow password" files.

New!!: Passwd and Vipw · See more »


Xenix is a discontinued version of the Unix operating system for various microcomputer platforms, licensed by Microsoft from AT&T Corporation in the late 1970s.

New!!: Passwd and Xenix · See more »

Redirects here:

/etc/passwd, /etc/shadow, Passwd (command), Passwd (file), Password Shadowing, Password file, Password shadowing, Shadow (file), Shadow password, Shadow passwords, Shadowed password.


[1] https://en.wikipedia.org/wiki/Passwd

Hey! We are on Facebook now! »