password file - vertaling naar russisch
DICLIB.COM
AI-gebaseerde taaltools
Voer een woord of zin in in een taal naar keuze 👆
Taal:     

Vertaling en analyse van woorden door kunstmatige intelligentie

Op deze pagina kunt u een gedetailleerde analyse krijgen van een woord of zin, geproduceerd met behulp van de beste kunstmatige intelligentietechnologie tot nu toe:

  • hoe het woord wordt gebruikt
  • gebruiksfrequentie
  • het wordt vaker gebruikt in mondelinge of schriftelijke toespraken
  • opties voor woordvertaling
  • Gebruiksvoorbeelden (meerdere zinnen met vertaling)
  • etymologie

password file - vertaling naar russisch

TOOL ON MOST UNIX AND UNIX-LIKE OPERATING SYSTEMS USED TO CHANGE A USER'S PASSWORD
Shadow (file); Shadow passwords; Password shadowing; Shadowed password; Password Shadowing; Passwd (command); Passwd (file); /etc/passwd; /etc/shadow; Shadow password; Password file; /etc/master.passwd; Shadow file

password file         
файл паролей
shadow file         
ложный файл
password security         
MEASURE OF THE EFFECTIVENESS OF A PASSWORD IN RESISTING GUESSING AND BRUTE-FORCE ATTACKS
Weak password; Strong password; Password complexity; Password entropy; Commonly Used Passwords; 123456 (password); Password security; Commonly used passwords
безопасность на основе применения паролей (на основе парольной защиты)

Definitie

ПАРОЛЬ
я, м.
1. Секретное условное слово (или слова, фраза) для опознания своих на военной службе, а также в конспиративных организациях.
2. инф. Служебное слово, известное лишь немногим лицам и используемое для ограничения доступа к данным, имеющимся в ЭВМ.

Wikipedia

Passwd

passwd is a command on Unix, Plan 9, Inferno, and most Unix-like operating systems used to change a user's password. The password entered by the user is run through a key derivation function to create a hashed version of the new password, which is saved. Only the hashed version is stored; the entered password is not saved for security reasons.

When the user logs on, the password entered by the user during the log on process is run through the same key derivation function and the resulting hashed version is compared with the saved version. If the hashes are identical, the entered password is considered to be correct, and the user is authenticated. In theory, it is possible for two different passwords to produce the same hash. However, cryptographic hash functions are designed in such a way that finding any password that produces the same hash is very difficult and practically infeasible, so if the produced hash matches the stored one, the user can be authenticated.

The passwd command may be used to change passwords for local accounts, and on most systems, can also be used to change passwords managed in a distributed authentication mechanism such as NIS, Kerberos, or LDAP.

Vertaling van &#39password file&#39 naar Russisch