Entry Hare:2001:RUPb from sysadmin.bib
Last update: Wed Jul 13 02:04:01 2016
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Hare:2001:RUPb,
author = "Chris Hare",
title = "Revisiting {UNIX} Password Controls -- Part 2",
journal = j-SYS-ADMIN,
volume = "10",
number = "11",
pages = "35--38",
month = nov,
year = "2001",
CODEN = "SYADE7",
ISSN = "1061-2688",
bibdate = "Fri Feb 08 11:17:41 2002",
abstract = "The first part of Hare's series discussed the
encryption methods used in protecting the passwords on
a UNIX system. This concluding article describes using
a shadow file to provide further protection for the
encrypted passwords and discusses the validity of
password-cracking tools.",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sysadmin.bib",
acknowledgement = ack-nhfb,
}
Related entries
- 10-10-30,
10(10)39,
10(10)39,
11(1)29
- 10-10-30,
10(10)39,
10(10)39,
11(1)29
- 10-10-30,
10(10)39,
10(10)39,
11(1)29
- 10-4-22, 10-5-46,
10(6)31,
10(6)z-2,
10(7)49,
10(7)z-2,
10(8)z,
10(9)z-1
- 10-5-8, 10-5-31, 10-5-38, 10-5-46, 10-5-58,
10(6)41,
10(6)49,
11(1)33,
11(1)41
- 10-8-8,
10(8)31,
10(8)z,
10(10)z,
10(10)z-2,
10(11)39,
11(1)23,
11(1)29
- 10-9-24, 10-10-30, 10-11-16,
11(1)23,
11(1)33,
11(5)31
- 6-6-8, 6-6-45, 6-11-8,
6(12)23,
7(4)27,
7(5)57,
7(7)41,
7(9)0-1,
7(9)z-z,
7(9)z-z,
7(10)57,
8(1)45,
8(1)55,
8(2)55,
8(3)47,
8(4)61,
8(6)57,
8(7)55,
8(9)25,
8(9)35,
8(11)39,
9(2)33,
9(3)51,
9(5)79,
9(6)61,
9(8)55,
9(8)69,
9(9)33,
10(1)51,
10(3)57,
10(6)49,
10(7)z,
10(8)z,
10(8)z-1,
10(10)z,
11(1)29
- 7-12-8,
7(12)37,
9(4)69,
9(6)45,
9(6)53,
9(12)35
- 7-8-57,
7(11)37,
7(11)41,
8(1)23,
8(2)47,
8(6)21,
8(8)45,
8(9)43,
8(10)43,
8(12)53,
8(12)63,
9(1)37,
9(3)61,
9(4)59,
9(5)29,
9(5)51,
9(6)61,
9(6)69,
9(6)73,
9(7)z,
9(7)z-1,
10(1)51,
10(1)67,
10(4)59,
9(7)z,
9(7)z-1,
9(8)55,
10(1)45,
10(4)63,
7(9)0,
8(1)39,
8(5)29,
8(7)35,
8(9)65,
9(6)69,
9(9)77
- 9-4-42,
9(5)51,
9(6)69,
9(9)77,
9(11)57,
9(12)71,
10(1)67
- concluding,
10(1)67
- first,
6(5)21,
7(2)39,
7(5)33,
8(1)23,
8(8)33,
8(11)45,
9(5)57,
9(9)77,
10(4)59
- further,
9(10)67
- Hare, Chris,
1(1)29,
1(1)53,
1(2)z-6,
1(3)13,
1(4)50,
2(1)64,
2(2)78,
2(3)77,
2(4)35,
2(4)63,
2(5)67,
2(6)6,
3(1)6,
3(4)75,
3(5)48,
4(1)z-2,
4(2)8,
4(5)109,
7(12)57
- method,
3(5)89,
5(10)32,
6(9)49,
6(12)43,
7(12)65,
9(4)51,
9(7)z,
9(7)z-4,
9(8)69,
9(11)57,
10(5)z
- part,
2(1)53,
2(2)69,
3(6)107,
4(1)z-1,
7(2)39,
7(12)57,
9(5)51,
9(5)77,
9(6)73,
9(9)23,
9(11)57,
9(11)71,
9(12)71,
9(12)77,
10(1)87,
10(6)41,
10(12)z-4
- password,
1(1)53,
3(2)50,
4(2)113,
5(2)69,
5(6)63,
7(2)39,
7(10)35,
8(1)49,
8(12)47,
9(8)49,
9(9)55,
10(8)47
- protection,
7(12)57