Page 119 - slides.dvi
P. 119
•
•
•
•
•
•
•
Unix
4.
5.
3.
–
1.
2.
To
Case
Use
If
Each
Aside:
i.e.
Get
Get
a
ok,
Publicly
Study—
Check
login:
Solution:
Problem:
Encrypt
entry
user
compute
Files
one-way
and
/etc/passwd
password
the
function
against
name
readable
off-line
shadow
Password
inverse
roughly
instantiate
holds
password
function
of
Filesystem
since
which
list
(e.g.
version
to
File
login
is
attack.
the
of
in
lots
passwords
of
easy
shell.
person
form:
encrypt
to
to
password
useful
info
compute
user-name:encrypted-passwd:home-directory:shell
passwords.
/etc/password
entries.
in
(/etc/shadow)
there.
one
phone-number
lookup).
direction,
but
has
a
hard
to
115