Kamis, 14 Juni 2018

Sponsored Links

src: cdn.colorlib.com

In computer security, signing in (or signing in or signing in or going into ) is a process whereby individuals gain access to computer systems by identifying and authenticating themselves. User credentials are usually matching "username" and "password", and these credentials are sometimes referred to as login , (or logon or sign in or sign in ). In practice, modern security systems also often require a second factor for extra security.

When access is no longer needed, users can logout ( log off , exit or sign off ).


Video Login



Procedures

Log in is usually used to enter a specific page, which can not be seen by an intruder. Once a user logs in, a login token can be used to track what actions a user has taken when connecting to a site. Logout can be done explicitly by users who take multiple actions, such as entering the appropriate command, or clicking on a website link labeled as such. This can also be done implicitly, such as by the user shutting down his computer, closing the web browser window, leaving the website, or not refreshing the web page within the specified period.

In the case of websites that use cookies to track sessions, when users log out, the session-only cookies from that site are usually deleted from the user's computer. Additionally, the server un-associates with sessions, making any session grip in the user's cookie store useless. This feature is useful if the user is using a public computer or a computer using a public wireless connection. As a security precaution, one should not rely on implicit ways to get out of the system, especially not on a public computer, instead people should exit explicitly and wait for confirmation that this request has occurred.

Exiting the computer when leaving it is a common security practice, preventing unauthorized users from destroying it. There are also people who choose password protected screensavers to activate after a period of inactivity, requiring users to re-enter their login credentials to unlock the screensaver and gain access to the system. There are various methods of logging that can be done through images, fingerprints, eye scans, passwords (spoken or text input), etc.

Maps Login



History and etymology

This term became common with the 1960s time division system and Bulletin Board Systems (BBS) in the 1970s. Early home computers and personal computers generally did not require them until Windows NT, OS/2 and Linux in the 1990s.

The noun entry comes from the verb (into) log in , and by analogy with the verb to the in clock . The computer system stores log the user access to the system. The term "log" is derived from log chips that have historically been used to record the distance traveled at sea, and recorded in logs or logbooks of ships. To sign in connotes the same idea, but based on the logical signing analogy of logs or visitors' books.

While there is no agreed difference between three terms ( logged in logon and logged in ), different technical communities tend to choose one or more - Unix, Novell, Linux and Apple usually use login , with Apple style guides saying "Users are logged in to file servers (not logged in)..." In contrast, style guides Microsoft traditionally suggests otherwise, and specifies log on and logon . In the past Microsoft used login when accessing the Internet but from Windows 8 onwards, it has moved to the incoming terminology for local authentication.

src: cdn.colorlib.com


See also

  • Account
  • Computer security
  • Login session
  • Login spoofing
  • OpenID
  • Password
  • Password policy
  • Personal identification number
  • /var/log/wtmp

src: cdn.colorlib.com


References

Source of the article : Wikipedia

Comments
0 Comments