Sponsored Content
Special Forums Cybersecurity CompTIA Security+ book for beginner? Post 302938037 by fpmurphy on Wednesday 11th of March 2015 01:03:29 PM
Old 03-11-2015
Book I always recommend is Sytex's CompTIA Security+ Study Guide. Make sure it is the 6th edition for the SYO-401 exam as the eariier Security+ exams are now retired.
This User Gave Thanks to fpmurphy For This Post:
 

3 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Unix beginner book help

Due to my new job I need to learn Unix to advance in the company and I am mainly a windows and mac user. What is a good book to get me started on the right path and hopefully prevent me from wasting money on several books and weeks of reading. Any response is welcomed thanks in advance. (3 Replies)
Discussion started by: windowsux
3 Replies

2. UNIX for Dummies Questions & Answers

UNIX Beginner's Book

I am a beginner and have recently started to study unix. I checked some of the posts on this forum just to check if a new member like me can easily be guided and found it very interesting. This seems like a great place where i can get answer to my doubts and questions. I checked the thread for... (1 Reply)
Discussion started by: kaal
1 Replies

3. IP Networking

CompTIA Network+ book for beginner?

please i want a name of a CompTIA Network+ book for beginner? (1 Reply)
Discussion started by: cetu
1 Replies
passwd(5)							File Formats Manual							 passwd(5)

Name
       passwd - password file

Description
       The file is an ASCII file that contains the following information for each user:

	      Login name
	      Password field
	      User ID
	      Group ID
	      User's real name, office, extension, home phone
	      Initial working directory
	      Program to use as Shell

       Each  line  in the file represents a user entry.  Each field within a user entry is separated from the next by a colon.	Each user entry is
       separated from the next by a new line.  If the password field is null, no password is demanded; if the Shell field is null, then is used.

       This file resides in directory Because the password, if present, is encrypted, the file has general read permission and can  be	used,  for
       example, to map user IDs to names.

       The  ``user's  real name'' can contain an ampersand (&), meaning insert the login name.	This information is set by the command and used by
       the command.

       Appropriate precautions must be taken to lock the file against changes if it is to be edited with a text editor.  The command does the nec-
       essary locking.

       If  the system is running UPGRADE security level and an asterisk appears in the password field, or if the system is running ENHANCED level,
       then the content of the password field is ignored and the password for the account is located in the authentication database. See  and  the
       Security Guide for Administrators for more information.

       The  files  and	if they exist, contain the hashed version of the file.	If present, they are used by the and functions to retrieve entries
       rapidly.  See for more information.

       The database can be distributed in a network by a naming service, such as Yellow Pages or BIND/Hesiod.  See the Guide to the  Yellow  Pages
       Service or the Guide to the BIND/Hesiod Service for setup information.

Restrictions
       The ``name'' can contain only lowercase ASCII characters a to z and the numbers 0 to 9.

Files
See Also
       chfn(1), finger(1), login(1), passwd(1), crypt(3), getpwent(3), auth(5), group(5), adduser(8), mkpasswd(8), vipw(8)
       Guide to the BIND/Hesiod Service
       Guide to the Yellow Pages Service
       Security Guide for Administrators

																	 passwd(5)
All times are GMT -4. The time now is 04:25 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy