Visit The New, Modern Unix Linux Community

Linux and UNIX Man Pages

Test Your Knowledge in Computers #841
Difficulty: Medium
Push technology, or server push, is a style of Internet-based communication where the request for a given transaction is initiated by the publisher or central server.
True or False?
Linux & Unix Commands - Search Man Pages

login(1) [v7 man page]

LOGIN(1)						      General Commands Manual							  LOGIN(1)

NAME
login - sign on SYNOPSIS
login [ username ] DESCRIPTION
The login command is used when a user initially signs on, or it may be used at any time to change from one user to another. The latter case is the one summarized above and described here. See `How to Get Started' for how to dial up initially. If login is invoked without an argument, it asks for a user name, and, if appropriate, a password. Echoing is turned off (if possible) during the typing of the password, so it will not appear on the written record of the session. After a successful login, accounting files are updated and the user is informed of the existence of .mail and message-of-the-day files. Login initializes the user and group IDs and the working directory, then executes a command interpreter (usually sh(1)) according to speci- fications found in a password file. Argument 0 of the command interpreter is `-sh. Login is recognized by sh(1) and executed directly (without forking). FILES
/etc/utmp accounting /usr/adm/wtmp accounting /usr/mail/* mail /etc/motd message-of-the-day /etc/passwd password file SEE ALSO
init(8), newgrp(1), getty(8), mail(1), passwd(1), passwd(5) DIAGNOSTICS
`Login incorrect,' if the name or the password is bad. `No Shell', `cannot open password file', `no directory': consult a programming counselor. LOGIN(1)

Check Out this Related Man Page

LOGIN(1)						    BSD General Commands Manual 						  LOGIN(1)

NAME
login -- log into the computer SYNOPSIS
login [-fp] [-h hostname] [user] DESCRIPTION
The login utility logs users (and pseudo-users) into the computer system. If no user is specified, or if a user is specified and authentication of the user fails, login prompts for a user name. Authentication of users is done via passwords. The options are as follows: -f The -f option is used when a user name is specified to indicate that proper authentication has already been done and that no password need be requested. This option may only be used by the super-user or when an already logged in user is logging in as themselves. -h The -h option specifies the host from which the connection was received. It is used by various daemons such as telnetd(8). This option may only be used by the super-user. -p By default, login discards any previous environment. The -p option disables this behavior. If the file /etc/nologin exists, login dislays its contents to the user and exits. This is used by shutdown(8) to prevent users from logging in when the system is about to go down. Immediately after logging a user in, login displays the system copyright notice, the date and time the user last logged in, the message of the day as well as other information. If the file ``.hushlogin'' exists in the user's home directory, all of these messages are suppressed. This is to simplify logins for non-human users, such as uucp(1). Login then records an entry in the wtmp(5) and utmp(5) files and executes the user's command interpreter. Login enters information into the environment (see environ(7)) specifying the user's home directory (HOME), command interpreter (SHELL), search path (PATH), terminal type (TERM) and user name (both LOGNAME and USER). The standard shells, csh(1) and sh(1), do not fork before executing the login utility. FILES
/etc/motd message-of-the-day /etc/nologin disallows logins /var/run/utmp current logins /var/log/lastlog last login account records /var/log/wtmp login account records /var/mail/user system mailboxes .hushlogin makes login quieter SEE ALSO
chpass(1), passwd(1), rlogin(1), getpass(3), utmp(5), environ(7), HISTORY
A login appeared in Version 6 AT&T UNIX. 4th Berkeley Distribution May 5, 1994 4th Berkeley Distribution

Featured Tech Videos