Skip to main content

(*) Logging In

We'll ignore the password-free access that is permitted by the secure shell programs and consider the situation where the system authenticates you by your response to the login and password prompts. Each response should be followed by the [Enter] key.

This is how user romeo gains access to the system: 

SunOS 5.8      (A sun machine running Solaris 8)


login : romeo [Enter]
Password : ********[Enter]     (Password not shown)


Note that the password  is not shown on the screen for security reasons. The appearance of the login prompt signifies that the system for someone to log in and  the previous  user has logged out(i.e., finished her work and disconnected).

The prompt here is preceded by SunOS 5.8, the version of the operating system in Solaris 8, the flavor of UNIX offered by SUN.

Your system could show a different string here(if at all).

If you make a mistake, this is what you could be seeing:

Login incorrect

login :

This simply tells us that either the user-id or password(or both) is incorrect.

When you get both these parameters correct, the system lets you in :

Last  login : Thu  May  8  06:48:39  from  saturn.heavens.com

$ _             (The cursor shown by the _ character)
    



Comments

Popular posts from this blog

(*) Logging In and Out

The good old dumb terminal connected to the computer's serial port was once the only means of connecting to a UNIX system. Later, the TELNET program became popular for connecting in a network.  For security reasons, the TELNET facility could be disabled on your system and the SECURE SHELL( SSH ) could be the only means of connecting to a remote UNIX box. In that case, UNIX and LINUX users can use the SSH command if available. Windows users may use PUTTY or any of the free SSH programs available on the Net. If you are using a workstation or desktop PC running Linux, then you can log in directly.

(*) The system Administrator

On a large system serving hundreds of users, someone has to be given charge of administration of the system.  This person is known as the system administrator . The administrator is responsible for the management of the entire setup. She allocates user accounts, maintains file systems, takes backups,manages disk space and performs several other important functions. She is the person to be contacted in case of a genuine problem. If you own a workstation or PC that runs some flavor of UNIX, then you are probably its administrator . You are then directly responsible for its startup, shutdown and maintenance. If you lose a file, it's your job to get it from a backup. If things don't work properly, you have to try all possible means to set them right before you decide to call a maintenance person. You can use a UNIX machine only after the administrator has opened an account with a user-id and password for your use. These authentication parameters are maintained in two separate files...

(*) The UNIX operating System

There have been many operating systems in the past, one at least from each hardware vendor. They were written in a near-machine language known as ASSEMBLER. The systems were proprietary( relating to an owner or ownership or  (of a product) marketed under and protected by a registered trade name .)  because assembler code developed on one machine wouldn't run on another. Vendors required consumers to purchase expensive proprietary hardware and software if two dissimilar machines needed to talk to each other. Ken Thompson and Dennis Ritchie changed all that forever. They created UNIX . This UNIX operating system marks a strong departure from tradition.It has practically everything an operating system should have, but also introduced a number of concepts previously unknown to the computing community. Beginners with some experience in Windows think of UNIX in terms of it, quite oblivious to the fact that the similarities are only superficial. UNIX is way ahead of othe...