SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
R.D.SIVAKUMAR, M.Sc.,M.Phil.,M.Tech.,
Assistant Professor of Computer Science &
Assistant Professor and Head, Department of M.Com.(CA),
Ayya Nadar Janaki Ammal College,
Sivakasi – 626 124.
Mobile: 099440-42243
e-mail : sivamsccsit@gmail.com
website: www.rdsivakumar.blogspot.in
Logging in/ Logging out of Linux
Logging in/ Logging out of Linux
Linux systems allow many users to work simultaneously. A user normally
works at a user terminal. You have to establish connection to the Linux system,
the system after showing some information; will show Login prompt(prompt is a
helping message), which is the location where you enter your user name. Your
Login name is nothing but user (your) name. You need not be frightened by the
word Login, which simply means user here.
When you connect to the Linux system, you will be asked to enter your Login
name at the Login prompt, you have to enter your Login name and you will be
shown the
Password prompt. You have to enter your password.
To keep your password a secret, the Linux system will not display your
password. The system compares these two items with the system files. If the
match is not found, then you should enter these two items. Ofcourse, if the match
is found you will be shown the following prompt;
[ilamathi@localhost ilamathi] $
Logging in/ Logging out of Linux
[ilamathi@localhost ilamathi] $
Here you assume your login name is ilamathi. You should be careful about the
lower case and upper case letters because the system is case sensitive. The
verification process does not allow any unauthorized person to access any of your
directories or files. Normally, not necessarily, the name of the user is the Login
name.
The Home Directory is assigned to the user when he/she enters into the system
for the first time, by the System Administrator ( SA ). You will learn about SA
later.
Logout Process
Entering exit or logout at the command prompt will end your current Linux
session then the system displays the Login prompt on the screen for other users.
Logging in/ Logging out of Linux
Changing the password
Suppose you have an uneasy feeling that someone knows your password. Then you
have to spend sleepless nights. The Linux operating system has its own method of
solving your problem. It allows you to change your password. A user can change
his/her password with the passwd command. The steps followed by the user, ilamathi,
to change her password are depicted below. The actual prompt is similar to the one
shown here.
Example:
[ilamathi@localhost ilamathi]$ passwd ( the user enters his/her password)
Changing password for ilamathi (current ) password: (User enters the current
password)
New password: (User enters the new passeord)
Retype new password: (User re-enters the new password)
passwd: all authentication tokens updated successfully
[ilamathi@localhost ilamathi]$ _
The passwd command asks for the old password. This command is essential to check
up the authenticity of the user. Again the system demands that the user should make up
his/her mind about the new password. That is why it asks the new password twice.
Logging in/ Logging out of Linux
Example:
[ilamathi@localhost ilamathi]$ passwd
Changing password for ilamathi
( current ) password:(User enters the current password)
New passwd:(User enters the new passeord)
Retype new password: (User misspells the new password)
Sorry, passwords do not match
New password:
If you commit a mistake in typing the current password (that is the password that
you want to change) then you may not be an authenticated user. So, there is a
suspicion that you are trying to change someone else’s password. Therefore you will
not be allowed to change the password. If two entries of the new password do not
match then the system is in a dilemma. The system does not know which is to be
accepted. So, your new password is outrightly rejected. Hence you should be careful
about the old as well as the new passwords.
Logging in/ Logging out of Linux
Some of the rules for changing the password:
The password should not be less than six characters in length.
When changing a password, the new password should differ from the old password
by at least three positions
The password should be different from the user’s Login name.
The new password cannot be the same as the old password. It is ridiculous to
change the password with same password.
Since the SA can execute control over the entire system, SA can change the
password of any user of the Linux system.
Thank you..!!

More Related Content

PPS
Cache memory
PPTX
Register transfer language
PPTX
Basic Computer Organization and Design
PPTX
The Application Layer
PPTX
INTER PROCESS COMMUNICATION (IPC).pptx
PPTX
Common Bus System.pptx
PPTX
Flow control in Computer Network
PPTX
Computer system bus
Cache memory
Register transfer language
Basic Computer Organization and Design
The Application Layer
INTER PROCESS COMMUNICATION (IPC).pptx
Common Bus System.pptx
Flow control in Computer Network
Computer system bus

What's hot (20)

PPTX
Boot process
PPTX
Assembly Language
PPTX
Modes of data transfer
PPTX
Basic Computer Organization and Design
PPT
Addressing modes
PPTX
Input Output Organization
PPTX
Multiprocessor Architecture (Advanced computer architecture)
PPTX
Multiprocessor
PPTX
Code generation
PPTX
Page replacement algorithms
PPTX
Microprogrammed Control Unit
PPTX
Addressing sequencing
PPTX
CLR AND LALR PARSER
PPTX
PPTX
Memory Organization
PPTX
Booth's Multiplication Algorithm.pptx
PPTX
Osi reference model
PPTX
8237 dma controller
PPTX
Interfacing memory with 8086 microprocessor
PPTX
Cache Memory
Boot process
Assembly Language
Modes of data transfer
Basic Computer Organization and Design
Addressing modes
Input Output Organization
Multiprocessor Architecture (Advanced computer architecture)
Multiprocessor
Code generation
Page replacement algorithms
Microprogrammed Control Unit
Addressing sequencing
CLR AND LALR PARSER
Memory Organization
Booth's Multiplication Algorithm.pptx
Osi reference model
8237 dma controller
Interfacing memory with 8086 microprocessor
Cache Memory
Ad

Similar to Logging in and Logging out of Linux - R.D.Sivakumar (20)

PPT
Linux lesson
PDF
UNIX CLASS 2 PPT for reference found in sysyem
PPTX
unix class 2 old scheme vtu syllabus old data
PPT
06 users groups_and_permissions
PPT
02 linux desktop usage
PPT
Linux lecture
PDF
Operating System Lab Manual
PDF
Post Lab activity1
PPTX
Linux+Command+Line+&+Shell+Scripting+Masterclass+-+Final.pptx
PDF
Lesson 1 Linux System Fundamentals
PPTX
Linux basics part 1
PPT
Common linux ubuntu commands overview
PPTX
Linux commands and examples for students
PPTX
User and groups administrator
PPTX
18 LINUX OS.pptx Linux command is basic isma
PDF
Linux introductory-course-day-1
PPTX
User management
DOCX
lec1.docx
PPTX
Linux week 2
PPTX
Linux Fundamentals - An Intro to Linux Fundamentals
Linux lesson
UNIX CLASS 2 PPT for reference found in sysyem
unix class 2 old scheme vtu syllabus old data
06 users groups_and_permissions
02 linux desktop usage
Linux lecture
Operating System Lab Manual
Post Lab activity1
Linux+Command+Line+&+Shell+Scripting+Masterclass+-+Final.pptx
Lesson 1 Linux System Fundamentals
Linux basics part 1
Common linux ubuntu commands overview
Linux commands and examples for students
User and groups administrator
18 LINUX OS.pptx Linux command is basic isma
Linux introductory-course-day-1
User management
lec1.docx
Linux week 2
Linux Fundamentals - An Intro to Linux Fundamentals
Ad

More from Sivakumar R D . (20)

PPTX
Internet Connections and Its Protocols - R D Sivakumar
PPT
Internet - R D Sivakumar.
PPTX
Data Communication - R D Sivakumar
PPTX
NETWORK SERVICES - R D Sivakumar
PPTX
Computer Communications - R D Sivakumar
PPTX
Online Data Protection - R D Sivakumar
PPT
Software Engineering - R.D.Sivakumar
PPT
Different Kinds of Internet Protocols - R.D.Sivakumar
PPT
Internet - R.D.Sivakumar
PPT
Electronic Publishing Tools for E-Learning - R.D.Sivakumar
PPT
E-learning Packages - R.D.Sivakumar
PPT
Digital Communication - R.D.Sivakumar
PPT
Digigogy in Teaching - R.D.Sivakumar
PPT
Cyber Commerce Technology - R.D.Sivakumar
PPT
Video Lesson Creation - R.D.Sivakumar
PPT
Cognitive and Personal Dimensions of Cyber Learning - R.D.Sivakumar
PPT
Innovative Presentation - R.D.Sivakumar
PPT
Open Source in E-Learning - R.D.Sivakumar
PPTX
Tuxpaint - R.D.Sivakumar
PPT
Academic Blog Design - R.D.Sivakumar
Internet Connections and Its Protocols - R D Sivakumar
Internet - R D Sivakumar.
Data Communication - R D Sivakumar
NETWORK SERVICES - R D Sivakumar
Computer Communications - R D Sivakumar
Online Data Protection - R D Sivakumar
Software Engineering - R.D.Sivakumar
Different Kinds of Internet Protocols - R.D.Sivakumar
Internet - R.D.Sivakumar
Electronic Publishing Tools for E-Learning - R.D.Sivakumar
E-learning Packages - R.D.Sivakumar
Digital Communication - R.D.Sivakumar
Digigogy in Teaching - R.D.Sivakumar
Cyber Commerce Technology - R.D.Sivakumar
Video Lesson Creation - R.D.Sivakumar
Cognitive and Personal Dimensions of Cyber Learning - R.D.Sivakumar
Innovative Presentation - R.D.Sivakumar
Open Source in E-Learning - R.D.Sivakumar
Tuxpaint - R.D.Sivakumar
Academic Blog Design - R.D.Sivakumar

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Classroom Observation Tools for Teachers
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
01-Introduction-to-Information-Management.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Trump Administration's workforce development strategy
PPTX
master seminar digital applications in india
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Final Presentation General Medicine 03-08-2024.pptx
VCE English Exam - Section C Student Revision Booklet
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
O7-L3 Supply Chain Operations - ICLT Program
2.FourierTransform-ShortQuestionswithAnswers.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Computing-Curriculum for Schools in Ghana
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Complications of Minimal Access Surgery at WLH
Weekly quiz Compilation Jan -July 25.pdf
Classroom Observation Tools for Teachers
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cell Types and Its function , kingdom of life
01-Introduction-to-Information-Management.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
RMMM.pdf make it easy to upload and study
Trump Administration's workforce development strategy
master seminar digital applications in india

Logging in and Logging out of Linux - R.D.Sivakumar

  • 1. R.D.SIVAKUMAR, M.Sc.,M.Phil.,M.Tech., Assistant Professor of Computer Science & Assistant Professor and Head, Department of M.Com.(CA), Ayya Nadar Janaki Ammal College, Sivakasi – 626 124. Mobile: 099440-42243 e-mail : sivamsccsit@gmail.com website: www.rdsivakumar.blogspot.in Logging in/ Logging out of Linux
  • 2. Logging in/ Logging out of Linux Linux systems allow many users to work simultaneously. A user normally works at a user terminal. You have to establish connection to the Linux system, the system after showing some information; will show Login prompt(prompt is a helping message), which is the location where you enter your user name. Your Login name is nothing but user (your) name. You need not be frightened by the word Login, which simply means user here. When you connect to the Linux system, you will be asked to enter your Login name at the Login prompt, you have to enter your Login name and you will be shown the Password prompt. You have to enter your password. To keep your password a secret, the Linux system will not display your password. The system compares these two items with the system files. If the match is not found, then you should enter these two items. Ofcourse, if the match is found you will be shown the following prompt; [ilamathi@localhost ilamathi] $
  • 3. Logging in/ Logging out of Linux [ilamathi@localhost ilamathi] $ Here you assume your login name is ilamathi. You should be careful about the lower case and upper case letters because the system is case sensitive. The verification process does not allow any unauthorized person to access any of your directories or files. Normally, not necessarily, the name of the user is the Login name. The Home Directory is assigned to the user when he/she enters into the system for the first time, by the System Administrator ( SA ). You will learn about SA later. Logout Process Entering exit or logout at the command prompt will end your current Linux session then the system displays the Login prompt on the screen for other users.
  • 4. Logging in/ Logging out of Linux Changing the password Suppose you have an uneasy feeling that someone knows your password. Then you have to spend sleepless nights. The Linux operating system has its own method of solving your problem. It allows you to change your password. A user can change his/her password with the passwd command. The steps followed by the user, ilamathi, to change her password are depicted below. The actual prompt is similar to the one shown here. Example: [ilamathi@localhost ilamathi]$ passwd ( the user enters his/her password) Changing password for ilamathi (current ) password: (User enters the current password) New password: (User enters the new passeord) Retype new password: (User re-enters the new password) passwd: all authentication tokens updated successfully [ilamathi@localhost ilamathi]$ _ The passwd command asks for the old password. This command is essential to check up the authenticity of the user. Again the system demands that the user should make up his/her mind about the new password. That is why it asks the new password twice.
  • 5. Logging in/ Logging out of Linux Example: [ilamathi@localhost ilamathi]$ passwd Changing password for ilamathi ( current ) password:(User enters the current password) New passwd:(User enters the new passeord) Retype new password: (User misspells the new password) Sorry, passwords do not match New password: If you commit a mistake in typing the current password (that is the password that you want to change) then you may not be an authenticated user. So, there is a suspicion that you are trying to change someone else’s password. Therefore you will not be allowed to change the password. If two entries of the new password do not match then the system is in a dilemma. The system does not know which is to be accepted. So, your new password is outrightly rejected. Hence you should be careful about the old as well as the new passwords.
  • 6. Logging in/ Logging out of Linux Some of the rules for changing the password: The password should not be less than six characters in length. When changing a password, the new password should differ from the old password by at least three positions The password should be different from the user’s Login name. The new password cannot be the same as the old password. It is ridiculous to change the password with same password. Since the SA can execute control over the entire system, SA can change the password of any user of the Linux system.