FOCUS on Sun and Linux: Pluggable Authentication Modules, Part I

by Jeremy Rauch
Sept. 17, 2017 1 comment Symantec Detection & Response

For the better part of its existence, Unix, and Unix machines used an authentication mechanism based on the DES algorithm, modified to be utilized as a one way hash. Crypt(3), as it is commonly referred to, has proven satisfactory for most applications.

2flash 7 months, 1 week ago

Clear and well written! This is a good 101 for those working with modules!