FOCUS on Sun and Linux: Pluggable Authentication Modules, Part I

by Jeremy Rauch Sept. 1, 2017 via Symantec

For the better part of its existence, Unix, and Unix machines used an authentication mechanism based on the DES algorithm, modified to be utilized as a one way hash. Crypt(3), as it is commonly referred to, has proven satisfactory for most applications.

2flash 1 week, 2 days ago

Clear and well written! This is a good 101 for those working with modules!