FOCUS on Sun and Linux: Pluggable Authentication Modules, Part I

by Jeremy Rauch
Sept. 17, 2017 1 comment Symantec Detection & Response

For the better part of its existence, Unix, and Unix machines used an authentication mechanism based on the DES algorithm, modified to be utilized as a one way hash. Crypt(3), as it is commonly referred to, has proven satisfactory for most applications.

https://www.symantec.com/connect/articles/focus-sun-and-linux-pluggable-authentication-modules-pa...

Avatar
2flash 7 months, 1 week ago

Clear and well written! This is a good 101 for those working with modules!

Reply