Login
   HOME

TheInfoList



OR:

In
computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
, logging in (or logging on, signing in, or signing on) is the process by which an individual gains access to a computer system or program by identifying and authenticating themselves. Typically, user credentials consist of a
username A user is a person who uses a computer or Computer network, network Service (systems architecture), service. A user often has a user account and is identified to the system by a username (or user name). Some software products provide serv ...
and a password. These credentials themselves are sometimes referred to as ''a'' login. Modern secure systems often require a second factor, such as email or SMS confirmation for extra security. Social login allows a user to use an existing cell phone number, or user credentials from another email or social networking service to sign in or create an account on a new website. When access is no longer needed, the user can log out, log off, sign out or sign off.


Procedure

Logging in is usually used to enter a specific page, website, platform or application, which trespassers cannot see. Once the user is logged in, the login token may be used to track what actions the user has taken while connected to the site. Logging out may be performed when the user takes an action, such as entering an appropriate command or clicking on an external link. It can also be done implicitly, such as by the user powering off their workstation, closing a web browser window, leaving a website, or not refreshing a website within a defined period. A login page may have a return URL parameter, which specifies where to redirect back after logging in or out. For example, it is returnto= on this site. In the case of websites that use cookies to track sessions, when the user logs out, session-only cookies from that site will usually be deleted from the user's computer. In addition, the server invalidates any associations with the session, thereby making any session-handle in the user's cookie store useless. This feature comes in handy if the user is using a public computer or a computer that is using a public wireless connection. As a security precaution, one should not rely on implicit means of logging out of a system, especially not on a public computer; instead, one should explicitly log out and wait for confirmation that this request has taken place. Logging out of a computer, when leaving it, is a common security practice preventing unauthorized users from tampering with it. Some people choose to have a password-protected screensaver set to activate after some period of inactivity, thereby requiring the user to re-enter their login credentials to unlock the screensaver and gain access to the system. Methods of Logging In They include: * Image recognition * Fingerprints scanning * eye scan * passwords (oral or textual input)


History and etymology

The terms "login" and "logon" became common with the time sharing systems of the 1960s and Bulletin Board Systems (BBS) in the 1970s. Early home computers and personal computers did not generally require them until Windows NT, OS/2 and
Linux Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
in the 1990s. The term ''login'' comes from the verb ''(to) log in'' and by analogy with the verb ''to clock in''. Computer systems keep a '' log'' of users' access to the system. The term "log" comes from the chip log which was historically used to record distance traveled at sea and was recorded in a ship's log or
logbook A logbook (or log book) is a record used to record states, events, or conditions applicable to complex machines or the personnel who operate them. Logbooks are commonly associated with the operation of aircraft, nuclear plants, particle accelera ...
. To ''sign in'' connotes the same idea but is based on the analogy of manually signing a log book or visitor's book. While there is no agreed difference in meaning between the terms ''login'', ''logon'' and ''sign''-''in'', different technical communities tend to prefer one over another – Unix, Novell, Linux, and Apple typically use ''login'', and Apple's style guide says ''"Users log in to a file server (not log on to)...".'' By contrast, Microsoft's style guides traditionally suggested the opposite and prescribed ''log on'' and ''logon''. In the past,
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
reserved ''sign-in'' to access the Internet,"Use log on or log on to... Do not use log in, login", 2004, ''Manual of Style for Technical Publications'', 3rd edition, p. 295, Microsoft.com. but from Windows 8 onward it has moved to the ''sign-in'' terminology for local authentication.


See also

*
Computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
* Credential lag * Login session * Login spoofing * OpenID * Password * Password policy *
Personal identification number A personal identification number (PIN; sometimes RAS syndrome, redundantly a PIN code or PIN number) is a numeric (sometimes alpha-numeric) passcode used in the process of authenticating a user accessing a system. The PIN has been the key to faci ...
* /var/log/wtmp


References

{{Authority control Authentication methods User interfaces Computer access control