Adduser,
Login.conf,
Login,
Makefile.yp,
Netid,
Getpwent,
Chpass,
Yp,
Pwd_mkdb,
Vipw,
Crypt,
Netgroup,
Passwd PASSWD(5) - File Formats Manual # PASSWD(5) - File Formats Manual
NAME # passwd, master.passwd - format of the password file
DESCRIPTION # The master.passwd file, readable only by root, consists of newline-separated records, one per user, containing ten colon separated fields. These fields are as follows:
name
User’s login name.
password
User’s encrypted password.
uid
User’s login user ID.
gid
User’s login group ID.
class
User’s general classification (see login.
...
SHELLS(5) - File Formats Manual # SHELLS(5) - File Formats Manual
NAME # shells - shell database
DESCRIPTION # The shells file contains a list of valid shells available on the system. A shell is a command line interpreter that reads user input and executes commands. For each shell a single line should be present, consisting of the shell’s path, relative to root.
A hash mark (’#’) indicates the beginning of a comment; subsequent characters up to the end of the line are not interpreted by the routines which search the file.
...
SHUTDOWN(8) - System Manager’s Manual # SHUTDOWN(8) - System Manager’s Manual
NAME # shutdown - close down the system at a given time
SYNOPSIS # shutdown [-] [-dfhknpr] time [warning-message …]
DESCRIPTION # shutdown provides an automated shutdown procedure for superusers to nicely notify users when the system is shutting down, saving them from system administrators, hackers, and gurus, who would otherwise not bother with such niceties. When the shutdown command is issued without options, the system is placed in single user mode at the indicated time after shutting down all system services.
...
SKEY(1) - General Commands Manual # SKEY(1) - General Commands Manual
NAME # skey, otp-md5, otp-rmd160, otp-sha1 - respond to an OTP challenge
SYNOPSIS # skey [-x] [-md5 | -rmd160 | -sha1] [-n count] [-p passphrase] <sequence#> [/] key
DESCRIPTION # S/Key is a procedure for using one-time passwords to authenticate access to computer systems. It uses 64 bits of information transformed by the MD5, RIPEMD-160, or SHA1 algorithms. The user supplies the 64 bits in the form of 6 English words that are generated by a secure computer.
...
SU(1) - General Commands Manual # SU(1) - General Commands Manual
NAME # su - substitute user identity
SYNOPSIS # su [-fKLlm] [-a auth-type] [-c login-class] [-s login-shell] [login [shell-argument …]]
DESCRIPTION # The su utility allows a user to run a shell with the user and group ID of another user without having to log out and in as that other user. All of the real, effective, and saved user and group IDs as well as all supplementary group IDs are always set according to the target user.
...
TTYS(5) - File Formats Manual # TTYS(5) - File Formats Manual
NAME # ttys - terminal initialization information
DESCRIPTION # The ttys file contains information that is used by various routines to initialize and control the use of terminal special files. This information is read with the getttyent(3) library routines.
There is one line in the ttys file per special device file. Fields are separated by tabs and/or spaces. Fields comprised of more than one word should be enclosed in double quotes (’"’).
...
UTMP(5) - File Formats Manual # UTMP(5) - File Formats Manual
NAME # utmp, wtmp, lastlog - login records
SYNOPSIS # #include <utmp.h>
DESCRIPTION # The <utmp.h> file declares the structures used to record information about current users in the utmp file, logins and logouts in the wtmp file, and last logins in the lastlog file. The timestamps of date changes, shutdowns, and reboots are also logged in the wtmp file.
...