Identification and Authentication. Identification and Authentication. When you log on to computer you enter your username and password. The first step is called identification : you announce who you are, the second step is called authentication you prove that you are who claim to be .
1. In UNIX, /etc/passwd is world-readable. The /etc/passwd file is a text file with one record per line, each describing a user account.
khaled10:x:1001:1000:Khaled Abdullah,Riyadh,[email protected]:/home/khaled10:/bin/sh
2. Shadow file /etc/shadow is a system file in which encryption user password are stored.
3. Password Salting: is a way of making password hashing more secure by adding a random string of characters to passwords before their hash is calculated, which makes them harder to reverse.
4. In Windows NT, password file is accessible, but it is written using proprietary binary format (Security by obscurity).
Best state-of-art fingerprint recognition
schemes have an EER of about 1-2%