286:
388:
63:
160:
332:
to track sessions, when the user logs out, session-only cookies from that site will usually be deleted from the user's computer. In addition, the server invalidates any associations with the session, thereby making any session-handle in the user's cookie store useless.
344:. As a security precaution, one should not rely on implicit means of logging out of a system, especially not on a public computer; instead, one should explicitly log out and wait for confirmation that this request has taken place.
355:
set to activate after some period of inactivity, thereby requiring the user to re-enter their login credentials to unlock the screensaver and gain access to the system.
733:
146:
645:
781:
771:
310:
or clicking on an external link. It can also be done implicitly, such as by the user powering off their workstation, closing a
682:
299:
Once the user is logged in, the login token may be used to track what actions the user has taken while connected to the site.
580:
84:
654:
127:
99:
623:
495:, different technical communities tend to prefer one over another – Unix, Novell, Linux, and Apple typically use
250:
776:
347:
Logging out of a computer, when leaving it, is a common security practice preventing unauthorized users from
106:
348:
73:
296:
Logging in is usually used to enter a specific page, website or application, which trespassers cannot see.
80:
38:
403:
285:
113:
743:
449:
307:
95:
51:
545:
414:
321:
parameter, which specifies where to redirect back after logging in or out. For example, it is
249:
allows a user to use an existing cell phone number, or user credentials from another email or
196:
168:
47:
659:
618:
373:
303:
219:
212:
575:
509:
By contrast, Microsoft's style guides traditionally suggested the opposite and prescribed
337:
318:
192:
387:
560:
550:
410:
200:
188:
765:
555:
472:
connotes the same idea but is based on the analogy of manually signing a log book or
458:
457:
which was historically used to record distance traveled at sea and was recorded in a
341:
695:
399:
246:
120:
31:
500:
352:
329:
314:
window, leaving a website, or not refreshing a website within a defined period.
311:
289:
62:
690:
418:
215:
738:
529:
521:
473:
17:
570:
454:
223:
462:
391:
351:
with it. There are also people who choose to have a password-protected
605:
565:
426:
386:
284:
238:
159:
158:
479:
While there is no agreed difference in meaning between the terms
585:
422:
27:
Process by which an individual gains access to a computer system
453:
of users' access to the system. The term "log" comes from the
242:
234:
56:
719:"Use log on or log on to... Do not use log in, login", 2004,
226:. These credentials themselves are sometimes referred to as
398:
The terms "login" and "logon" became common with the
694:. 30 April 2013. p. 96 & 97. Archived from
505:"Users log in to a file server (not log on to)...".
336:This feature comes in handy if the user is using a
87:. Unsourced material may be challenged and removed.
253:to sign in or create an account on a new website.
163:A screenshot of the English Knowledge login screen
306:takes an action, such as entering an appropriate
30:"Logon" redirects here. Not to be confused with
261:When access is no longer needed, the user can
187:) is the process by which an individual gains
8:
721:Manual of Style for Technical Publications
147:Learn how and when to remove this message
233:. Modern secure systems often require a
597:
292:, a recent banking security application
536:terminology for local authentication.
302:Logging out may be performed when the
723:, 3rd edition, p. 295, Microsoft.com.
626:from the original on 25 December 2019
417:did not generally require them until
7:
85:adding citations to reliable sources
25:
528:to access the Internet, but from
378:passwords (oral or textual input)
328:In the case of websites that use
245:confirmation for extra security.
50:. To log out from Knowledge, use
61:
317:A login page may have a return
72:needs additional citations for
734:"Sign in to or out of Windows"
581:Personal identification number
394:Version 4 console login prompt
340:or a computer that is using a
1:
619:The Linux Information Project
440:and by analogy with the verb
46:To log in to Knowledge, use
532:onward it has moved to the
798:
606:"Detail and definition of
342:public wireless connection
45:
36:
29:
402:systems of the 1960s and
251:social networking service
447:Computer systems keep a
782:Computer access control
772:Authentication methods
404:Bulletin Board Systems
395:
293:
164:
39:Login (disambiguation)
390:
383:History and etymology
370:Fingerprints scanning
359:Methods of Logging In
288:
162:
436:comes from the verb
406:(BBS) in the 1970s.
81:improve this article
37:For other uses, see
701:on 17 February 2015
683:"Apple Style Guide"
655:Oxford Dictionaries
746:on 28 October 2012
662:on 7 February 2014
415:personal computers
396:
294:
290:Finger print login
165:
52:Special:UserLogout
546:Computer security
367:Image recognition
169:computer security
157:
156:
149:
131:
48:Special:UserLogin
16:(Redirected from
789:
756:
755:
753:
751:
742:. Archived from
730:
724:
717:
711:
710:
708:
706:
700:
687:
679:
673:
671:
669:
667:
658:. Archived from
642:
636:
635:
633:
631:
602:
324:
207:User Credentials
152:
145:
141:
138:
132:
130:
89:
65:
57:
21:
797:
796:
792:
791:
790:
788:
787:
786:
777:User interfaces
762:
761:
760:
759:
749:
747:
732:
731:
727:
718:
714:
704:
702:
698:
685:
681:
680:
676:
665:
663:
646:"Definition of
644:
643:
639:
629:
627:
604:
603:
599:
594:
576:Password policy
542:
385:
338:public computer
322:
283:
193:computer system
153:
142:
136:
133:
90:
88:
78:
66:
55:
42:
35:
28:
23:
22:
15:
12:
11:
5:
795:
793:
785:
784:
779:
774:
764:
763:
758:
757:
725:
712:
674:
637:
596:
595:
593:
590:
589:
588:
583:
578:
573:
568:
563:
561:Login spoofing
558:
553:
551:Credential lag
548:
541:
538:
499:, and Apple's
474:visitor's book
429:in the 1990s.
411:home computers
384:
381:
380:
379:
376:
371:
368:
363:They include:
325:on this site.
282:
279:
201:authenticating
195:or program by
155:
154:
69:
67:
60:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
794:
783:
780:
778:
775:
773:
770:
769:
767:
745:
741:
740:
735:
729:
726:
722:
716:
713:
697:
693:
692:
684:
678:
675:
661:
657:
656:
651:
649:
641:
638:
625:
621:
620:
615:
613:
609:
601:
598:
591:
587:
586:/var/log/wtmp
584:
582:
579:
577:
574:
572:
569:
567:
564:
562:
559:
557:
556:Login session
554:
552:
549:
547:
544:
543:
539:
537:
535:
531:
527:
523:
520:In the past,
518:
516:
512:
507:
506:
502:
498:
494:
490:
486:
482:
477:
475:
471:
466:
464:
460:
456:
452:
451:
445:
443:
439:
435:
430:
428:
424:
420:
416:
412:
407:
405:
401:
393:
389:
382:
377:
375:
372:
369:
366:
365:
364:
361:
360:
356:
354:
350:
345:
343:
339:
334:
331:
326:
320:
315:
313:
309:
305:
300:
297:
291:
287:
280:
278:
276:
272:
268:
264:
259:
258:
254:
252:
248:
244:
240:
236:
235:second factor
232:
229:
225:
221:
218:consist of a
217:
214:
209:
208:
204:
202:
198:
194:
190:
186:
182:
178:
174:
170:
161:
151:
148:
140:
137:February 2024
129:
126:
122:
119:
115:
112:
108:
105:
101:
98: –
97:
93:
92:Find sources:
86:
82:
76:
75:
70:This article
68:
64:
59:
58:
53:
49:
44:
40:
33:
19:
748:. Retrieved
744:the original
737:
728:
720:
715:
703:. Retrieved
696:the original
689:
677:
664:. Retrieved
660:the original
653:
647:
640:
628:. Retrieved
617:
611:
607:
600:
533:
525:
519:
514:
510:
508:
504:
496:
492:
488:
484:
480:
478:
469:
467:
448:
446:
441:
437:
433:
431:
408:
400:time sharing
397:
362:
358:
357:
346:
335:
327:
316:
301:
298:
295:
274:
270:
266:
262:
260:
256:
255:
247:Social login
230:
227:
210:
206:
205:
203:themselves.
184:
180:
176:
172:
166:
143:
134:
124:
117:
110:
103:
91:
79:Please help
74:verification
71:
43:
32:Logone River
18:Login prompt
501:style guide
442:to clock in
438:(to) log in
353:screensaver
312:web browser
257:Logging Out
216:credentials
211:Typically,
197:identifying
766:Categories
750:28 October
666:8 February
612:logging in
592:References
459:ship's log
419:Windows NT
237:, such as
185:signing on
181:signing in
177:logging on
173:logging in
107:newspapers
739:Microsoft
630:1 January
530:Windows 8
524:reserved
522:Microsoft
432:The term
349:tampering
323:returnto=
281:Procedure
624:Archived
571:Password
540:See also
455:chip log
374:eye scan
275:sign off
271:sign out
224:password
220:username
534:sign-in
526:sign-in
470:sign in
463:logbook
392:IBM AIX
330:cookies
308:command
267:log off
263:log out
121:scholar
96:"Login"
705:17 May
566:OpenID
511:log on
409:Early
222:and a
189:access
123:
116:
109:
102:
94:
699:(PDF)
691:Apple
686:(PDF)
648:login
608:login
515:logon
503:says
497:login
485:logon
481:login
434:login
427:Linux
239:email
231:login
191:to a
183:, or
128:JSTOR
114:books
752:2012
707:2015
668:2014
632:2014
610:and
513:and
489:sign
487:and
425:and
423:OS/2
413:and
304:user
213:user
199:and
175:(or
100:news
468:To
461:or
450:log
319:URL
273:or
243:SMS
241:or
167:In
83:by
768::
736:.
688:.
652:.
622:.
616:.
517:.
493:in
483:,
476:.
465:.
444:.
421:,
277:.
269:,
265:,
179:,
171:,
754:.
709:.
672:.
670:.
650:"
634:.
614:"
491:-
228:a
150:)
144:(
139:)
135:(
125:·
118:·
111:·
104:·
77:.
54:.
41:.
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.