Knowledge

Login

Source 📝

286: 388: 63: 160: 332:
to track sessions, when the user logs out, session-only cookies from that site will usually be deleted from the user's computer. In addition, the server invalidates any associations with the session, thereby making any session-handle in the user's cookie store useless.
344:. As a security precaution, one should not rely on implicit means of logging out of a system, especially not on a public computer; instead, one should explicitly log out and wait for confirmation that this request has taken place. 355:
set to activate after some period of inactivity, thereby requiring the user to re-enter their login credentials to unlock the screensaver and gain access to the system.
733: 146: 645: 781: 771: 310:
or clicking on an external link. It can also be done implicitly, such as by the user powering off their workstation, closing a
682: 299:
Once the user is logged in, the login token may be used to track what actions the user has taken while connected to the site.
580: 84: 654: 127: 99: 623: 495:, different technical communities tend to prefer one over another – Unix, Novell, Linux, and Apple typically use 250: 776: 347:
Logging out of a computer, when leaving it, is a common security practice preventing unauthorized users from
106: 348: 73: 296:
Logging in is usually used to enter a specific page, website or application, which trespassers cannot see.
80: 38: 403: 285: 113: 743: 449: 307: 95: 51: 545: 414: 321:
parameter, which specifies where to redirect back after logging in or out. For example, it is
249:
allows a user to use an existing cell phone number, or user credentials from another email or
196: 168: 47: 659: 618: 373: 303: 219: 212: 575: 509:
By contrast, Microsoft's style guides traditionally suggested the opposite and prescribed
337: 318: 192: 387: 560: 550: 410: 200: 188: 765: 555: 472:
connotes the same idea but is based on the analogy of manually signing a log book or
458: 457:
which was historically used to record distance traveled at sea and was recorded in a
341: 695: 399: 246: 120: 31: 500: 352: 329: 314:
window, leaving a website, or not refreshing a website within a defined period.
311: 289: 62: 690: 418: 215: 738: 529: 521: 473: 17: 570: 454: 223: 462: 391: 351:
with it. There are also people who choose to have a password-protected
605: 565: 426: 386: 284: 238: 159: 158: 479:
While there is no agreed difference in meaning between the terms
585: 422: 27:
Process by which an individual gains access to a computer system
453:
of users' access to the system. The term "log" comes from the
242: 234: 56: 719:"Use log on or log on to... Do not use log in, login", 2004, 226:. These credentials themselves are sometimes referred to as 398:
The terms "login" and "logon" became common with the
694:. 30 April 2013. p. 96 & 97. Archived from 505:"Users log in to a file server (not log on to)...". 336:This feature comes in handy if the user is using a 87:. Unsourced material may be challenged and removed. 253:to sign in or create an account on a new website. 163:A screenshot of the English Knowledge login screen 306:takes an action, such as entering an appropriate 30:"Logon" redirects here. Not to be confused with 261:When access is no longer needed, the user can 187:) is the process by which an individual gains 8: 721:Manual of Style for Technical Publications 147:Learn how and when to remove this message 233:. Modern secure systems often require a 597: 292:, a recent banking security application 536:terminology for local authentication. 302:Logging out may be performed when the 723:, 3rd edition, p. 295, Microsoft.com. 626:from the original on 25 December 2019 417:did not generally require them until 7: 85:adding citations to reliable sources 25: 528:to access the Internet, but from 378:passwords (oral or textual input) 328:In the case of websites that use 245:confirmation for extra security. 50:. To log out from Knowledge, use 61: 317:A login page may have a return 72:needs additional citations for 734:"Sign in to or out of Windows" 581:Personal identification number 394:Version 4 console login prompt 340:or a computer that is using a 1: 619:The Linux Information Project 440:and by analogy with the verb 46:To log in to Knowledge, use 532:onward it has moved to the 798: 606:"Detail and definition of 342:public wireless connection 45: 36: 29: 402:systems of the 1960s and 251:social networking service 447:Computer systems keep a 782:Computer access control 772:Authentication methods 404:Bulletin Board Systems 395: 293: 164: 39:Login (disambiguation) 390: 383:History and etymology 370:Fingerprints scanning 359:Methods of Logging In 288: 162: 436:comes from the verb 406:(BBS) in the 1970s. 81:improve this article 37:For other uses, see 701:on 17 February 2015 683:"Apple Style Guide" 655:Oxford Dictionaries 746:on 28 October 2012 662:on 7 February 2014 415:personal computers 396: 294: 290:Finger print login 165: 52:Special:UserLogout 546:Computer security 367:Image recognition 169:computer security 157: 156: 149: 131: 48:Special:UserLogin 16:(Redirected from 789: 756: 755: 753: 751: 742:. Archived from 730: 724: 717: 711: 710: 708: 706: 700: 687: 679: 673: 671: 669: 667: 658:. Archived from 642: 636: 635: 633: 631: 602: 324: 207:User Credentials 152: 145: 141: 138: 132: 130: 89: 65: 57: 21: 797: 796: 792: 791: 790: 788: 787: 786: 777:User interfaces 762: 761: 760: 759: 749: 747: 732: 731: 727: 718: 714: 704: 702: 698: 685: 681: 680: 676: 665: 663: 646:"Definition of 644: 643: 639: 629: 627: 604: 603: 599: 594: 576:Password policy 542: 385: 338:public computer 322: 283: 193:computer system 153: 142: 136: 133: 90: 88: 78: 66: 55: 42: 35: 28: 23: 22: 15: 12: 11: 5: 795: 793: 785: 784: 779: 774: 764: 763: 758: 757: 725: 712: 674: 637: 596: 595: 593: 590: 589: 588: 583: 578: 573: 568: 563: 561:Login spoofing 558: 553: 551:Credential lag 548: 541: 538: 499:, and Apple's 474:visitor's book 429:in the 1990s. 411:home computers 384: 381: 380: 379: 376: 371: 368: 363:They include: 325:on this site. 282: 279: 201:authenticating 195:or program by 155: 154: 69: 67: 60: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 794: 783: 780: 778: 775: 773: 770: 769: 767: 745: 741: 740: 735: 729: 726: 722: 716: 713: 697: 693: 692: 684: 678: 675: 661: 657: 656: 651: 649: 641: 638: 625: 621: 620: 615: 613: 609: 601: 598: 591: 587: 586:/var/log/wtmp 584: 582: 579: 577: 574: 572: 569: 567: 564: 562: 559: 557: 556:Login session 554: 552: 549: 547: 544: 543: 539: 537: 535: 531: 527: 523: 520:In the past, 518: 516: 512: 507: 506: 502: 498: 494: 490: 486: 482: 477: 475: 471: 466: 464: 460: 456: 452: 451: 445: 443: 439: 435: 430: 428: 424: 420: 416: 412: 407: 405: 401: 393: 389: 382: 377: 375: 372: 369: 366: 365: 364: 361: 360: 356: 354: 350: 345: 343: 339: 334: 331: 326: 320: 315: 313: 309: 305: 300: 297: 291: 287: 280: 278: 276: 272: 268: 264: 259: 258: 254: 252: 248: 244: 240: 236: 235:second factor 232: 229: 225: 221: 218:consist of a 217: 214: 209: 208: 204: 202: 198: 194: 190: 186: 182: 178: 174: 170: 161: 151: 148: 140: 137:February 2024 129: 126: 122: 119: 115: 112: 108: 105: 101: 98: –  97: 93: 92:Find sources: 86: 82: 76: 75: 70:This article 68: 64: 59: 58: 53: 49: 44: 40: 33: 19: 748:. Retrieved 744:the original 737: 728: 720: 715: 703:. Retrieved 696:the original 689: 677: 664:. Retrieved 660:the original 653: 647: 640: 628:. Retrieved 617: 611: 607: 600: 533: 525: 519: 514: 510: 508: 504: 496: 492: 488: 484: 480: 478: 469: 467: 448: 446: 441: 437: 433: 431: 408: 400:time sharing 397: 362: 358: 357: 346: 335: 327: 316: 301: 298: 295: 274: 270: 266: 262: 260: 256: 255: 247:Social login 230: 227: 210: 206: 205: 203:themselves. 184: 180: 176: 172: 166: 143: 134: 124: 117: 110: 103: 91: 79:Please help 74:verification 71: 43: 32:Logone River 18:Login prompt 501:style guide 442:to clock in 438:(to) log in 353:screensaver 312:web browser 257:Logging Out 216:credentials 211:Typically, 197:identifying 766:Categories 750:28 October 666:8 February 612:logging in 592:References 459:ship's log 419:Windows NT 237:, such as 185:signing on 181:signing in 177:logging on 173:logging in 107:newspapers 739:Microsoft 630:1 January 530:Windows 8 524:reserved 522:Microsoft 432:The term 349:tampering 323:returnto= 281:Procedure 624:Archived 571:Password 540:See also 455:chip log 374:eye scan 275:sign off 271:sign out 224:password 220:username 534:sign-in 526:sign-in 470:sign in 463:logbook 392:IBM AIX 330:cookies 308:command 267:log off 263:log out 121:scholar 96:"Login" 705:17 May 566:OpenID 511:log on 409:Early 222:and a 189:access 123:  116:  109:  102:  94:  699:(PDF) 691:Apple 686:(PDF) 648:login 608:login 515:logon 503:says 497:login 485:logon 481:login 434:login 427:Linux 239:email 231:login 191:to a 183:, or 128:JSTOR 114:books 752:2012 707:2015 668:2014 632:2014 610:and 513:and 489:sign 487:and 425:and 423:OS/2 413:and 304:user 213:user 199:and 175:(or 100:news 468:To 461:or 450:log 319:URL 273:or 243:SMS 241:or 167:In 83:by 768:: 736:. 688:. 652:. 622:. 616:. 517:. 493:in 483:, 476:. 465:. 444:. 421:, 277:. 269:, 265:, 179:, 171:, 754:. 709:. 672:. 670:. 650:" 634:. 614:" 491:- 228:a 150:) 144:( 139:) 135:( 125:· 118:· 111:· 104:· 77:. 54:. 41:. 34:. 20:)

Index

Login prompt
Logone River
Login (disambiguation)
Special:UserLogin
Special:UserLogout

verification
improve this article
adding citations to reliable sources
"Login"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message

computer security
access
computer system
identifying
authenticating
user
credentials
username
password
second factor
email
SMS
Social login

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.