Help


from Wikipedia
« »  
* Access authorization restricts access to a computer to group of users through the use of authentication systems.
These systems can protect either the whole computer – such as through an interactive login screen – or individual services, such as an FTP server.
There are many methods for identifying and authenticating users, such as passwords, identification cards, and, more recently, smart cards and biometric systems.

1.811 seconds.