|This article needs additional citations for verification. (November 2012)|
In computer security, a login or logon refers to the credentials required to obtain access to a computer system or other restricted area. Logging in or on and signing in or on is the process by which individual access to a computer system is controlled by identifying and authenticating the user through the credentials presented by the user.
Once a user has logged in, they can then log out or log off when access is no longer needed. To log out is to close off one's access to a computer system after having previously logged in.
Logging in is usually used to enter a specific page, which trespassers cannot see. Once the user is logged in, the login token may be used to track what actions the user has taken while connected to the site. Logging out may be performed explicitly by the user taking some actions, such as entering the appropriate command, or clicking a website link labelled as such. It can also be done implicitly, such as by the user powering off his or her workstation, closing a web browser window, leaving a website, or not refreshing a webpage within a defined period.
Logging out of a computer when leaving it is a common security practice, preventing unauthorized users from tampering with it. There are also people who choose to have a password-protected screensaver set to activate after some period of inactivity, requiring the user to re-enter his or her login credentials to unlock the screensaver and gain access to the system. There can be different methods of logging in that may be via image, fingerprints, eye scan, password (oral or textual input), etc.
The noun login comes from the verb (to) log in, which was formed by analogy with the verb to clock in. The expressions may also have a more literal origin — computer systems tend to keep a record, called a log, of users' access to the system; hence, to log in is to prompt an entry into the system's log by accessing the system. Signing in connotes the same idea, in that providing the credential that authenticates a user's right to entry is akin to a signature.
|Look up login in Wiktionary, the free dictionary.|
|Look up log in in Wiktionary, the free dictionary.|
|Wikimedia Commons has media related to Login screens.|
- Computer security
- Login session
- Login spoofing
- Password policy
- Personal identification number
It was those days when I was in school. I had my summer vacations, the best time of the year when we travel to a new place. This time we were going to visit Pipliya a remote village in Madhya Pradesh for meeting Nanaji. After we reached there my Nanaji planned to take me somewhere early next morning as they had some surprises planned for me. We woke up at 5 in the morning. It was dawn time. The Sun was still below the horizon, birds were chirping as if welcoming the Sun. We have to get to the top of that hill which appears at the other side of the ground, affirmed he. I was gasping for air as the path to the top was not easy and it took all my stamina to even stand still. Come on my boy we have almost made it, exclaimed he. I could see a 60 year old standing at the top and motivating a 14 year young champ to take those remaining steps. That day it was very much clear , why my Nani used to say that people in villages have tremendous stamina and that it was all because they loved nature and were very close to it in all aspects. When I reached top I was completely tired and out of my senses, but suddenly a gust of cool breeze touched my face, blowing my hair. What I saw next was phenomenal, tiny extravagant shades of orange and pink appeared in the sky. Shortly after a fiery ball enhancement started to make it’s way beyond the mountain ranges at a distance. Sky was filled with colours of unexplainable magnificence that had no known name. I felt like I am on top of the world with nature charming me with all its elements. http://www.elle.com/beauty/makeup-skin-care/2010-perfume-guide