Editing 1200: Authorization

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 8: Line 8:
  
 
==Explanation==
 
==Explanation==
βˆ’
Certain computer {{w|Operating system|operating systems}} were initially designed as ''multi-user systems''. As the name suggests, these systems are meant to be used by multiple people or {{w|User (computing)|users}}, sometimes at the same time. To prevent malicious or accidental destructive damage to the system, users are split into two general groups: regular users, and {{w|system administrator}}s (or admins). Regular users can access and use {{w|Application software|programs}} on the computer, but only the admin is allowed to make changes to how the computer runs.  This same split level of security continues to this day, even in privately owned, or "home", computers.
+
Computer {{w|Operating system|operating systems}} were initially designed as ''multi-user systems''. As the name suggests, these systems are meant to be used by multiple people or {{w|User (computing)|users}}, sometimes at the same time. To prevent malicious or accidental destructive damage to the system, users are split into two general groups: regular users, and {{w|system administrator}}s (or admins). Regular users can access and use {{w|Application software|programs}} on the computer, but only the admin is allowed to make changes to how the computer runs.  This same split level of security continues to this day, even in privately owned, or "home", computers.
  
 
The wry remark made here is that in the decades since the most important things on a computer to be worried about are no longer the programs that it runs, but the private personal data it contains and can access (usually online). Anyone who wished to do real mischief on an active computer could do {{w|Identity theft|considerable damage}} without ever caring what the admin password was. The admin password, in effect, now protects something that has become barely, if any, concern.
 
The wry remark made here is that in the decades since the most important things on a computer to be worried about are no longer the programs that it runs, but the private personal data it contains and can access (usually online). Anyone who wished to do real mischief on an active computer could do {{w|Identity theft|considerable damage}} without ever caring what the admin password was. The admin password, in effect, now protects something that has become barely, if any, concern.

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)