First page
Back
Continue
Last page
Graphics
Other authentication techniques
PAM
Set limits on brute-force attack
Users can only login at specific times at specific places
Kerberos
Developed by the MIT
Can be used in Linux, Windows 2000...