6.5. Shadow Passwords
	In multiuser environments it is very important to use shadow
	passwords (provided by the shadow-utils
	package). Doing so enhances the security of system authentication
	files. For this reason, the Red Hat Linux installation program enables shadow
	passwords by default.
      
	The following is a list of advantages shadow passwords have over the old
	way of storing passwords on UNIX-based systems.
      
Improves system security by moving encrypted password hashes
	    from the world-readable /etc/passwd file to
	    /etc/shadow, which is readable only by the root
	    user.
          
Stores information about password aging.
          
Allows the use the /etc/login.defs file to
	    enforce security policies.
          
	Most utilities provided by the shadow-utils package
	work properly whether or not shadow passwords are enabled. However,
	since password aging information is stored exclusively in the
	/etc/shadow file, any commands which create or
	modify password aging information will not work.
      
	Below is a list of commands which do not work without first enabling
	shadow passwords: