Search results for: 'why can a user log in with SSH if there is a * in shadow file'