basic assumption used to be that of a friendly user-community. These days
many people run some version of the shadow password suite, where
.I /etc/passwd
-has *'s instead of encrypted passwords, and the encrypted passwords are in
+has asterisks (*) instead of encrypted passwords,
+and the encrypted passwords are in
.I /etc/shadow
which is readable by the superuser only.
.PP
Regardless of whether shadow passwords are used, many sysadmins
-use a star in the encrypted password field to make sure
+use an asterisk in the encrypted password field to make sure
that this user can not authenticate him- or herself using a
password. (But see the Notes below.)
.PP
-If you create a new login, first put a star in the password field,
+If you create a new login, first put an asterisk in the password field,
then use
.BR passwd (1)
to set it.
the name of the user on the system. It should not contain capital letters.
.TP
.I password
-the encrypted user password or a star.
+the encrypted user password, an asterisk (*), or the letter 'x'.
+(See
+.BR pwconv (8)
+for an explanation of 'x'.)
.TP
.I UID
the numerical user ID.
user groups, their GIDs must be equal and there must be an entry in
\fI/etc/group\fP, or no group will exist.
.PP
-If the encrypted password is set to a star, the user will be unable
+If the encrypted password is set to an asterisk, the user will be unable
to login using
.BR login (1),
but may still login using