.\" Copyright (c) 1987 The Regents of the University of California. .\" All rights reserved. .\" .\" Redistribution and use in source and binary forms are permitted .\" provided that the above copyright notice and this paragraph are .\" duplicated in all such forms and that any documentation, .\" advertising materials, and other materials related to such .\" distribution and use acknowledge that the software was developed .\" by the University of California, Berkeley. The name of the .\" University may not be used to endorse or promote products derived .\" from this software without specific prior written permission. .\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR .\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED .\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. .\" .\" @(#)lock.1 6.5 (Berkeley) 2/23/89 .\" .TH LOCK 1 "February 23, 1989" .UC .SH NAME lock \- reserve a terminal .SH SYNOPSIS .B lock [ .B -p ] [ .B -t timeout ] .br .SH DESCRIPTION .I Lock requests a password from the user, reads it again for verification and then will normally not relinquish the terminal until the password is repeated. There are two other conditions under which it will terminate: it will timeout after some interval of time and it may be killed by someone with the appropriate permission. The default time limit is 15 minutes, which may be changed with the .I -t option where .I timeout is the time limit in minutes. The .I -p option causes .I lock to use the user's current password instead of requesting another one.