![]() ![]() So even if you request something by accident, it will be carried out with little or no warning, even if it's bad for the health of your system. The root user can do anything on a system, with almost no exceptions. The latter can be used only if you know root's password and is a good option if your account doesn't have permission to use sudo. ![]() You can also use the commands gksudo or su. The sudo command exists to temporarily give you root-level privileges when you need them to administer the system. There are several commands you can use to elevate your privileges. It even makes sense for mostly single-user machines such as desktops: if other members of your family, for example, somehow manage to run rm -rf / ( do NOT run that), they won't have permission to delete every file on the system, like they would if there were no such thing as privilege separation. Commonly, a web server or other process that exposes a port to other (possibly malicious) computers will run as its own user (Apache runs as the user nobody), so that even if the web server program is hacked, the attacker can't trash the entire machine quite so easily. (Root is a lot like Administrator in Windows.) That privileged user is traditionally called root. Because most users don't need to be able to modify the core system only the system administrator should have that privilege. ![]() UNIX was designed as a multi-user system from the ground up - that is, it was designed so that many people could use one computer running UNIX at once. UNIX-like operating systems (including Linux) use a concept called privilege separation to ensure that the system stays safe. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |