Debian GNU/Linux : Guide to Installation and Usage by John Goerzen;Ossama Othman
page 49 of 298 (16%)
page 49 of 298 (16%)
![]() | ![]() |
|
You should normally never give out your root account, unless you are
administering a machine with more than one system administrator. Create an Ordinary User The system will ask you to create an ordinary user account. This account should be your main personal login. You should not use the root account for daily use or as your personal login. Why not? It's a lot harder to do damage to the system as an ordinary user than as root; system files are protected. Another reason is that you might be tricked into running a Trojan horse program - that is, a program that takes advantage of your superuser powers to compromise the security of your system behind your back. Any good book on Unix system administration will cover this topic in more detail. Consider reading one if this topic is new to you. Name the user account anything you like. If your name is John Smith, you might use ``smith,'' ``john,'' ``jsmith,'' or ``js.'' Shadow Password Support Next, the system will ask whether you want to enable shadow passwords. This is an authentication system that makes your Linux system a bit more secure. Therefore, we recommend that you enable shadow passwords. Reconfiguration of the shadow password system can also be done later with the shadowconfig program. Remove PCMCIA |
|