Book-bot.com - read famous books online for free

Debian GNU/Linux : Guide to Installation and Usage by John Goerzen;Ossama Othman
page 49 of 298 (16%)
You should normally never give out your root account, unless you are
administering a machine with more than one system administrator.

Create an Ordinary User

The system will ask you to create an ordinary user account. This account
should be your main personal login. You should not use the root account
for daily use or as your personal login.

Why not? It's a lot harder to do damage to the system as an ordinary user
than as root; system files are protected. Another reason is that you might
be tricked into running a Trojan horse program - that is, a program that
takes advantage of your superuser powers to compromise the security of
your system behind your back. Any good book on Unix system administration
will cover this topic in more detail. Consider reading one if this topic
is new to you.

Name the user account anything you like. If your name is John Smith, you
might use ``smith,'' ``john,'' ``jsmith,'' or ``js.''

Shadow Password Support

Next, the system will ask whether you want to enable shadow passwords.
This is an authentication system that makes your Linux system a bit more
secure. Therefore, we recommend that you enable shadow passwords.
Reconfiguration of the shadow password system can also be done later with
the shadowconfig program.

Remove PCMCIA

DigitalOcean Referral Badge