Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Is there anything natively dangerous about being logged into root besides your cat stepping on the keyboard? What I've been doing is keeping root logged into TTY2 (ctrl-alt-2) for when I need it, and I've wondered if there's a risk that just that might compromise my newbish system.
Is there anything natively dangerous about being logged into root besides your cat stepping on the keyboard? What I've been doing is keeping root logged into TTY2 (ctrl-alt-2) for when I need it, and I've wondered if there's a risk that just that might compromise my newbish system.
well, besides the cat thing, if there's someone else around they could do a ctrl-alt-2 and have root... but if you're the only one who uses your computer then it's not that big of a deal... the big problem is when you _use_ your computer as root for non-administrative tasks - having root logged-into a TTY is IMHO (physical access issues aside) no more dangerous than having some programs running with root privilages on your system (X.org, Cron, Sshd, etc.) - which is something normal on almost any linux desktop...
Oh, good, then I don't have anything to worry about. Right now I'm using it to control my wireless, which I have to mess with alot because the neighbor I'm borrowing it from is 500 ft away, and I have to reconnect often, and to mount or unmount the CD drive.
Oh, good, then I don't have anything to worry about. Right now I'm using it to control my wireless, which I have to mess with alot because the neighbor I'm borrowing it from is 500 ft away, and I have to reconnect often, and to mount or unmount the CD drive.
You don't need root to mount/umount the cdrom drive.
Just add "users" option to the cdrom line /etc/fstab.
Perhaps you should tell your neighbor to look into wpa2 encryption to make sure that only the two of you have access to his connection. He might be concerned about someone borrowing his internet connection in the same way you are concerned about someone borrowing your linux box as root...
you know, for good karma and all that...
He's got this idea stuck in his head that WEP is safer than WPA, even though I showed him the whole FBI thing. One of those big 'administrators' that don't administer much anything besides their home computer.
I just use dialup for secure stuff and the wireless for faster stuff. Honestly, I feel strangely more comfortable with someone on the other side of the world getting my private information than any kids around here with Airopeek and too much free time...
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.