Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
You can give a user root privileges by adding him to the sudoers list. The user can switch to the root user by executing the sudo command. Please reply if you have any doubts..
Edit the /etc/sudoers file where you can see the format. Just add the username there and save the file. After that try logging in as root by issuing the command 'sudo su -'. This will prompt for your password, after entering it you will be presented with the root prompt.
It might be necessary to install a package for sudo first, I'm not certain all distros have it by default. Also I'd recommend using the command visudo rather than directly editing the file. Doing it this way will check to make sure you have the write syntax.
One of the most serious mistakes that you can make in a Linux system is to "give someone other than root super powers." That's repeating the old Windows mistake, and it has exactly the same very-harmful consequences.
When you, or anyone at all, logs-in to your system, they should be a non-privileged, ordinary-Joe user. (The same is true in Windows, where they're called "limited users.")
You should designate one account, not normally used, in which to do all non-rootly system maintenance. And you should reserve root strictly for those tasks which demand it.
Here's why...
On any system of any type, you cannot prevent a program from somehow finding its way into your system and being run 'by you.' [All the money you spend on "anti-virus" programs, which try to do precisely that, is (imho) wasted.]
But you can prevent the program from succeeding!
"Nasty programs" require considerable privileges to be able to do their nasty things. On a "typical" Windows system that's easy, because every Joe-user has unlimited powers. But if those same nasty-programs are run by a user with no privileges at all, they don't succeed. They can't.
This is done by very careful design, and it's your best ally.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.