Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Debian has gotten easier now from the time I started. People tend to avoid booting the installer in "Expert Mode" which just makes the install so much easier. Also they don't know that they have to comment out the Cdrom in /etc/apt/sources.list for it to work properly.
Right now I wiosh that I had an EFI machine to play with.
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680
Rep:
Quote:
Originally Posted by EDDY1
Debian has gotten easier now from the time I started. People tend to avoid booting the installer in "Expert Mode" which just makes the install so much easier. Also they don't know that they have to comment out the Cdrom in /etc/apt/sources.list for it to work properly.
Right now I wiosh that I had an EFI machine to play with.
Very true and you are right about "expert mode" which, in actual fact, makes it easier for non-experts to use things like non-free drivers and CODECs.
As an aside I have a cheap, flimsy EUFI laptop currently undergoing warranty repair but the only way I could seem to get it to boot the installer (from USB, it has no optical drive) was to switch it back to BIOS emulation. I will play further when it is returned to me. Would love to try in VirtualBox but I get the feeling its EUFI might not be complete?
Distribution: Mepis and Fedora, also Mandrake and SuSE PC-BSD Mint Solaris 11 express
Posts: 385
Rep:
Debian works, but for newbies I would recommend a more user friendly distro with all the codecs if possible. Linux mint has a variation that runs on pure debian with all the commands available in the terminal for those who desire them + the usability that Mint is famous for.
Very true and you are right about "expert mode" which, in actual fact, makes it easier for non-experts to use things like non-free drivers and CODECs.
As an aside I have a cheap, flimsy EUFI laptop currently undergoing warranty repair but the only way I could seem to get it to boot the installer (from USB, it has no optical drive) was to switch it back to BIOS emulation. I will play further when it is returned to me. Would love to try in VirtualBox but I get the feeling its EUFI might not be complete?
Some of the different modes aren't available when you use unetbootin, but, they are if you use dd to put the iso on usb. Another of the features not availble is graphical mode, which is similar to safe-graphics.
Puppy is easy. It's lightweight, quick to load, and because the OS is loaded into RAM, works faster than most. It works well as a single machine, single-user model, so you can do what you like without wondering whether you should be putting sudo in front of every command. Arguably there's some security risk to "running as root" the whole time, but there are a pretty convincing arguments as to why that's actually not THAT big a risk in real life. Best of all, if you make a live CD or flash-drive installation, if it doesn't work, you'll only have wasted five minutes, because it's that quick and easy to set up. Try it.
If you *like* tinkering with different account settings, configurations and user privileges, leave it alone!
This is realy up to you. I run Linux on machines that used to run XP. My current choice is Xubuntu, the version of unbuntu with the XFCE desktop. i have also run various versions of Puppy Linux. In any case, at the top of this forum is a thread entitled "50 alternitives to Windows". It's worth a read.
BTW I hope I didn't imply that using su and sudo was a job best left to the experts... of course it's not hard. It's just a bit unnecessary in a single-machine, single-user setup. I think that has appeal for a newbie.
By the way, "useradd" *isn't* recommended by Puppy. In Puppy it's "adduser". The commands may be interchangeable in other distros?
Well, the jury is still out on that one... for those that are worried, by all means put your trust in an OS that offers sudo, which instantly promotes a casual user to root privileges without needing root password!
Well, the jury is still out on that one... for those that are worried, by all means put your trust in an OS that offers sudo, which instantly promotes a casual user to root privileges without needing root password!
Juries are not out! If a user needs to make system changes then root access is necessary either via 'su -' or 'sudo'. If you wish to make a system change in the GUI or Desktop the user will need to provide the 'root' password for most interactions for system changes. A user will be provided 'sudo' access via setup of;
Code:
## sudoers file.
##
## This file MUST be edited with the 'visudo' command as root.
## Failure to use 'visudo' may result in syntax or file permission errors
## that prevent sudo from running.
##
## See the sudoers man page for the details on how to write a sudoers file.
##
##
## Host alias specification
##
## Groups of machines. These may include host names (optionally with wildcards),
## IP addresses, network numbers or netgroups.
# Host_Alias WEBSERVERS = www1, www2, www3
##
## User alias specification
##
## Groups of users. These may consist of user names, uids, Unix groups,
## or netgroups.
# User_Alias ADMINS = millert, dowdy, mikef
##
## Cmnd alias specification
##
## Groups of commands. Often used to group related commands together.
# Cmnd_Alias PROCESSES = /usr/bin/nice, /bin/kill, /usr/bin/renice, \
# /usr/bin/pkill, /usr/bin/top
##
## Defaults specification
##
## You may wish to keep some of the following environment variables
## when running commands via sudo.
##
## Locale settings
# Defaults env_keep += "LANG LANGUAGE LINGUAS LC_* _XKB_CHARSET"
##
## Run X applications through sudo; HOME is used to find the
## .Xauthority file. Note that other programs use HOME to find
## configuration files and this may lead to privilege escalation!
# Defaults env_keep += "HOME"
##
## X11 resource path settings
# Defaults env_keep += "XAPPLRESDIR XFILESEARCHPATH XUSERFILESEARCHPATH"
'man sudoer';
Quote:
Name sudoers - list of which users may execute what
Description
The sudoers file is composed of two types of entries: aliases (basically variables) and user specifications (which specify who may run what). The grammar of sudoers will be described below in Extended Backus-Naur Form (EBNF). Don't despair if you don't know what EBNF is; it is fairly simple, and the definitions below are annotated.
DESCRIPTION
sudo allows a permitted user to execute a command as the superuser or
another user, as specified in the sudoers file. The real and effective
uid and gid are set to match those of the target user as specified in
the passwd file and the group vector is initialized based on the group
file (unless the -P option was specified). If the invoking user is
root or if the target user is the same as the invoking user, no
password is required. Otherwise, sudo requires that users authenticate
themselves with a password by default (NOTE: in the default
configuration this is the user's password, not the root password).
Once a user has been authenticated, a timestamp is updated and the user
may then use sudo without a password for a short period of time (15
minutes unless overridden in sudoers).
This seems to have gone WAY off topic, as far as the thread initiation is concerned, but as long as nobody minds too much...
Sorry, I didn't mean that the jury was out as to how tight the su/sudo structure was, I meant that the jury was out as to how essential this "privilege" structure is to secure an internet-connected machine, and that the amount of protection offered appears to be questionable. Please don't get me wrong, I claim no expertise whatsoever on the subject, but a web-search on the question of "how unsafe is it to run as root?", suggests that there is a wide spectrum of views on the subject. That's all I was indicating by the "jury is out" phrase. Since there does seem to be a wide variety of views out there, I actually have to make a personal choice about who to believe.
For instance, I find the arguments in the following pages pretty persuasive; it may well be that you can pick *all sorts of holes* in the reasoning behind these articles... but that discussion would occupy a much more substantial thread, and I suspect that's a thread that has been spun, and spun handsomely, in hundreds of other forums. I am *REALLY* not qualified to argue the finer points!
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.