<< First Page < Previous Page Next Page > Last Page >>
7) How to Operate as Root
Due to the usability of Linux machines remotely, we should try to avoid any situation where there will be security compromise. While on Windows machines, security compromises mean that one can see your files or even delete them, on Linux, like other Unix, hacker can use your machine as a source of attacks on other machines, as a warez ftp server, or for many other nasty things, and without you knowing it.
Many internet attacks sources are hacked machines, as well as "tagged" ftps, warez sites etc. You do not want that to be your machine.
We should be a bit paranoid when dealing with our machine. Make sure that the Root password is not a simple one, make sure your account password is not a simple one either.
Try to avoid logging on as root, but as your user, and then run 'su' for the specific root task you need to do. This way you will also prevent mistakes when changing files (you won't delete your /home by accident for example).