From the course: Linux Hardening
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Account management requirements - Linux Tutorial
From the course: Linux Hardening
Account management requirements
Welcome back to Cybrary's Linux Hardening course. This lesson will cover account management requirements. I'm your instructor, Corey Holzer. Let's begin. This lesson covers two topics. First, we're going to talk about the importance of validating accounts, as well as the means to lock and unlock them from the command line. Second, I will show you the technique for identifying accounts with empty passwords. The root account is often referred to as the superuser. Two important matters regarding the superuser account are as follows. First, it doesn't actually need to have the name root. It is identified as the superuser by its user ID number of zero. Every user account should have a unique number identifier, and no one other than the superuser should have the user ID of zero. In fact, the system uses the ID number versus the username when it distinguishes one user from another. The username is really for our benefit as human users. Now, if someone attempts to change their user ID number…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.