From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Account management requirements

Account management requirements - Linux Tutorial

From the course: Linux Hardening

Account management requirements

Welcome back to Cybrary's Linux Hardening course. This lesson will cover account management requirements. I'm your instructor, Corey Holzer. Let's begin. This lesson covers two topics. First, we're going to talk about the importance of validating accounts, as well as the means to lock and unlock them from the command line. Second, I will show you the technique for identifying accounts with empty passwords. The root account is often referred to as the superuser. Two important matters regarding the superuser account are as follows. First, it doesn't actually need to have the name root. It is identified as the superuser by its user ID number of zero. Every user account should have a unique number identifier, and no one other than the superuser should have the user ID of zero. In fact, the system uses the ID number versus the username when it distinguishes one user from another. The username is really for our benefit as human users. Now, if someone attempts to change their user ID number…

Contents