On any system someone must be able to kill any runaway program, purge corrupted files, reset passwords when users forget them, remove users' permission to use the system, and a myriad of other system management tasks.
On UNIX this special user is known as superuser or root (not to be confused with the root directory). Superuser can override file security and do almost anything he/she wants on the system (he/she cannot see your password, since it is encrypted, but he/she can change it). In fact, any user with a useridof 0 is a superuser. Naturally, such users should always have a password.It is not good practice for the system administrator to always logon as superuser. It is too easy to make a trivial mistake and damage the system, perhaps by rm * in an important directory. Instead, logon as a regular user, then switch to superuser with the su command when you need it.
Use the 'chmod' command to change permissions on any file. Note: you have to be the owner (or the superuser) to do this.
Unix has the following categories of users: Superuser - root account, can do anything on the system ordinary user - has no special privileges restricted user - is restricted in what they can do in the shell and programs they can run.
There is no root account in Windows XP. Nor is there an account that is a "superuser" account in the traditional sense.
The userid of the superuser is always 0. See the `id` command: `id -u root` yields 0.
The su command is used to assume the permissions of another user. Without any parameters, it is used to assume the superuser, or root, account. When followed by the name of a user account, it will allow you to use that user's account and permissions.
There is a command called useradd in Linux which you can use to add a new user. Here's an example 1. Add the user (you need to be a superuser to run this command) # useradd test 2. Set the password # passwd test Changing password for user test. New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully.
I assume you are asking about the superuser account - which is the administrator account of root.
no go die
I presume you mean writing shell scripts that operate under the super user account - scripts are written for any reason to help automate tasks and make them much less error prone than issuing commands as a user. Running as the superuser merely means that the commands in the shell script require superuser priviledge to execute.
You can't "access" the superuser password. In addition to being stored in a file only readable by the superuser, its also encrypted in a one-way hash. This means that it is not stored in plaintext, and the computer checks to see if the password is correct by encrypting the supplied password and seeing if the hash matches, not just comparing the passwords sirectly.
The Linux superuser is called "root." There is very little root cannot do. This is why it is a Very Bad Idea to do anything as root unless absolutely necessary. Use sudo instead with commands that need it.
In UNIX, this is the "sticky bit"... if set on a directory, only the owner of the directory, the owner of the individual file, and the superuser are allowed to delete files created in that directory. If not set, anyone with write permission on the directory can delete or rename files in it.