answersLogoWhite

0

That would be "root." THis user can do virtually anything on a Linux system.

Please note, however, that having "maximum permissions" is not actually a good thing. "Ultimate power" may work for comic book villains, it's poor usage on computers. When logged on as root, there's nothing stopping you from annihilating everything on your machine by accident. Linux won't wait for you to be "pretty sure" before happily executing a command.

But by keeping your normal everyday user as a regular user, admittedly likely also in the sudoers file, a command like rm -rfv / can limit the damage to stuff you actually have access to. A lot of people say this is backwards and your personal data is more important... this is true on a personal level, but computer security in most cases is actually NOT about protecting a user's data from its user or intruders, but from keeping the entire system from being compromised through a single user. May seem shortsided from a desktop sense, but for PRODUCTION machines this is absolutely essential.

If you're responsible you'd have yours and all users' data backed up, so that if the unfortunate happens and a user nukes their own home directory you're able to recover it.

To effectively stop user homes from being compromised, it's usually better to mount their individual homes as encrypted file-stored filesystems. Truecrypt is very good for this. If a user isn't logged in, then their home should not be mounted and their home directory file will be very well-encrypted and (If you use hidden volumes.) hidden from intruders who might have your "outer" password.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

How is configuring iptables different from configuring most Linux services?

Iptables for Linux is the equivalent of firewalls for Windows. Iptables require elevated privileges to operate and must be executed by user root. That is the main difference from configuring other Linux services.


How is configuring iptables different from configuring most Linux service?

Iptables for Linux is the equivalent of firewalls for Windows. Iptables require elevated privileges to operate and must be executed by user root. That is the main difference from configuring other Linux services.


How do you access DVD drive in itschool Linux?

I'm not familiar with that Linux distribution. In most distributions, you can access it if it is mounted at /media/dvd or /mnt/dvd. If it is not mounted, you may need root privileges to do so.


What is menning sudo command in Linux?

sudo will run a command with root privileges


Which Inca social enjoyed the most rights privileges and power?

Sapa Inca


Is Mobile Linux Operating System powerful and Why?

Linux is not an power full Operating system XP is the most powerfull operating system


What does the sudo command do in linux?

When u put sudo before a command in terminal the command run with root privileges


What can you do with su besides give yourself root privileges?

SU allows users to use programs with the security privileges of the superuser. This gives the user a huge amount of configurability with windows, mac and linux.


How can you override all other system users without administrator permission?

You can't. The only way to bypass access privileges without having administrative privileges is via bugs in a program already running with administrative permissions. Since most programs aren't (or shouldn't be) run with administrative privileges, you can't rely on 1.) a program to be running with high privileges, and 2.) for it to have unpatched bugs. If such a bug was known, it would become patched fairly quickly (at least in the case of Linux).


What is social power?

The strength of rights and privileges in society


Which Inca social class enjoyed the most rights privileges and power?

Sapa Inca


What are permissions that are allocated with the directories in Linux?

Permissions are allocated based on users and groups, with read, write, and executable privileges being capable of being set.