As I have hinted already, it is not good practice to run all programs as root since, if one is compromised by an outside attack, then the whole system is at risk and a misbehaving program can do more damage if it is running as root. It is preferable to create unprivileged user accounts and use them where full root is not necessary.
User names are configured in
/etc/passwd. There is one line per user, with seven fields of information separated by colons:
xto indicate that the password is stored in
For example, this creates users