O'Reilly logo

LPIC-1/CompTIA Linux+™ Certification All-in-One Exam Guide by Robb Tracy

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Control User Access

A key aspect of both Linux workstation and Linux server security is to implement and use user access controls to constrain what users can do with the system. Earlier in this book, we discussed how to create and manage users, groups, and permissions to do this. However, there are additional measures that you can take to increase the security of your systems. In this part of the chapter, we’ll review the following:

• To root or not to root?

• Implementing a strong password policy

• Configuring user limits

• Disabling user login

• Auditing files

Let’s begin by discussing the proper care and feeding of the root user account.

To root Or Not to root?

As we discussed earlier in this book, every Linux system, whether a workstation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required