On Fri, 7 Apr 2000, John Paul Tomas wrote:

> humm.. yah!.. but still look at your passwd file maybe there are
> accounts that has been made like a root.. like in my server
> i have a root acct but i still got another account which also
> similar as root..
> e.g
> krypton:x:0:0:Computer Systems Administrator,PATD:/root:/bin/bash
> this account can do similar task like the root...

this is not a good practice. i cultivate the practice of logging in as a
regular non-superuser and resort to using sudo for tasks that i am sure
require superuser privileges and only when necessary. the additional step
necessary to obtain superuser privileges somehow ensures that the person
wielding root power has an idea what he is doing.

for a single user system, that might be okay (i still doubt it's value),
but for multi-user systems and environments, blurring the functions of
superuser and regular user often result in unwanted disasters.

problems that seem to require root privileges are usually permissions
problems. setting up proper groups and permissions so a non-root user can
go about his work without sysadmin intervention is what the sysadmin
should TRY to accomplish. giving root privileges to all and sundry is not
the solution.

just my opinion,

eric
--
eric pareja ([EMAIL PROTECTED]) | check out http://www.Gra.PH
home with a bunch of machines to form a cluster (well, almost)
"Knowledge is inherently precious even if you can't sell it."
   - Dr. Greta Penninger in Bruce Sterling's "Distraction"


-
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

Reply via email to