The Root Password
is Key to Your System Security.
The
root
user is the system administrator and is the only
user authorized to make updates, add users, change the overall system
configuration, and so on. In short, root
can do
everything! That's why you must choose a password which is difficult to
guess: DrakX tells you if the password you
chose is too simple. Depending on the security level you chose, you're
not forced to enter a password, but we strongly
encourage you to do so. Linux is just as
prone to operator error as any other operating system. Since
root
can overcome all limitations and unintentionally
erase all data on partitions by carelessly accessing the partitions
themselves, becoming root
must
be difficult.
Choose the Right
Password.
The password
should be a mixture of alphanumeric characters and its minimum length
will vary according to the chosen security level. Never write down
root
's password — it makes it far too easy to
compromise your system. However, don't make the password too long or too
complicated because you must be able to remember it too!
Enter the Password, Twice. The password won't be displayed on screen as you type it. To reduce the chance of a blind typing error you have to enter the password twice.
Create a User.
You are first asked
for a real name. DrakX uses the first word
you type in this field and copies it, all in lowercase, to the
Login name field, which is the name this user must
enter to log on to the system. Then enter a password, twice (for
confirmation). From a security point of view, a non-privileged (regular)
user's password isn't as crucial as the root
password, but that's no reason to neglect it by making it too simple:
after all, your files could be the ones at
risk.
Linux is a Secure
Multi-User System.
You can add other
users. Refer to Section 18.13, “Checking Miscellaneous
Parameters”. Each user may have
his own preferences, files and so on. But unlike the system
administrator called root
, the user you create at
this point is not authorized to change anything except its own files and
configurations, protecting the system from unintentional or malicious
changes which could have a serious impact.