Steve Smith, host of your TQA Weekly, explains how to attain Root access within the Linux Terminal, the dangers, it's uses, and how to log out of Root.
Episode #2-33 released on May 13, 2012
So you want to be God of the Linux Terminal, and every single time you enter a command in the terminal, you find yourself unable to perform tasks because you do not have the permissions to use it. What is a person to do?
What you are, in fact, missing, is Root access. Root in Linux, is the same as Administrator in Windows and Mac. And accessing Root requires you have full access and one line of command which combined with your password allows you to unlock the terminal, and gives you Root access.
What is this command that allows you God mode, or Root access to the Linux Terminal?
This command has a short form, sudo, for short. And you place this before any command you want to selectively allow root access. Using sudo -i allows you to stay within a Root mode, and allows you complete freedom of access. This is important and dangerous access to have. You can terminate anything, access anything, and even give other applications Root access, so be careful.
Installing programs, updating your distribution, etc.. tasks that require root access and permissions. This is what you'd use this kind of command for. If you want to access private keys of encryption, you'd use this mode. Accessing commands like ftp, whois, finger, etc... commands that do not require root. Anything that does not modify your operating system doesn't warrant full access.
Now, how does one turn this off in the Terminal? Type the following, then click enter.
Next week, we talk about the procedure you should go through in order to get a great new computer, and I explain the different types some business may try to sell to you, and why, or why not they may be good or bad for you. The week after that, I'll dabble in the Voodoo of Linux and wireless networking, and explain a procedure you can use to get yourself a Linux Distribution that works with your Wireless cards, and explain the many issues that affect Wireless connections that have nothing to do with Linux in the first place.
Remember to like, share and subscribe to TQA Weekly. For more information like our show notes, how to join our mailing list, get your own TQA Weekly branded gear and apparel, or for our Android Application, please visit tqaweekly.com. Stay safe and online, have a great day!
Host : Steve Smith | Music : Jonny Lee Hart | Editor : Steve Smith | Producer : Zed Axis Productions
Feel free to ask more questions, comment on the content, share other possible solutions, and suggestions. An account is required, please register, or login to leave your comment. Thank you for your input.
You play Takkar, and are part of a Wenja tribe, you are hunting a Woolly Mammoth baby, and successfully kill it, in order to survive, when a saber-toothed tiger attacks you killing everyone in your tribe, but yourself. Defenseless, you have to build new weapons for yourself using the resources available around you. These first weapons include bow and arrows, spears, and clubs. All of which can be lit on fire. You have to contend with day and night cycles, and survive in the wilderness along side woolly mammoths, dire wolves, cave bears, cave lions, woolly rhinos, irish elk, saber-toothed cats, brown bears, badgers, deer, etc.
Published on April 21st, 2018