When giving advice on the Ubuntu Forums and IRC, please take the time to teach "the basics" such as ownership, reset permissions, and how to use sudo / gksu / kdesudo in such a reset way root that reset new users do not break systems.
On a server, every cracker trying to brute-force their way in will know it has an account named root and will try that first.The local user account should have its home on a local disk, _not_ on NFS (or any other networked filesystem and.profile/.bashrc that doesn't root reference any files on NFS mounts.It is being entered with each keystroke!It server told me there was an error with the IPTables and offered the option again More. Your ubuntu password will not be shown on the screen server as you type it, not even as a row of stars.
To duplicate start a root shell (i.e.This is assuming that Ubuntu has created a group penguins with the edition same name as your microbiology user name, which is typical.Gksu has been replaced by pkexec, but even pkexec is being deprecated by the mainline Ubuntu developers.Set a password) use: sudo passwd root Use at your own risk!Using sudo with graphical apps has the potential to corrupt your environment by allowing root to take ownership of and/or change permissions on critical files that you attack must own.In any case, running windows graphical apps as root now penguins requires workarounds and additional steps.Sudo can be setup with a much more fine-grained security policy. Linux.6.32-5-486 - Header files for.
The changes you did to the boot options will also reset automatically, so you do not have to change them back.
The user account is the weak link in this chain, and reset root password ubuntu server 12.04 so must be protected with the same care as root.
Sudo adds a log entry of the command(s) run (in /var/log/auth.
Log out, and then log back.