See Types of Users.
Becoming root
Running as root/administrator
/etc/sudoers
/etc/passwd
file/etc/skel
/etc/passwd
filelogname:(encrypted-passwd):uid:gid:user info:home:shell
/etc/passwd
must exist, and the full path must be supplied, else login will fail/etc/passwd
/etc/shadow
, not /etc/passwd
/etc/passwd
is readable by everyone/etc/passwd
and /etc/shadow
should be edited using 'vipw' and 'vipw -s', respectively./etc/passwd
or shadow
, preventing multiple root-privileged users from editing those files at the same time, which could potentially cause inconsistencies./etc/passwd
file's gid field./etc/group
filegroup:(group password):gid:members # group passwords are not common
DOg.tenT (mixed upper/lower case) t00l%p0nd (zeros instead of "O") p33l*BOARd (substitute numeric for alpha) tned-Pile (reversed first word)
Disk quotas for user mp3user (uid 503): Filesystem blocks soft hard inodes soft hard /dev/hda3 24 5000 0 7 0 0
Read information on fork bombs and prevention at the following two links:
Apply the fork bomb preventative measures to your Linux systems. Test a fork bomb, but make sure the limits are in place first!