Book Image

Linux Essentials - Second Edition

By : Christine Bresnahan, Richard Blum
Book Image

Linux Essentials - Second Edition

By: Christine Bresnahan, Richard Blum

Overview of this book

Linux Essentials, Second Edition provides a solid foundation of knowledge for anyone considering a career in information technology, for anyone new to the Linux operating system, and for anyone who is preparing to sit for the Linux Essentials Exam. Through this engaging resource, you can access key information in a learning-by-doing style. Hands-on tutorials and end-of-chapter exercises and review questions lead you in both learning and applying new information—information that will help you achieve your goals! With the experience provided in this compelling reference, you can sit down for the Linux Essentials Exam with confidence. An open-source operating system, Linux is a UNIX-based platform that is freely updated by developers. The nature of its development means that Linux is a low-cost and secure alternative to other operating systems, and is used in many different IT environments. Passing the Linux Essentials Exam prepares you to apply your knowledge regarding this operating system within the workforce.
Table of Contents (19 chapters)
17
EULA

Creating New Accounts

In many environments, the task of adding accounts is quite common. Large businesses hire new employees, universities recruit new students, charitable organizations obtain fresh volunteers, and so on. Thus you must know how to create new accounts. Before covering the mechanics of creating accounts, the important issues of deciding how to use groups and selecting a good password are described. How to create accounts using both GUI and text-mode tools are explained afterward.

Deciding on a Group Strategy

As described in Chapter 12, “Understanding Basic Security,” Linux groups are collections of users. You can use groups to control who can access particular files. As will be described in Chapter 14, “Setting Ownership and Permissions,” individuals can change the group affiliations and group permissions of their own files. Thus the way that you use groups can influence your computer’s overall security strategy. Two approaches are common...