-->
Previous Table of Contents Next


What’s This About “Logging In”?

After you boot the system, Linux waits for a login. A login is simply the name that you supply to Linux to identify yourself to the operating system. Linux keeps track of which names are permitted to log in to the system and allows only valid users to have access. All others are refused access.

Every login name on the system is unique and typically, a password is assigned to each one. This secret password is like the identification number you use with your bank card to prove that you are who you say you are. Also, the things you can do with your login—the login’s privileges—are controlled by Linux; different logins have different levels of privileges. Some logins can do anything they want to the system, while others may not be able to do very much. The system administrator (or whoever creates the login) assigns these privileges.


Warning:  
Usually, login names reflect a person’s real name. On larger systems, login names are usually composed of the first and last names, such as tparker or rmaclean. Smaller systems tend to be less formal, so you may simply have first names or first name and an initial, such as tim, timp, or tjp. Some administrators base login names on something else entirely, such as wizard or goblin, but these tend to have very little meaning to others outside the single machine.

Although you can’t have two identically named logins on your system, you can easily create logins for users with the same (real) name by changing one or two characters. So the login names suej and suek, for example, are treated by Linux as completely separate logins.

Conversely, there is no reason that one person (for instance, you) can’t have two, three, or a dozen login names. In fact, because you will be the system administrator of your Linux system, you will have one or more administrative logins and one or more regular user logins.


At the login prompt, type your name, your dog’s name, or any other random name that occurs to you. None of these are valid logins (at least not yet). The system asks you for a password; it doesn’t matter what you type, so simply press Enter or type a random string of characters. Because the logins are not valid on the system, Linux won’t let you in. It displays the message Login incorrect to tell you that either the name or the password you entered is not valid.

Most likely, the only valid login on your Linux system after installation is the most powerful and dangerous login Linux offers: root. In the section “Creating a New Login” that appears later in this chapter, we will create a safe login for you to use. This safe login can have your name, your dog’s name, or whatever you choose. Some versions of Linux prompt you to create a user login during the installation procedure, so you have two logins (root and a username) that you can use.


Warning:  
Why does Linux bother asking for a password even when the login name is not valid? It’s because Linux uses a program called login that’s instructed to get your login and password first, then check the list of valid users. The login program then displays a message that shows if you are denied access or it lets you through to the next program that starts your user session.

Why You Should Not Use the root Login

You will have to use the root login from time to time. Some things simply cannot be done on the Linux system without logging in as root. You should not, however, use the root login as your regular user login. This is especially true if you are exploring the system, poking around and trying out new commands that may not do what you thought they would. You could cause damage to your operating system installation and have to reinstall from scratch.

Linux, as you already know, is a multiuser, multitasking operating system. Multiuser means that several people can be using Linux at the same time (of course, you have to add some additional terminals to your system, or it will get very crowded around the keyboard). Multitasking means that Linux can do more than one thing at a time. For example, you can spell-check a document while downloading information from a remote system. (Multiuser implies multitasking, because all users must be able to do their own work at the same time.) Linux, therefore, is very good at juggling all of these tasks, keeping them from interfering with one another and providing safeguards so that you cannot damage the system or another user’s work.


Warning:  
The root login does not restrict you in any way. This means that with one simple command, issued either on purpose or by accident, you can destroy your entire Linux installation. For this reason, use the root login only when necessary. Avoid experimenting with commands whenever you log in as root.

When you log in as root, you become the system. The root login is also sometimes called the superuser login and with good reason. To use an analogy, instead of being simply a passenger on an airplane, you suddenly have all the power and responsibility of the flight crew, the mechanics, and the cabin crew. “Hmm, what does this do?” becomes an extremely dangerous phrase when logged in as root.

One of the oldest stories in UNIX lore tells of new users who log in as root and, in ten keystrokes, destroy their system completely and irrevocably. But if you’re careful to follow the steps given here, and stop and take a moment to think about the commands you are giving, none of the “How many new users does it take to nuke a system?” jokes will apply to you!


Note:  
System administrator is another term you will see often. A system administrator is the actual person who sets up and maintains the Linux system. The amount of work involved in system administration varies from system to system. A full-time system administrator may be required in an office that has several powerful machines with many users, peripheral units such as printers and tape drives, and are connected to a network. Your Linux system will most likely not require that level of dedication!

System administration, because it deals with sensitive matters such as creating or deleting logins, requires superuser privileges. These privileges are provided by the root login. So, the system administrator is an actual person wielding superuser powers gained by logging in as root.



Previous Table of Contents Next