Devdas Bhagat wrote:
Situation B:
In this case, the user is only allowed to run commands listed in the sudoers file. (S)He does not know the root password, and does not have full administrative access. Used properly, sudo is quite a powerful tool for access control.
Thanks to you and Revant for your nice explainations. I have only one last question for this topic. This is to understand the scope of risk that root login carries.
Suppose we assume that the root is totally honest and will not destroy any files even by mistake and will always man his terminal so no one else will type in anything from his keyboard. In this situation, is the system still at risk from any other factors? Can anyone who has access to the system's network hijack the running root-login session? In short, is the risk only limited to the root doing harm or his station being used by someone else while he is away or is it possible to intrude into the root's session remotely. How private is a login session?
Thanks and Regards :)
Rony.
___________________________________________________________ Yahoo! Exclusive Xmas Game, help Santa with his celebrity party - http://santas-christmas-party.yahoo.net/