EX200 Red Hat Certified System Administrator RHCSA – User and groups management
1. User properties and where are they stored on the system
Welcome all to this tutorial and today’s chapter. In this chapter I will be talking about users and user management. This is of utmost importance to you primarily because if you plan to work as a network administrator or if you’re providing technical support or something of a kind, you will inevitably have to create users, delete you users, lock them, unlock them, et cetera. You are bound to receive phone calls throughout the day, or support requests that somebody has locked themselves out of their accounts, or that they can’t log into their account, or that there is some sort of problem with the login. You will be required to solve such problems. Here I will teach you pretty much all that there is to know about users, their creation, deletion, setting password rules, not password rules, but passwords for the rules for expiration of passwords and so on.
As I said, please, you are already here. Pay close attention here, especially to this chapter, because you will need it in order to pass the Red Hat Certified Exam certified System Administrator Exam and you will need it if you plan to work as a network administrator. This is definitely one of those fields that will occupy a large chunk of your time in the real world. Anyway, without further ado, let’s go ahead and jump into this tutorial and see what can we actually learn. So first off, let us have a look at the files where user information is stored. Now you need to go into Etsy. So Cat Etsy and I will do the past WD. File Presenter There are a lot of users here, so not all of these users are the users with which we can actually log into the system. Rather instead they are system users. So for example, what shall we take? Sshdaon has its own user, which is through which it actually runs.
They do not require passwords, they are just users for certain processes to run with a very specific set of permissions for security reasons. Anyway, let’s go ahead and dive down into our user, which we are using currently, which I am using currently. Yours could be different. It is whatever you typed in during the installation. So mine is random guy. Let’s go ahead and clear the screen. There is a lot of information there and I would like to actually just view that user separately. So what have we learned before? With a grab command, just do the same thing as we did before Cat and then pipe it to Grep. Or this should work too. Without the Cat, you can do one single command grab. What shall we grab? And there we go. So you can put grab in front as well without piping it through. You can just pass a file to Grep. Anyway, here I have pulled out this line.
Didn’t need to pull the entire username, rand was enough. So here you have the username, which is Random Guy. This X signifies that there is a password, that there is a properly encrypted password in the etsy shadow file where all the passwords are stored for users. Notice that users are stored separately from their passwords. Passwords are in a different file which is encrypted and accessible to root over. Here the next number. This number 1000 that you see. This is the UID or unique user identifier. There are 65,000 or 64,000 if I’m not mistaken, possible users that you can create on one single system. So that’s a lot. So feel free to create as many as you like. It is not very likely that you will encounter systems where you will need more than where you will need thousands upon thousands and upon thousands of users the systems which will require more than 64,000 users. That is not very likely, although it is possible. Next up is the unique identifier for groups.
So GID group identifier also 1000. So by default, if you create a user in Red Hat Linux, and generally in Linux as well, that user will become a member of a group which is named the same way that username that user has been named. So random Guy belongs to the group Random Guy by default. That is its default primary group. Every user within Red Hat has has to be a member of at least one primary group. So you have primary groups and then you have secondary groups. We will cover this when we get to that section of this chapter.
But for the time being note that this first number 1000 signifies the user rated the UID and that the second number signifies the GID. The GID tends to be different from the UID. I don’t know, from time to time depends on what sort of a user have you created and to which groups have you assigned it. For example, let’s say that a random guy is an accountant in some sort of a firm, any kind of a firm, let’s say a butchery and he is not a member of the group which is named by him. He’s not a member of random guy, rather instead he would be a member of accounting. So this would be 1000 and this would be some other number. So random Guy with this UID would be a member of a group that is not random guy rather instead that is accounting with a different GEID. It might seem a little bit confusing, but no big deal. When I show you demonstrations later on this will become a lot clearer. This is not an especially difficult chapter. It is, I would say, a rather easy chapter, but it does require you to pay a little bit of attention and to follow through the demonstrations and then you will be able to handle it anyway. Next up you have the home directory of the user. So usually the home directory is just home and then the user name and after that come all those other folders that we are used to seeing depends on what you’ve assigned to be created by default.
Next up is the default shell which that user runs, which is bin Bash. There are multiple shells. I will also cover this in the follow up tutorials within this particular chapter. Anyway, now that we have examined the Etsy password file, let’s go ahead and clear the screen and do the same thing for Etsy shadow where our passwords are stored. But you will notice something. So grep ran, let’s see shadow this file, you will only be able to read it as root. You won’t be able to read it as another user. If my memory serves me right. Let’s go ahead and check. Don’t need to speculate at all. Let’s see shadow and there we go. Nobody has any permissions, but that only means that the root is the only one that can do anything to the file. You can see it’s all just Hyphens minus signs. It’s completely forbidden to access it. So let’s go ahead and list it out as root because you will only be able to do this as root for shadow for a past WD, you should be able to do that as a regular user as well. Anyway, here you have the username and then you have the password hash, which ends here.
So at the first colon it ends and the password hash is quite long. You will not be able to see the passwords in clear text. There is no way you can do that, especially not in Linux, and you can’t do that in any operating system that I know. You won’t be able to do it in Windows or Mac or anything of a kind. That is a unique feature across the board, and pretty much all the major OS is out there. Password will be hashed encrypted and the file will be inaccessible. Only root will be able to access it, which is a pretty good security feature. Let’s say that somebody obtains a remote chat or somebody plugs in a USB into your computer. They won’t be able to grab the Etsy shadow file. And even if they do somehow magically grab it, its contents will be encrypted and it is highly unlikely that they will be able to decrypt it. Especially if you’ve used a stronger password.
Let’s say more than eight characters long. More than eight characters long and containing upper case letters, lower case letters, characters, numbers, the amount of time that somebody would need and the sort of hardware that they would need in order to crack it goes outside of the rational sphere. It could take decades, even hundreds of years, depending on what sort of hardware you have. Even more than that, therewith you can rest assured that your passwords are safe and secure when they are stored in this manner. Now, these two files you should keep in mind there is other information in the Etsy shadow file and there is other information which can be added to the Etsy password file within the same line. That sort of information we will do later on. For example, you can issue comments. You can assign additional programs to run in addition to the not only instead, but also in addition to the bash shell or something of a kind. There’s lots of lots of options that you can add here that are not all listed. Now, you might have noticed that there are some other things past the hash. We will deal with them in the follow up tutorials as well. No worries there.
These are some of the things that you will be setting, like the expiration date of a password or do you want to lock it, disable it, or to do something of a kind. Here in the Etsy and password file, especially in the Etsy shadow file, you will be able to see I meant to say at the shadow, not just Etsy, you will be able to see whether the password for that account has been locked out or deactivated or does it have an expiration date or something of a kind.
Whatever is needed by you at the moment, you will be able to find that sort of information in regard to your users in Etsy shadow and Etsy passwd files. Anyway, you can also list these too by doing this. Let’s just do this before I decide to wrap up the tutorial. Let’s see password. This is not going to work. We’ll have to do it in a different way. Okay, so cat Etsy shadow grep what shall we grip run and cat at Cpass WD grep run. There we go. Now we have both of these things listed out here without any problems. We can actually see both of them and we see the information that is contained within the Etsy and within the Etsy password and within the Etsy shadow file. Usually that’s the first place where you will look if the user is having any problems or any difficulties logging in. Anyway, I bid you all farewell in the download of luck until next tutorial.
2. Creating a user
Welcome all to this tutorial and today’s chapter. In this chapter I will be talking about users and user management. This is of utmost importance to you primarily because if you plan to work as a network administrator or if you’re providing technical support or something of a kind, you will inevitably have to create users, delete you users, lock them, unlock them, et cetera. You are bound to receive phone calls throughout the day, or support requests that somebody has locked themselves out of their accounts, or that they can’t log into their account, or that there is some sort of problem with the login. You will be required to solve such problems. Here I will teach you pretty much all that there is to know about users, their creation, deletion, setting password rules, not password rules, but passwords for the rules for expiration of passwords and so on.
As I said, please, you are already here. Pay close attention here, especially to this chapter, because you will need it in order to pass the Red Hat Certified Exam certified System Administrator Exam and you will need it if you plan to work as a network administrator. This is definitely one of those fields that will occupy a large chunk of your time in the real world. Anyway, without further ado, let’s go ahead and jump into this tutorial and see what can we actually learn. So first off, let us have a look at the files where user information is stored. Now you need to go into Etsy. So Cat Etsy and I will do the past WD. File Presenter There are a lot of users here, so not all of these users are the users with which we can actually log into the system. Rather instead they are system users. So for example, what shall we take? Sshdaon has its own user, which is through which it actually runs. They do not require passwords, they are just users for certain processes to run with a very specific set of permissions for security reasons. Anyway, let’s go ahead and dive down into our user, which we are using currently, which I am using currently. Yours could be different. It is whatever you typed in during the installation. So mine is random guy. Let’s go ahead and clear the screen. There is a lot of information there and I would like to actually just view that user separately. So what have we learned before? With a grab command, just do the same thing as we did before Cat and then pipe it to Grep.
Or this should work too. Without the Cat, you can do one single command grab. What shall we grab? And there we go. So you can put grab in front as well without piping it through. You can just pass a file to Grep. Anyway, here I have pulled out this line. Didn’t need to pull the entire username, rand was enough. So here you have the username, which is Random Guy. This X signifies that there is a password, that there is a properly encrypted password in the etsy shadow file where all the passwords are stored for users. Notice that users are stored separately from their passwords. Passwords are in a different file which is encrypted and accessible to root over. Here the next number. This number 1000 that you see. This is the UID or unique user identifier. There are 65,000 or 64,000 if I’m not mistaken, possible users that you can create on one single system. So that’s a lot. So feel free to create as many as you like. It is not very likely that you will encounter systems where you will need more than where you will need thousands upon thousands and upon thousands of users the systems which will require more than 64,000 users. That is not very likely, although it is possible. Next up is the unique identifier for groups. So GID group identifier also 1000.
So by default, if you create a user in Red Hat Linux, and generally in Linux as well, that user will become a member of a group which is named the same way that username that user has been named. So random Guy belongs to the group Random Guy by default. That is its default primary group. Every user within Red Hat has has to be a member of at least one primary group. So you have primary groups and then you have secondary groups. We will cover this when we get to that section of this chapter. But for the time being note that this first number 1000 signifies the user rated the UID and that the second number signifies the GID.
The GID tends to be different from the UID. I don’t know, from time to time depends on what sort of a user have you created and to which groups have you assigned it. For example, let’s say that a random guy is an accountant in some sort of a firm, any kind of a firm, let’s say a butchery and he is not a member of the group which is named by him. He’s not a member of random guy, rather instead he would be a member of accounting. So this would be 1000 and this would be some other number. So random Guy with this UID would be a member of a group that is not random guy rather instead that is accounting with a different GEID. It might seem a little bit confusing, but no big deal. When I show you demonstrations later on this will become a lot clearer.
This is not an especially difficult chapter. It is, I would say, a rather easy chapter, but it does require you to pay a little bit of attention and to follow through the demonstrations and then you will be able to handle it anyway. Next up you have the home directory of the user. So usually the home directory is just home and then the user name and after that come all those other folders that we are used to seeing depends on what you’ve assigned to be created by default. Next up is the default shell which that user runs, which is bin Bash. There are multiple shells. I will also cover this in the follow up tutorials within this particular chapter. Anyway, now that we have examined the Etsy password file, let’s go ahead and clear the screen and do the same thing for Etsy shadow where our passwords are stored. But you will notice something. So grep ran, let’s see shadow this file, you will only be able to read it as root. You won’t be able to read it as another user. If my memory serves me right. Let’s go ahead and check. Don’t need to speculate at all. Let’s see shadow and there we go. Nobody has any permissions, but that only means that the root is the only one that can do anything to the file. You can see it’s all just Hyphens minus signs. It’s completely forbidden to access it. So let’s go ahead and list it out as root because you will only be able to do this as root for shadow for a past WD, you should be able to do that as a regular user as well. Anyway, here you have the username and then you have the password hash, which ends here. So at the first colon it ends and the password hash is quite long. You will not be able to see the passwords in clear text.
There is no way you can do that, especially not in Linux, and you can’t do that in any operating system that I know. You won’t be able to do it in Windows or Mac or anything of a kind. That is a unique feature across the board, and pretty much all the major OS is out there. Password will be hashed encrypted and the file will be inaccessible. Only root will be able to access it, which is a pretty good security feature. Let’s say that somebody obtains a remote chat or somebody plugs in a USB into your computer. They won’t be able to grab the Etsy shadow file. And even if they do somehow magically grab it, its contents will be encrypted and it is highly unlikely that they will be able to decrypt it. Especially if you’ve used a stronger password. Let’s say more than eight characters long. More than eight characters long and containing upper case letters, lower case letters, characters, numbers, the amount of time that somebody would need and the sort of hardware that they would need in order to crack it goes outside of the rational sphere. It could take decades, even hundreds of years, depending on what sort of hardware you have. Even more than that, therewith you can rest assured that your passwords are safe and secure when they are stored in this manner.
Now, these two files you should keep in mind there is other information in the Etsy shadow file and there is other information which can be added to the Etsy password file within the same line. That sort of information we will do later on. For example, you can issue comments. You can assign additional programs to run in addition to the not only instead, but also in addition to the bash shell or something of a kind. There’s lots of lots of options that you can add here that are not all listed. Now, you might have noticed that there are some other things past the hash. We will deal with them in the follow up tutorials as well. No worries there.
These are some of the things that you will be setting, like the expiration date of a password or do you want to lock it, disable it, or to do something of a kind. Here in the Etsy and password file, especially in the Etsy shadow file, you will be able to see I meant to say at the shadow, not just Etsy, you will be able to see whether the password for that account has been locked out or deactivated or does it have an expiration date or something of a kind. Whatever is needed by you at the moment, you will be able to find that sort of information in regard to your users in Etsy shadow and Etsy passwd files. Anyway, you can also list these too by doing this. Let’s just do this before I decide to wrap up the tutorial. Let’s see password. This is not going to work. We’ll have to do it in a different way. Okay, so cat Etsy shadow grep what shall we grip run and cat at Cpass WD grep run. There we go.
Now we have both of these things listed out here without any problems. We can actually see both of them and we see the information that is contained within the Etsy and within the Etsy password and within the Etsy shadow file. Usually that’s the first place where you will look if the user is having any problems or any difficulties logging in. Anyway, I bid you all farewell in the download of luck until next tutorial.
3. Creating groups and assigning users to them
Welcome back everybody. Today I am going to talk about creation of groups and how we can actually add user assign users to those groups. In order for us to do this we will need to use the user not user sorry but groupad command which is fairly similar or pretty much the same as user ad command. So all you need to type in instead of user ad is group ad from help and you’ll get a fairly brief set of options which are all pretty much not really that important at all. Somebody might say oh well, but you have a group password that is here, isn’t that important or at least of some importance? Well no, not really because it is no longer really used on any of the newer systems anyway. One thing that might be of interest to you is actually this file here which is the configuration file for the defaults. If we go ahead and take a look at that file let’s see login defy here you can see all the parameters that are specified that are to be created or to be set would be a more precise way to say it during the default user creation or group creation. So you have createhome would you like the home directory to be created? Yes. So if you don’t want that to happen you would just type in here no and by default no home directories would be created. Down here you have an encryption method specified to encrypt the passwords. Up here you have the GID pool of basically number of IDs. It goes from 1000 to 60,000.
You can narrow this pool down or make it very specific if you want your groups to have specific GEDs up above for user ad again you have the same option here and there are I mean password, minimal length this is very nice expiration dates, et cetera that you can actually set combine and have that by default. So you can define your policies here if you choose to do so. All you need to do in this file is basically either change these numbers or change the right side of this configuration such as for example instead of yes you would type in no or instead of this path you could type in another path. This one is commented out. I’m just citing this as an example. You shouldn’t really mess around with this one. Input the screen ran a bit for me, where was it? You shouldn’t really mess around with this one in particular. Not for the time being anyway but you can change a lot of these other values here if you wish to do so. I’m going to give you a bit of nausea now because I span the screen all the way down. It doesn’t really matter. Let’s go ahead and clear it.
So in order to create groups we would need to type in user sorry, group ad and how shall we name these groups? I mean, there are ways of naming them, of course. The usual way would be like this marketing and group Ad. What shall the second group be? Sales and group ad. Shall the third one be? The third one can be I don’t know. Let’s not create a third one, because I already have a considerable amount of groups for testing purposes here and my imagination has unfortunately ran out of meaningful names. If you want to see the list of all groups, you can go ahead and type in Cat. So they are located in this file at c group. Press Enter and there you go. So I have already assigned Adam to have its secondary group as G One. So it already exists here. One keynote here to mention is that you only be able to see secondary groups for users. So this is the username, and then you can have all the users here which are assigned to this secondary group. If you want to see the primary group of a particular user, you can do it in the Etsy past W file. So cat etsy past WD.
This is too much. Let’s go ahead and clear the screen. Grab Adam X 1003. Will this work? Yes, it will. So we have Adam, who is a group of 1006. You don’t know which group that is, just know it’s G-I-D and it’s not very useful, I suppose. You can do this like Cat Etsy group and then grab 1006 and you will see that that’s the group Sheep. And there you go. That is the group sheep. Adam now belongs to the group Sheep. That is its primary group. I’m sure that he’s not very grateful for this. I have done some previous testing prior to this tutorial. The Adam’s original group was 1003, if I’m not mistaken. But during the process of my testing, I have assigned him to group 1006. Do not worry, I will show you how to do this in a moment. It’s not that big of a deal, but this way of figuring out who belongs, who is in which group, or something of a kind is not very effective, right? I mean, you have to go through two separate files and in one file you have the primary group, and in another file you have the secondary groups. And then you have the list of users belonging to that secondary group.
Not a very efficient thing. What you want to do is clear the screen. First, type in ID Adam. And here you have a clear overview of everything. You can see that the user ID is 1003. The primary group is 1006 Sheep. The secondary groups are well, all of the groups are actually Sheep and G One. G One being the secondary group to which I have assigned it. Do not let this G One confuse you. That is just the name that I have assigned him during my test runs. That’s just a group name, quite literally. I could have written here marketing or accounting or something of a kind. Now let us go ahead and see how we can actually modify the user parameters so that the user belongs to a group. I mean, obviously we can edit the files like Etsy past WD, we can change it from 1006 to 1003, just edit it directly there or in the group’s file. We can just add the names after the last colon. But that is not something that we want to do first of all because you have to go to the file and then you have to edit the file, save it, look for the username within the file or something like that.
Those files are generally used as reference points and that is where you would go if there is something wrong with the user to check if the configuration is right. As I’ve stated before, if you want to change the user parameters like this from pretty much anywhere in your system, you would just type in User mod help. User mod is fairly similar and it has pretty much the same arguments as user ad. It’s pretty much the same. What is interesting here, some of the interesting options here are these three for this particular tutorial where we will actually be able to add user, add Adam to other groups or clear it all together or clear the groups altogether and then add new set of groups there. Down below there’s also another option which you can change, which is the default shell of the user.
There are several shells for Unix systems. For example, in the Windows and Windows systems you have the CMD and CMD functions in one way and it has one syntax attached to it and that is it. On Linux you can actually choose which shell do you want. For example, the one that we’re using now is a born shell. The other one that is quite popular is basically Seashell. The difference between Seashell and born shell is syntax, basically. So you have one syntax which is used in the born shell which is Bash syntax and in Seashell you have a C programming language syntax. So the commands would be typed in in a bit of a different the regular expressions would be typed in in a bit of a different manner.
You would have some options would be available there and wouldn’t be available here but you can pretty much do the same things with both of them. They’re all very good and very useful. Anyway, let’s go ahead and type in User mod. All right, before we begin, there is one more thing that I would like to mention here. This adds a primary group to the user or changes the primary group of the user. This adds a new set of groups regardless a new group, new secondary group, that is regardless of what already exists and it will overwrite anything. So whatever exists will be overwritten by this command. However, if you add A in front of the capital G, you will only append and add one more group to the existing list as opposed to deleting the whole list. Let me explain further what I mean by this. Let’s say that one user belongs to ten groups and you want to add an 11th group. If you add it with a Hyphen G argument, that means that that group will indeed be added, but all the other ones will be deleted. If you put A in front of the G, then you will be able to actually just add the 11th group without deleting the other ten groups. Anyway, let’s go ahead and type in user mod. The actually, let’s just do G because we want to add Adam to a lowercase G. We want to change Adams primary group. So Adams primary group will now become Meat. I haven’t showed you how to create Meet, but I have shown you how to create marketing and sales. Same way user group ad space Meet.
I have created this one previously. So now we shall add Adam. We shall promote Adam from group Sheep into group meat. Not sure if that’s a promotion or not, but oh well, this is not going to work because I need to type in the username. And there you go. So if I type in ID Adam, now you will see that the primary group of Adam is now Meet sheep does not exist here. And now we shall add a secondary group to Adam which will override G one, because groups is simply a list of all the groups to which Adam belongs to. But this being the primary group and this being the secondary group, you know that’s the primary group because it says here GID. Now we shall add Adam to a secondary group as well. Assign Adam. A secondary group. So user mod and we will overwrite the current one by typing in this. So sheep. Adam. ID. Adam now you can see that the primary group of Adam is Meet, secondary group of Adam is Sheep. And now we can append let’s go ahead and do this. Now we can append the secondary groups. We can add something meaningful this time like marketing. And we can now do ID Adam. Excellent.
Now you can see all the groups to which Adam belongs. And you have it says Sheep and then it says marketing. I know that these don’t really mix very well. Meet Sheep Marketing. We can also add like this, sales, another group which I’ve created. So it says groups, Meet, Sheep, marketing, sales. These things, I’m not sure how well they combine. I suppose you can combine them in one way or another. They all Meet and Sheep can go into marketing and then somebody can sell it or something of a kind. It doesn’t really matter. I just wanted to show you how you can create groups and assign a user to it. Now, another feature of user user mod is that you can actually change the shell. So pin tcsh Adam. And if I go ahead and do cat at CD graph Adam, you can see that there is a difference. Now all the other users have been bash and I have DCSH. So Born is an acronym.
It stands like bash born Again something. Born again bash? Something like that. It doesn’t really make much difference, but that’s all that there is to it. So it says now Adam will be using a very much different shell for its working days and its work, so on and so forth. Anyway, I hope that I have shown you how you can actually create groups, how you can add them. If you would like to remove a group, it’s not a big deal, you can just type in user sorry, what do we need? Group delete and then you which group would you like to delete? Let’s go ahead and delete marketing because you know, who needs marketing? And then if I do ID Adam, you can see it doesn’t actually exist. It’s removed from here. And if I go ahead and cat at C group, it’s gone. It shouldn’t be here. Let’s see adam meet Sheep glass CDG nope, it is no longer here. So these are all the users that belong to the group Sheep.
I can also add random Guy, which is my standard user, to the group Sheep as well by typing in user mod AG no sheep random Guy sorry, not user mod. And if I go ahead and cat the group now, you can see that both of these users actually belong to this group. You can also append this file manually. So vim at C group, this applies to pretty much all the other files as well, like etsy password and etsy password and etsy shadow etsy group. So I am in vim now let’s just scroll down to where I need to be. Actually, let’s just this is not what I want. Let’s delete it. Escape. I need this. I need sheep. And there you go. Insert I can remove random guy from this group. So like this adam right quick. If I do ID random Guy, you will see that Random Guy is no longer a part of that particular group. Let me just prove it one more time because I didn’t actually show it to you previously, I added like this I do ID random Guy, you can see he’s now a member of Sheep. And if I do vim at C group there we go. Give me insert. If I delete him here, ID random Guy you’ll see he will no longer be a member of that group. Same would apply if I was to add him manually to that group or any other user.
I can change things manually in those files, but there really isn’t a need for it as you do have user mode, user ad, group ad and so on. Not really that big of a deal. You can just use these commands in order to edit it. If you forget your syntax, or if you can’t remember it at a time, there’s always the Help the man pages. There’s just one more brief thing that I would like to show you, and that is how to delete a user. It’s fairly simple. You just type in User Dell and then type in the user. Well, before we type in the user, let’s take a look at the Help bar. It’s fairly simple. So User Dell, and what you want to do is pass in the argument R, remove home directory and mail spool so that the home directory is removed as well. You don’t want it to remain behind if you’re deleting the user altogether. And now we shall type in Adam, who has been a member of Sheep and Meat and Marketing and Sales.
And Adam has followed us along through. But now we are ruthless and we are going to delete Adam. Why we’re going to do that? Well, for the sake of demonstration anyway, go ahead and press Enter. And User Atom is currently used by process 4687. Okay, let’s do this. Let us force it. User Dell. User Adam is currently used by process group Adam, not removed because it is not a primary group of user Adam. Okay, so group Dell Adam, goodbye, Adam is no longer in existence. We can verify this by typing ID Adam. ID Atom. No such user. We have logged into Adam before, or I have logged in here before with Adam and it has just stayed up and running. That’s why there is a User Adam that was used by process for six, eight, seven, but that doesn’t really matter.
We could have also typed in Kill 4687. That’s not a wise thing to do, to kill it before we actually know what it is we can do. Psaaux. Sorry, grep 4687. So 4687 and there we go. So we now know what is this process. We can read it here and then decide whether we wish to kill it or not. Or we can use the force command and remove move it. Let’s just go ahead and visit the home directory. Press Enter. LS you can see that Adam is no longer that the folder. Adam is no longer here. Anyway, I visual farewell and wish you a ton of luck.
Interesting posts
The Growing Demand for IT Certifications in the Fintech Industry
The fintech industry is experiencing an unprecedented boom, driven by the relentless pace of technological innovation and the increasing integration of financial services with digital platforms. As the lines between finance and technology blur, the need for highly skilled professionals who can navigate both worlds is greater than ever. One of the most effective ways… Read More »
CompTIA Security+ vs. CEH: Entry-Level Cybersecurity Certifications Compared
In today’s digital world, cybersecurity is no longer just a technical concern; it’s a critical business priority. With cyber threats evolving rapidly, organizations of all sizes are seeking skilled professionals to protect their digital assets. For those looking to break into the cybersecurity field, earning a certification is a great way to validate your skills… Read More »
The Evolving Role of ITIL: What’s New in ITIL 4 Managing Professional Transition Exam?
If you’ve been in the IT service management (ITSM) world for a while, you’ve probably heard of ITIL – the framework that’s been guiding IT professionals in delivering high-quality services for decades. The Information Technology Infrastructure Library (ITIL) has evolved significantly over the years, and its latest iteration, ITIL 4, marks a substantial shift in… Read More »
SASE and Zero Trust: How New Security Architectures are Shaping Cisco’s CyberOps Certification
As cybersecurity threats become increasingly sophisticated and pervasive, traditional security models are proving inadequate for today’s complex digital environments. To address these challenges, modern security frameworks such as SASE (Secure Access Service Edge) and Zero Trust are revolutionizing how organizations protect their networks and data. Recognizing the shift towards these advanced security architectures, Cisco has… Read More »
CompTIA’s CASP+ (CAS-004) Gets Tougher: What’s New in Advanced Security Practitioner Certification?
The cybersecurity landscape is constantly evolving, and with it, the certifications that validate the expertise of security professionals must adapt to address new challenges and technologies. CompTIA’s CASP+ (CompTIA Advanced Security Practitioner) certification has long been a hallmark of advanced knowledge in cybersecurity, distinguishing those who are capable of designing, implementing, and managing enterprise-level security… Read More »
Azure DevOps Engineer Expert Certification: What’s Changed in the New AZ-400 Exam Blueprint?
The cloud landscape is evolving at a breakneck pace, and with it, the certifications that validate an IT professional’s skills. One such certification is the Microsoft Certified: DevOps Engineer Expert, which is validated through the AZ-400 exam. This exam has undergone significant changes to reflect the latest trends, tools, and methodologies in the DevOps world.… Read More »