105
submitted 1 year ago* (last edited 1 year ago) by MJRul3s@lemm.ee to c/linux@lemmy.ml

Hey guys. I'm new to Linux and I'm running Linux Mint 21.2 Cinnamon. Yesterday I have f*cked up. I was testing things in users and geve myself standart priveledges insted of Admin ones I had from beggining and then restarted PC. I then tried log back into users tab and change myself back to Admin but even tho the password is correct It says that it is not. /So at this point there is only one user in PC who has standart privliedges and no Admin./ I then tried to access root via terminal and this time It said that I don't have permision to do that. And this is where I'm at right now. Please help get back my admin privliedges.

Edit: Issue is fixed. I started GRUB and changed my password which fixed the whole issue. Once again big Thank you to everyone who gave me tips and also big thank you to the guy who started posting about rowing machines. You all wonderful.

you are viewing a single comment's thread
view the rest of the comments
[-] timespace@lemmy.ninja 7 points 1 year ago* (last edited 1 year ago)

Wait wtf? You can just reset root password that easy? What’s even the point of having a password, if all of your data and info is so easily accessed if someone gets physical hold of the machine. I guess so software/remote hackers can’t get your stuff, but still. This seems wild to me, I dunno.

New to Linux so I’m sorry if I’m being ignorant, but it does seem crazy you can get access to a machine without the password.

Edit: Thanks for all the comments below! I guess I’ve been spoiled by BitLocker in Windows being enabled by default and not having to think of disk encryption. Appreciate everyone’s time and responses!

[-] Case@unilem.org 31 points 1 year ago

If an attacker has physical access then you're already screwed in most cases.

[-] nyan@lemmy.cafe 15 points 1 year ago

Pretty much. Even if an attacker can't boot your system, if they have physical access they can just pull your hard drive and mount it on a system they can boot. Only encryption can prevent this. Linux security was originally meant for keeping unprivileged accounts on multiuser systems from messing things up for others on the same machine. It can stretch to some other use cases, but is not a panacea for everything.

[-] tetha@feddit.de 3 points 1 year ago* (last edited 1 year ago)

And even password based disk encryption can be defeated with 2-3 physical accesses if an organization wants to hard enough. Keyloggers can be very, very sneaky.

At that point you'd have to roll something like Yubikey-based disk encryption to be safe, because this re-establishes control over some physical parts of the system. Until they find the backup Yubikey you had to not lose all data by losing the primary key you're carrying around to maintain control over it.

It's not a battle the defending side can win.

load more comments (1 replies)
load more comments (18 replies)
this post was submitted on 11 Aug 2023
105 points (95.7% liked)

Linux

48199 readers
794 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS