【Change Password in Linux】Step by Step Guide ▷ 2022

It is considered one of the most secure operating systems available.above more popular options like windows Y macOS. This is due to the security options available to all their distributions.

One of the most basic security configurations, present in every operating system, is the option to activate passwords. These become the first line of protection for your operating system.

It is the most reliable security alternative that you can have to secure the data on your computer, and in this note we will tell you everything you need to know to activate, modify and strengthen your password, and protect your operating system.

Learn step by step how to change the password on your computer with Linux easily and quickly

The changing your password in linux it is a quick and easy process.

As in many cases when it comes to Linux, all you need is to know one command:

  • Access the terminal command prompt, enter sudo passwd and run it.
  • You will be prompted to enter your new password twiceshowing the following lines in the terminal: Enter new UNIX password and Retype new UNIX password in each line you enter the new password.
  • If the steps have been executed correctlythe following command line will be displayed on the screen: passwd: password updated successfully.

This message means that you have successfully changed your password. Note that, if you don’t enter a specific user, or if there is only one user on the computer, you will be changing the root password.

See also  【Restore Backups】Step by Step Guide ▷ 2022

Tips to create a 100% secure password for your Linux computer and protect your data

Despite the fact that cyber security is a very serious matter these days, many people they don’t take the time to create strong passwords to protect your data. Combinations as common as your name and your date of birth or, even worse, “password”, will not protect your personal information. For this reason, here are some tips you should follow to keep passwords safestrong and at hand.

Use a password generator

An online password generator is a tool that will provide you with a completely random combination of characters that will make your passwords more secure. For this we leave you the with which you can generate safe and strong passwords with a friendly and easy-to-use interface.

Do not use phrases or dates related to you

The use of personal data for the creation of passwords is highly discouraged, due to the fact that it only takes a little research to get this dataand passwords that include names and dates of birth are very common.

Do not use your name or that of close friends or relatives

In the same way as personal data, the names of close and close relatives are a bad option to form a password. Everything that is needed in a superficial investigation to obtain the data that make it up.

Use at least 15 characters in your passwords

It is proven that long passwords are much more secure since they represent a greater difficulty for hacking programs. Added to this, also it’s a good idea to toggle between uppercase, lowercase, numbers, and special characters.

See also  【 Create Virtual Machine with Windows 10 】 Step by Step Guide 2022

Don’t recycle passwords

It is important to ensure that you do not repeat passwords. Using the same password on multiple accounts is a mistake, since violates the security of all accounts that share it if, for any reason, your password is discovered.

Use a password manager

One of the most useful functions of Google is the password manager that allows you to store all the passwords entered in the browser along with the corresponding usernames. You can access the manager just by logging into your G accountoogle, before login in any other account through the .

List of the best tools to improve the security of your Linux operating system

Linux has protection tools to reinforce the privacy of your files and avoid security breaches. Most of these are compatible with all Linux distributions, so regardless of which distro you run, there will be a tool for you.

These are the best to guarantee the protection of your operating system:

metasploit.com

It is computer security software designed to detect security flaws and vulnerabilities, in addition to functioning as a penetration testing agent or pentesting. Also It is widely used for the development of forms for intrusion detection softwareand also has a framework subproject for the development and execution of exploits against a remote computer.

NMap.org

It is an open source tool created for network discovery and security auditing, in addition, It is widely used by many operating systems thanks to its usefulness in network management. and monitoring of hosting services. Is available in Windows, MacOS Y linux, for which it offers both the classic command system and an advanced graphical interface with tools for transferring and comparing analysis results.

See also  【 Pocket Wi-Fi vs Traveler SIM Card 】 Comparison + List ▷ 2022

wireshark.org

It is one of the most widely used protocol analysis tools in the world., used even in business networks and government platforms for its high level of security. It offers the user clear and easy-to-read data about network data traffic. In addition, Wireshark supports more than 2,000 network protocols, among which one of the most useful is IP identity analysis.

Loading Facebook Comments ...
Loading Disqus Comments ...