Tired of always being afraid someone will hack into your Linux computer/server?
One of the most important steps is to make sure the attacker can’t log in with the “root” account.
In order to do this, you have to:
- Make sure you can “switch user” to root (you will need to be able to control your system, after all)
- Make sure that nobody can log in with root, neither remote nor local.