Adding a user on Zenwalk 6.2

Zenwalk User management is a very basic administrative task on any operating system. Performing that task on Linux is just as simple as on any other OS. Experienced users already know how to do this, but if you are a new convert to Linux, and are using Zenwalk 6.2, the latest edition of Zenwalk, this tutorial provides a step-by-step guide on how to add a user on a running system.

Unless you have granted user management rights to a regular user, adding a user on Zenwalk requires root privileges (Zenwalk uses the root account for access to performing admin tasks on the system). You can access the user management application from the Control Panel, itself accessible from Zenwalk menu > Settings > Control Panel. On the control panel, click on the User Profiles icon

userprofiles

On the User Management screen, select Create user and click OK.
adding user

Type in the username. The username is the name that the user will use to log into the system.
username

By default, the user belongs to the users group. No need to change anything here.
user group

By default, the user’s home directory is /home/< username >. Again, no need to change anything here.
user home

Aside from the users default group, the user also belong to certain system groups. Membership in these additional groups allows the user to perform certain tasks on the system. Unless you know what you are doing, don’t change anything here.
user's other groups

Bash, Bourne Again Shell, is the default shell interpreter on Linux. And the path to bash is usually /bin/bash. OK.
user's shell

Sometimes, you want to create a temporary account for a guest, or you are very security conscious and want to implement password aging. In such cases, you can set the password to expire. Select the desired password expiration date and click OK, or click on Never if you do not want to implement password aging.
account expiry

Related Posts

How to password-protect GRUB Password-protecting the bootloader is one method you may employ to enhance the physical security profile of your computer. GRUB, the GRand Unified Boo...
OpenShift Online: a non-developer’s guide OpenShift is a Platform as a Service (PaaS) offering from Red Hat, Inc., and OpenShift Online is the hosted or cloud version of it. OpenShift Enterpri...
How to replace Ufw with Firewalld in Linux Mint 15 Firewalld and Ufw, the Uncomplicated FireWall, are two firewall management applications installed in some of the most popular Linux distributions. Ufw...
How to install Ubuntu 14.04 on encrypted MBR partitions This tutorial shows how to install Ubuntu 14.04 on encrypted MBR partitions. It is only slightly different from Manual full disk encryption setup guid...
Dual-booting PC-BSD 8.2 and Windows 7 In continuation of a series of articles on dual-booting Linux and BSD desktop distributions with Windows 7, this article presents a step by step guide...
Use HTC Scribble app to create photo blogs, diaries and greeting cards If you use an HTC smartphone, the HTC Scribble app is something you might want to try. With it, you can create "photo blogs, personal diaries, or g...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*