Discuss the gnomesu command and how it is used.

What will be an ideal response?


In GNOME you can start any program with a different UID (as long as you know the password), using the gnomesu program.
On the GNOME desktop, open a command line dialog by pressing Alt+F2, then enter gnomesu. You are prompted for the root password. After entering it, a terminal window appears. The path is still that of the user logged in to GNOME; if you need the standard environment for root, enter su - in the terminal window.
You can specify a different user than root and also start a program directly with the following syntax: gnomesu -u user command. If the command is not in the path of the user logged in to GNOME, you have to enter the full path, like gnomesu /sbin/yast2, which starts YaST after the root password is entered.

Computer Science & Information Technology

You might also like to view...

A label control's Display property specifies the text displayed inside the control.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

CPUs are easy to upgrade

Indicate whether the statement is true or false

Computer Science & Information Technology

Outline some of the key advantages of GAS.

What will be an ideal response?

Computer Science & Information Technology

A server has a file share for each department. An auditor has discovered that all users have access to all of the departmental shared folders. Which of the following is the BEST solution to ensure users have access to the shared folders of only their department?

A. Create security groups, add the users to the security groups according to their departments, and grant the security groups access to the file shares according to each department. B. Delete the shared folders and create new shared folders, and grant the users access to the shared folders according to their departments. C. Remove everyone from the shared folders, create a security group for each department, add the users to the security groups, and grant each security group access to its own shared folders. D. Remove everyone from the shared folders, grant full access to the IT administrators, and instruct the users to ask managers permission to be re-added to the shared folders according to their department.

Computer Science & Information Technology