Change UBUNTU admin passwd using GUI
Tags:
- Ubuntu
Last response: in Linux/Free BSD
nss000
February 23, 2014 7:26:32 AM
Gents:
Running UBUNTU_12.04.4
Can I change admin password from a GUI ?
systemtools --> systemsetting--> useraccounts provides **no obvious tool** enabling this change ... infact clicking here-and-there etc. provides no obvious tool to do anything. Mebby it's a REPORTs function only and I should call another process.
Anyrate I'd appreciate a clue for changing my "boss" admin password.
Oh yeah ... assuming nearly the worst should I unplug my system from the web while making this password change?
Running UBUNTU_12.04.4
Can I change admin password from a GUI ?
systemtools --> systemsetting--> useraccounts provides **no obvious tool** enabling this change ... infact clicking here-and-there etc. provides no obvious tool to do anything. Mebby it's a REPORTs function only and I should call another process.
Anyrate I'd appreciate a clue for changing my "boss" admin password.
Oh yeah ... assuming nearly the worst should I unplug my system from the web while making this password change?
More about : change ubuntu admin passwd gui
skittle
February 23, 2014 9:07:41 AM
Use the command "passwd" to change password.
https://help.ubuntu.com/community/RootSudo#root_account
https://help.ubuntu.com/community/RootSudo#root_account
m
0
l
nss000
February 23, 2014 5:30:08 PM
Nope. Three times I entered the new hairy passphrase. Three times the CLI rejected it as non-reproduced. Enough. Fyuck this it's not 1957. I quit. That's why you need the GUI version which includes a typographic "spelling goddess" to make sure you don't mis-strike keys or mis-remember decimal points.
https://help.ubuntu.com/community/RootSudo#root_account
skittle said:
Use the command "passwd" to change password.https://help.ubuntu.com/community/RootSudo#root_account
m
0
l
Related resources
stillblue
February 24, 2014 12:49:42 AM
I don't believe that I have ever used the root admin password in ten years of Ubuntu. What do you want it for? You have a user that has full admin privileges via sudo. That password can be changed via a gui system settings user accounts unlock the settings in the upper right corner and change your password.
m
0
l
nss000 said:
Nope. Three times I entered the new hairy passphrase. Three times the CLI rejected it as non-reproduced. Enough. Fyuck this it's not 1957. I quit. That's why you need the GUI version which includes a typographic "spelling goddess" to make sure you don't mis-strike keys or mis-remember decimal points. If you are having that much trouble typing the password when setting it, aren't you concerned that you may have just as much trouble the next time you want to log in as root? Maybe you should rethink your password.
m
0
l
nss000
February 24, 2014 8:51:13 AM
Need I remind you gentlemen: Usrland FAILS are **never** the users fault. Ever. //snarky cut-throat rant removed ....//
Gents:
Exactly!! Generic usrland admin passwd not ROOT! I cannot find a way to get a/the/some/mythical GUI passwd changer working as I said in the first post. OFCOURSE I need a **plain text** display of the pasword while I enter it and re-enter ... any normal person does cause how-else do you know you entered it the way you wanted?
******************************************
I don't believe that I have ever used the root admin password in ten years of Ubuntu. What do you want it for? You have a user that has full admin privileges via sudo. That password can be changed via a gui system settings user accounts unlock the settings in the upper right corner and change your password.
*************************************
I have been very impressed by improvements in passwd cracking. Crackers care-not for my personal memory weakness. So I wanted to go 20+ and of-course write-nothing-down as is best practice so I read. Result? FAIL!
*****************
If you are having that much trouble typing the password when setting it, aren't you concerned that you may have just as much trouble the next time you want to log in as root? Maybe you should rethink your password.
Gents:
Exactly!! Generic usrland admin passwd not ROOT! I cannot find a way to get a/the/some/mythical GUI passwd changer working as I said in the first post. OFCOURSE I need a **plain text** display of the pasword while I enter it and re-enter ... any normal person does cause how-else do you know you entered it the way you wanted?
******************************************
I don't believe that I have ever used the root admin password in ten years of Ubuntu. What do you want it for? You have a user that has full admin privileges via sudo. That password can be changed via a gui system settings user accounts unlock the settings in the upper right corner and change your password.
*************************************
I have been very impressed by improvements in passwd cracking. Crackers care-not for my personal memory weakness. So I wanted to go 20+ and of-course write-nothing-down as is best practice so I read. Result? FAIL!
*****************
If you are having that much trouble typing the password when setting it, aren't you concerned that you may have just as much trouble the next time you want to log in as root? Maybe you should rethink your password.
m
0
l
skittle
February 24, 2014 12:08:07 PM
nss000
February 24, 2014 2:29:43 PM
BigS:
This is a pretty silly thread ... and I am of-course responsible for creation/upkeep of my own passwords. So ignore my false-pleadings ...
What IS serious IMHO is rapid devaluation of traditional 8-10-12 digit passcodes.
I understand many incautious but non-obvious choices can be broken in less than a minute. So I really really was trying to attack what I judged a serious issue, and create a robust 20-30 digit MEMORABLE passphrase for my new box. Something good for the next 5 years. I picked a honey that only an XX & YYY imagining ZZZZ would find intuitive! But, even with planning & foresight I failed-to-pass-go and that is no silly matter.
Excuse me could you please pass the aluminum pot bubbling with spagetti sauce?
This is a pretty silly thread ... and I am of-course responsible for creation/upkeep of my own passwords. So ignore my false-pleadings ...
What IS serious IMHO is rapid devaluation of traditional 8-10-12 digit passcodes.
I understand many incautious but non-obvious choices can be broken in less than a minute. So I really really was trying to attack what I judged a serious issue, and create a robust 20-30 digit MEMORABLE passphrase for my new box. Something good for the next 5 years. I picked a honey that only an XX & YYY imagining ZZZZ would find intuitive! But, even with planning & foresight I failed-to-pass-go and that is no silly matter.
Excuse me could you please pass the aluminum pot bubbling with spagetti sauce?
skittle said:
passwd will have you to retype the new password to check if it was input correctly. I purpose that if you cannot correctly input your password twice then perhaps it is too complicated.
m
0
l
Best solution
skittle
February 24, 2014 2:53:19 PM
Relevant xkcd on password strength
http://xkcd.com/936/
http://www.explainxkcd.com/wiki/index.php/936:_Password...
Pick something you remember it does not have to be some 20 character random alphanumerical alphabet soup.
http://xkcd.com/936/
http://www.explainxkcd.com/wiki/index.php/936:_Password...
Pick something you remember it does not have to be some 20 character random alphanumerical alphabet soup.
Share
stillblue
February 24, 2014 11:17:57 PM
A strong password is a good idea and we're not berating you for trying to set one. It just sounds like you're trying something that is over-complicated, rather than something that you can actually remember and (equally importantly) type correctly. In reality I don't think many people are going to be interested in cracking your local admin password anyway (unless this is for something other than a home PC). There are far more valuable targets than that, and many of them are weaker. People often have their web browser save passwords, but these are trivially accessible with the default browser configuration and certainly don't require escalated permissions. In fact escalated permissions are only really needed if you want to cause system-wide harm to the PC, and that's a pretty big waste of time when most of the valuable things are probably stored in directories accessible by a normal user.
m
0
l
nss000
February 25, 2014 7:02:50 AM
BigS:
I LOOKED at the 'xkcd' example and was not happy. If an attacker KNOWS a passphrase has no-numbers, no-CAPITALS and no punctuation marks ... and is comprised only of 3-4-5 letter dictionary words ... then I make that protection not-long for this world. Besides I couldn't even remember the damm example because it is not euphonous(?!) hairyscaryunclelarrylivesanddiestoboffhismary ... I can remember THAT.
http://xkcd.com/936/
http://www.explainxkcd.com/wiki/index.php/936:_Password...
Pick something you remember it does not have to be some 20 character random alphanumerical alphabet soup.
I LOOKED at the 'xkcd' example and was not happy. If an attacker KNOWS a passphrase has no-numbers, no-CAPITALS and no punctuation marks ... and is comprised only of 3-4-5 letter dictionary words ... then I make that protection not-long for this world. Besides I couldn't even remember the damm example because it is not euphonous(?!) hairyscaryunclelarrylivesanddiestoboffhismary ... I can remember THAT.
skittle said:
Relevant xkcd on password strengthhttp://xkcd.com/936/
http://www.explainxkcd.com/wiki/index.php/936:_Password...
Pick something you remember it does not have to be some 20 character random alphanumerical alphabet soup.
m
0
l
skittle
February 25, 2014 7:48:12 AM
Ok here. numbers you can understand:
4 random words from a small 2000 word dictionary.
NPR(2000,4)=1.6*10^13 possible passwords
NPR(2000,5)=3.18*10^16 possible passwords
For comparison:
9 digit password made of random lowercase letters
=26^9= 5.42*10^12 possible passwords.
8 digit password consisting of random lowercase and uppercase letters
=52^8=5.35*10^13 possible passwords
7 digit password consistting of random lowercase, uppercase, digits and ten other symbols.
=72^7=1.00*10^13 possible passwords
9 digit password consistting of random lowercase, uppercase, digits and ten other symbols.
=72^9 = 5.2*10^16 possible passwords.
this puts us in the same order of magnitude as 5 random dictionary words.
4 random words from a small 2000 word dictionary.
NPR(2000,4)=1.6*10^13 possible passwords
NPR(2000,5)=3.18*10^16 possible passwords
For comparison:
9 digit password made of random lowercase letters
=26^9= 5.42*10^12 possible passwords.
8 digit password consisting of random lowercase and uppercase letters
=52^8=5.35*10^13 possible passwords
7 digit password consistting of random lowercase, uppercase, digits and ten other symbols.
=72^7=1.00*10^13 possible passwords
9 digit password consistting of random lowercase, uppercase, digits and ten other symbols.
=72^9 = 5.2*10^16 possible passwords.
this puts us in the same order of magnitude as 5 random dictionary words.
m
0
l
And writing down a password is not necessarily a bad idea.
I have mine in a non-descript notepad in my desk here at home. If someone breaks in and steals one of more PC's, it is highly doubtful that they are also going to take some random, seemingly blank notepad, stashed away in a desk drawer. And even if they do, they'd have to be pretty sharp to figure out the pwds are actually constructed.
No.....a thief is going to move that hardware as fast as he can. The next person will just wipe it and move on.
Now.....writing it on a post it and sticking it on the monitor at work? Bad idea.
I have mine in a non-descript notepad in my desk here at home. If someone breaks in and steals one of more PC's, it is highly doubtful that they are also going to take some random, seemingly blank notepad, stashed away in a desk drawer. And even if they do, they'd have to be pretty sharp to figure out the pwds are actually constructed.
No.....a thief is going to move that hardware as fast as he can. The next person will just wipe it and move on.
Now.....writing it on a post it and sticking it on the monitor at work? Bad idea.
m
0
l
nss000
February 25, 2014 4:46:00 PM
USAFR:
'And writing down a password is not necessarily a bad idea. I have mine in a non-descript notepad in my desk here at home. If someone breaks in and steals one of more PC's, it is highly doubtful that they are also going to take some random, seemingly blank notepad, stashed away in a desk drawer.'
Having got-up a new memorable passphrase I have indeed transcribed it for the time being. Gub'mnt agents **DO** casually house-break ---see NSA for details --- Your advice to interpose a transcription passphrase within noisy environs is a very good idea.
'And writing down a password is not necessarily a bad idea. I have mine in a non-descript notepad in my desk here at home. If someone breaks in and steals one of more PC's, it is highly doubtful that they are also going to take some random, seemingly blank notepad, stashed away in a desk drawer.'
Having got-up a new memorable passphrase I have indeed transcribed it for the time being. Gub'mnt agents **DO** casually house-break ---see NSA for details --- Your advice to interpose a transcription passphrase within noisy environs is a very good idea.
m
0
l
nss000
February 25, 2014 5:46:13 PM
See here:https://security.stackexchange.com/questions/36246/what...
A couple years and I'm gestapo toast.
4 random words from a small 2000 word dictionary.
NPR(2000,4)=1.6*10^13 possible passwords
NPR(2000,5)=3.18*10^16 possible passwords
For comparison:
9 digit password made of random lowercase letters
=26^9= 5.42*10^12 possible passwords.
8 digit password consisting of random lowercase and uppercase letters
=52^8=5.35*10^13 possible passwords
7 digit password consistting of random lowercase, uppercase, digits and ten other symbols.
=72^7=1.00*10^13 possible passwords
9 digit password consistting of random lowercase, uppercase, digits and ten other symbols.
=72^9 = 5.2*10^16 possible passwords.
this puts us in the same order of magnitude as 5 random dictionary words.
A couple years and I'm gestapo toast.
skittle said:
Ok here. numbers you can understand:4 random words from a small 2000 word dictionary.
NPR(2000,4)=1.6*10^13 possible passwords
NPR(2000,5)=3.18*10^16 possible passwords
For comparison:
9 digit password made of random lowercase letters
=26^9= 5.42*10^12 possible passwords.
8 digit password consisting of random lowercase and uppercase letters
=52^8=5.35*10^13 possible passwords
7 digit password consistting of random lowercase, uppercase, digits and ten other symbols.
=72^7=1.00*10^13 possible passwords
9 digit password consistting of random lowercase, uppercase, digits and ten other symbols.
=72^9 = 5.2*10^16 possible passwords.
this puts us in the same order of magnitude as 5 random dictionary words.
m
0
l
skittle
February 25, 2014 6:13:37 PM
If you don't run full disk encryption then the Gestapo won't care about your password anyway. They'll just avoid booting your OS and mount the disk as a secondary volume. Even then, passwords, including encryption keys, can be extracted from your head in more ways than one, as skittle hinted at.
If you are of interest to intelligence agencies then you have much more to be concerned about than whether your local admin password is strong. Most drive by attackers don't have supercomputers and don't often target individuals. They're interested in whether you've reused credentials that they extracted from a database dump from some site you signed up to 6 years ago.
If you are of interest to intelligence agencies then you have much more to be concerned about than whether your local admin password is strong. Most drive by attackers don't have supercomputers and don't often target individuals. They're interested in whether you've reused credentials that they extracted from a database dump from some site you signed up to 6 years ago.
m
0
l
nss000
February 26, 2014 7:30:56 AM
Well yes if the Mossad or CIA wants something of mine they are going to get it. All you can do is raise-the-price and avoid being a sheeple. Gawd knows I can't die young. So I DO carry extra **insurance** from Skoda Arms and Dan Wesson. Let's say another 75-M Americans have similar insurance; raise the stakes, eh? G. Gorden Liddy assures us to 'aim for the head' with our 357s. Sounds reasonable. Otherwise, the 1st person thru my front door will be greeted with something that punches holes through both-sides of 3-a armour.
Nope you don't expect to get out alive, but then again do the "security" blackboots have 75-M thugs willing to take-a-bullet for THE MAN ?
Nope you don't expect to get out alive, but then again do the "security" blackboots have 75-M thugs willing to take-a-bullet for THE MAN ?
m
0
l
stillblue
February 27, 2014 3:05:36 AM
nss000 said:
Well yes if the Mossad or CIA wants something of mine they are going to get it. All you can do is raise-the-price and avoid being a sheeple. Gawd knows I can't die young. So I DO carry extra **insurance** from Skoda Arms and Dan Wesson. Let's say another 75-M Americans have similar insurance; raise the stakes, eh? G. Gorden Liddy assures us to 'aim for the head' with our 357s. Sounds reasonable. Otherwise, the 1st person thru my front door will be greeted with something that punches holes through both-sides of 3-a armour. Nope you don't expect to get out alive, but then again do the "security" blackboots have 75-M thugs willing to take-a-bullet for THE MAN ?
Somehow I find this disturbing.
So encrypt your drive, get a thumbreader that senses if you are alive because they could just scan your dead cold fingers otherwise and choose passwords that are completely random digits that even under torture you can't remember and you're good to go. Pray that your thumbreader never breaks.
m
0
l
nss000
February 27, 2014 4:14:27 PM
Yes there is something VASTLY DISTURBING about a free citizen of a republic planning for the violent defence of his data-stores from the Gub'mnt sworn to defend his liberty.
I asked my EE students about "thumbreaders" and they laughed ... every laptop evidently has one and I am hopeless old-foggy to require a 24" screen before I will even look ! They all flashed iPads/iPods/iwhatnots and laughed even more. Most I think are too innocent to worry about 7.62s.
Would I ever recover my own scrambled data? I have little talent for such tasks; plain vanillia hard-drives often disappear and I'm lucky to track them down in SYSTEMS MONITOR. Maxwells equ are more my style. Insuring data by Dan Wesson only works if 75-million people are prepared & willing to defend their front door. I watch the Syrian rebellion UTUBE vids. Whether Sunni or Shia they teach the hard lesson. WAY off topic.
I asked my EE students about "thumbreaders" and they laughed ... every laptop evidently has one and I am hopeless old-foggy to require a 24" screen before I will even look ! They all flashed iPads/iPods/iwhatnots and laughed even more. Most I think are too innocent to worry about 7.62s.
Would I ever recover my own scrambled data? I have little talent for such tasks; plain vanillia hard-drives often disappear and I'm lucky to track them down in SYSTEMS MONITOR. Maxwells equ are more my style. Insuring data by Dan Wesson only works if 75-million people are prepared & willing to defend their front door. I watch the Syrian rebellion UTUBE vids. Whether Sunni or Shia they teach the hard lesson. WAY off topic.
m
0
l
stillblue
February 27, 2014 11:47:55 PM
stillblue said:
No, if you lose your password on an encrypted drive say goodbye to it and move on. Probably. Ignoring the obvious option of brute forcing, it depends on the type of drive and when you encrypted it. If you're running an SSD (I know nss000 is not
) and you didn't encrypt it from day 0 then you can not be guaranteed that all of the data on the drive is encrypted, only that new data is encrypted.
m
0
l
nss000
February 28, 2014 7:43:38 PM
Am reading along with interest ... and from these comments I see that "stronger" data privacy comes with built-in premium costs. Those costs include a personal skill-set which becomes non-trivial for stronger privacy. A casual computer lusr would seem to do best choosing modest privacy goals and executing enabling actions consistently. I imagine that action starts with running open-source apps & *nix OS!
m
0
l
stillblue
March 1, 2014 12:54:41 AM
Anyone can be hacked, even the DOD from time to time. How often are Yahoo and facebook hacked? 2, 3 times a week it seems like. You go for the level of security that you need. If you have a computer connected to the net then you could be hacked if someone wants to bad enough and has the resources. Out of the billions of people connected I have little fear that someone will want to use those resources on me. Unless you are an active member of MEMBLA or a terrorist group who would want to? Stay away from dictionary words and it becomes very hard to crack your system. Keep sensitive data on a computer not facing the net, surf behind Tor and never say yes to "would you like Firefox to remember your password?" and keep a handy self destruct device from Missions Impossible Я Us.
m
0
l
nss000
March 3, 2014 6:29:26 AM
Thanks again to all posters on this thread. Vis' the initial subject: a new password for my workstation, I have chosen a new passphrase, which is while novel contains all the traditional dis-sembliers, is long, easy-to-remember and which for recovery **hides** quite naturally and innocently among a household of scribbled reminders, bash-cheats, doodles, reviews, comments, maths derivations, colored markers and lecture-notes.
So this thread has a practical, successful outcome for me. Thanks again to all. Yeah yeah Vito and Tony still watch from across the street, but it IS a free country.
So this thread has a practical, successful outcome for me. Thanks again to all. Yeah yeah Vito and Tony still watch from across the street, but it IS a free country.
m
0
l
!