Cloud Engineer Bootcamp Episode 1

·

2 min read

Hi there, and welcome to our Intense Cloud Engineering Mastery Bootcamp! I'm Ali, and I'm joined by my colleagues, Gauri and Faizan. We're thrilled to kick off this series to share our knowledge and passion for IT with you, and to help those looking to dive into the world of Cloud Engineering.

Gauri, our junior team lead, is not only a fantastic leader but also a team player who excels at problem-solving.

Ali, that's me, comes from a network and systems engineering background, and I'm your go-to person when it comes to connecting VMs and networks seamlessly.

Faizan, who hails from a tech support background, brings his unwavering passion for AWS cloud computing to the table.

In our first episode, we'll delve into "User Account Operations" and break it down for you in just 15 minutes. Let's start by tackling the concept of Super User and Normal User in a Linux environment, and how to identify them.

Question: Can you explain what Super User and Normal User are in Linux, and how can we identify them?

Answer: In Linux, every user is assigned a unique ID. Superusers, often referred to as root, have IDs ranging from 0 to 999, while normal users typically have IDs ranging from 1000 to 60000.

Now, let's find out where this information is stored, in case we need to investigate.

Question: Where can we find user properties?

Answer: User properties are typically stored in the /etc/passwd file. Let's demonstrate this in the terminal:

#grep ajay /etc/passwd

This command will display user properties. For example:

ajay:x:1001:1001: :/home/ajay:/bin/bash

You can see that the user "ajay" has an ID of 1001, which falls within the normal user range.

Now, let's explore where user password properties are stored.

Question: Where can we find user password properties?

Answer: User password properties are stored in the /etc/shadow file. You can access them with the following terminal command:

#grep ajay /etc/shadow

This command will reveal the user's password properties. For example:

ajay:@s$!1bc25f%:18002:0:99999:7: :

In this entry, you can see the encrypted password hash and other related properties.

That wraps up our first episode on "User Account Operations." We hope you found this information valuable and that it helps you on your Cloud Engineering journey. Stay tuned for more exciting content in our Cloud Engineering Bootcamp series! If you have any questions or topics you'd like us to cover, feel free to drop them in the comments below. Thanks for watching, and don't forget to like, share, and subscribe to stay updated on all things cloud engineering. See you in the next episode!