<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Users on ShieldedBytes</title>
    <link>https://linuxeries.org/tags/users/</link>
    <description>Recent content in Users on ShieldedBytes</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Thu, 14 May 2026 11:48:32 +0200</lastBuildDate>
    <atom:link href="https://linuxeries.org/tags/users/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Hardening the Weakest Link: Why You Should Run Your Linux Workstation with a Non-Root User by Default</title>
      <link>https://linuxeries.org/post/2026-05-14-hardening-the-weakest-link-why-you-should-run/</link>
      <pubDate>Thu, 14 May 2026 11:48:32 +0200</pubDate>
      <guid>https://linuxeries.org/post/2026-05-14-hardening-the-weakest-link-why-you-should-run/</guid>
      <description>&lt;h2 id=&#34;introduction-to-non-root-users&#34;&gt;Introduction to Non-Root Users&lt;/h2&gt;&#xA;&lt;p&gt;I&amp;rsquo;ve seen many Linux workstations compromised due to reckless use of the root account. Running a Linux workstation with a non-root user by default is a simple yet effective way to harden your system against potential security threats. By not using the root account for daily activities, you significantly reduce the attack surface of your system. In practice, this means you&amp;rsquo;ll be less vulnerable to malware and other exploits that rely on elevated privileges.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
