![]() |
2009-11-27
, 21:41
|
Posts: 262 |
Thanked: 232 times |
Joined on Aug 2009
|
#2
|
![]() |
2009-11-27
, 21:47
|
Posts: 329 |
Thanked: 142 times |
Joined on Oct 2009
|
#3
|
![]() |
2009-11-27
, 21:57
|
Posts: 36 |
Thanked: 22 times |
Joined on Oct 2009
@ Helsinki
|
#4
|
EDIT: try this for homework: find out what "rm -rf /" does and why it's a very bad idea to use it. This should show you the way to look up commands when unsure
Root is always there, you don't enable/disable, you just temporarily gain it's super-powers.
![]() |
2009-11-27
, 22:08
|
|
Posts: 2,121 |
Thanked: 1,540 times |
Joined on Mar 2008
@ Oxford, UK
|
#5
|
The Following User Says Thank You to pelago For This Useful Post: | ||
Personally I've been on-and-off user of linux with my laptops (mostly if I get bored and want to try something new) and I have Ubuntu server running in my study so I have some understanding about this topic, but I'm not even close to any expert.
So lets say I'm considering enabling the HID Bluetooth profile when I get my hands on my N900. Wiki has guide for it and part of it is gaining the root.
What implications there actually is once the root user is enabled in N900? Common sense tells me that I need a good password and also I shouldn't touch anything I don't know about.
But since we're now talking about a a device that has also a phone in it etc, I'm a bit more cautious and would like to know if there's anything else I should know.