


How to check the current user name in Linux: 1. Use the id command to display the current user name, user ID, and the ID of the group to which it belongs. The syntax is "id -un"; 2. Use the whoami command. You can print the user name currently performing the operation; 3. Use the who command with the syntax "who am i" to print the user name logged in to the current Linux system.
#The operating environment of this tutorial: linux7.3 system, Dell G3 computer.
Two ways to view the current user name in Linux
Method 2: Use the id command
The Linux id command is used to display the user's ID and the ID of the group to which it belongs.
id will display the actual and effective ID of the user and the group to which they belong. If the two IDs are the same, only the actual ID is displayed. If only the user name is specified, the current user's ID will be displayed.
Print the information of the current user name. The fields of the output results are as follows:
uid: Display the user ID and user name
gid: Display the user group ID and group name
groups: Display the user's additional group ID and group name
id -------------------------------------------------------------------------------- uid=0(root) gid=0(root) groups=0(root)
Want to exploit the id Command to find the current user name, execute id -un
[root@localhost ~]# id -un root
Method 2: Use the whoami command
The whoami command in Linux is used to print the user name of the current operation. This command is equivalent to executing the "id -un
" command.
whoami
Method 3: Use the who am i
command
Linux who command is used to display the system Which users are on it? The displayed information includes user ID, terminal used, where they are connected from, online time, latency, CPU usage, actions, etc.
who am i -------------------------------------------------------------------------------- Cyuyan pts/0 2017-10-09 15:30 (:0.0)
Explanation: whoami
command vs who am i
command
whoami command and who am i command are different 2 commands, the former is used to print the user name currently performing the operation, and the latter is used to print the user name logged in to the current Linux system.
In order to better distinguish the functions of these two commands, let me give you an example. We first log in to the Linux system using the user name "Cyuyan", and then execute the following command:
[Cyuyan@localhost ~]$ whoami Cyuyan [Cyuyan@localhost ~]$ who am i Cyuyan pts/0 2017-10-09 15:30 (:0.0)
On this basis, use the su command to switch to the root user and execute the above command again:
[Cyuyan@localhost ~] su - root [root@localhost ~]$ whoami root [root@localhost ~]$ who am i Cyuyan pts/0 2017-10-09 15:30 (:0.0)
See it? Before switching the user identity, the output of the whoami and who am i commands are the same. However, after using the su command to switch the user identity, the whoami command prints the user name after the switch, while the who am i command still prints the login. The username used by the system.
Executing the whoami command is equivalent to executing the id -un command; executing the who am i command is equivalent to executing the who -m command.
In other words, using the su or sudo command to switch user identities can fool whoami, but not who am i. To explain the operating mechanism behind this, we need to understand what an actual user (UID) and an effective user (EUID, that is, Effective UID) are.
The so-called actual user refers to the user used when logging in to the Linux system. Therefore, the actual user will not change during the entire login session; and the effective user refers to the user currently performing the operation. Users, that is to say, users who really determine the level of permissions, can use the su or sudo command to switch at will.
Generally, the actual user and the effective user are the same. If there is a user identity switch, they will be different. It should be noted that there is a difference between actual users and effective users, and switching users is not the only trigger mechanism. As for other trigger conditions, subsequent chapters will introduce them in detail.
So, in what scenarios are whoami and who am i usually used? Usually, for system administrators who often need to switch users, they often need to know what identity they are currently using; in addition, for some shell scripts that require a special user to execute, you need to use the whoami command. Know who is the user who executes it; there are even some shell scripts that must be executed by a special user, even if you use the su or sudo command to switch to this identity, you need to use who am i to confirm.
Related recommendations: "Linux Video Tutorial"
The above is the detailed content of How to check the current username in linux. For more information, please follow other related articles on the PHP Chinese website!

The core operations of Linux file system and process management include file system management and process control. 1) File system operations include creating, deleting, copying and moving files or directories, using commands such as mkdir, rmdir, cp and mv. 2) Process management involves starting, monitoring and killing processes, using commands such as ./my_script.sh&, top and kill.

Shell scripts are powerful tools for automated execution of commands in Linux systems. 1) The shell script executes commands line by line through the interpreter to process variable substitution and conditional judgment. 2) The basic usage includes backup operations, such as using the tar command to back up the directory. 3) Advanced usage involves the use of functions and case statements to manage services. 4) Debugging skills include using set-x to enable debugging mode and set-e to exit when the command fails. 5) Performance optimization is recommended to avoid subshells, use arrays and optimization loops.

Linux is a Unix-based multi-user, multi-tasking operating system that emphasizes simplicity, modularity and openness. Its core functions include: file system: organized in a tree structure, supports multiple file systems such as ext4, XFS, Btrfs, and use df-T to view file system types. Process management: View the process through the ps command, manage the process using PID, involving priority settings and signal processing. Network configuration: Flexible setting of IP addresses and managing network services, and use sudoipaddradd to configure IP. These features are applied in real-life operations through basic commands and advanced script automation, improving efficiency and reducing errors.

The methods to enter Linux maintenance mode include: 1. Edit the GRUB configuration file, add "single" or "1" parameters and update the GRUB configuration; 2. Edit the startup parameters in the GRUB menu, add "single" or "1". Exit maintenance mode only requires restarting the system. With these steps, you can quickly enter maintenance mode when needed and exit safely, ensuring system stability and security.

The core components of Linux include kernel, shell, file system, process management and memory management. 1) Kernel management system resources, 2) shell provides user interaction interface, 3) file system supports multiple formats, 4) Process management is implemented through system calls such as fork, and 5) memory management uses virtual memory technology.

The core components of the Linux system include the kernel, file system, and user space. 1. The kernel manages hardware resources and provides basic services. 2. The file system is responsible for data storage and organization. 3. Run user programs and services in the user space.

Maintenance mode is a special operating level entered in Linux systems through single-user mode or rescue mode, and is used for system maintenance and repair. 1. Enter maintenance mode and use the command "sudosystemctlisolaterscue.target". 2. In maintenance mode, you can check and repair the file system and use the command "fsck/dev/sda1". 3. Advanced usage includes resetting the root user password, mounting the file system in read and write mode and editing the password file.

Maintenance mode is used for system maintenance and repair, allowing administrators to work in a simplified environment. 1. System Repair: Repair corrupt file system and boot loader. 2. Password reset: reset the root user password. 3. Package management: Install, update or delete software packages. By modifying the GRUB configuration or entering maintenance mode with specific keys, you can safely exit after performing maintenance tasks.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

SublimeText3 Mac version
God-level code editing software (SublimeText3)

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),
