MySQL is a popular open source relational database management system commonly used to store and manage data. After installing MySQL, we need to set a root user password to protect the database security. This article will introduce how to add the MySQL root password, as well as specific code examples.
1. Use the MySQL secure initialization tool
MySQL provides a secure initialization toolmysql_secure_installation
, which can help us set the root password and other security configurations.
- Open the terminal and enter the following command to log in to the MySQL database:
mysql -u root -p
- Then enter the default password (if this is the first time you log in, you may not have a password).
- Next, execute the following command to start the security initialization tool:
sudo mysql_secure_installation
- Follow the prompts, including setting the root password, deleting anonymous users, disabling remote root login, etc.
2. Change the password directly in MySQL
If you do not use the security initialization tool, you can also change the root password directly in MySQL.
- Log in to MySQL through the terminal:
mysql -u root -p
- Use the following command to modify the password of the root user:
ALTER USER 'root'@'localhost' IDENTIFIED BY '新密码';
- Modify After completing the password, refresh the permissions to make the changes take effect:
FLUSH PRIVILEGES;
3. Add the root password in the MySQL configuration file
You can also add the root password directly in the MySQL configuration file, This way MySQL will automatically load the password when it starts.
- Open the MySQL configuration file (usually
/etc/mysql/my.cnf
or/etc/my.cnf
):
sudo nano /etc/mysql/my.cnf
- Add the following under the
[mysqld]
section:
[mysqld] skip-grant-tables
- Save and close the file, then restart the MySQL service:
sudo systemctl restart mysql
- Use the following command to log in to MySQL. At this time, you can directly access it as the root user without a password:
mysql -u root
- Change the root password:
ALTER USER 'root'@'localhost' IDENTIFIED BY '新密码';
- Delete the content added in the configuration file, save and close the file, and restart the MySQL service.
Summary
With the above method, we can easily add the MySQL root password to improve the security of the database. Whether you use a secure initialization tool, change the password directly in MySQL, or add a password in the configuration file, you can effectively protect the database from unauthorized access. Of course, when setting a password, you must ensure that the password is secure and complex to avoid being cracked.
The above is the detailed content of How to add MySQL root password?. For more information, please follow other related articles on the PHP Chinese website!

MySQLhandlesconcurrencyusingamixofrow-levelandtable-levellocking,primarilythroughInnoDB'srow-levellocking.ComparedtootherRDBMS,MySQL'sapproachisefficientformanyusecasesbutmayfacechallengeswithdeadlocksandlacksadvancedfeatureslikePostgreSQL'sSerializa

MySQLhandlestransactionseffectivelyusingtheInnoDBengine,supportingACIDpropertiessimilartoPostgreSQLandOracle.1)MySQLusesREPEATABLEREADasthedefaultisolationlevel,whichcanbeadjustedtoREADCOMMITTEDforhigh-trafficscenarios.2)Itoptimizesperformancewithabu

MySQLisbetterforspeedandsimplicity,suitableforwebapplications;PostgreSQLexcelsincomplexdatascenarioswithrobustfeatures.MySQLisidealforquickprojectsandread-heavytasks,whilePostgreSQLispreferredforapplicationsrequiringstrictdataintegrityandadvancedSQLf

MySQL processes data replication through three modes: asynchronous, semi-synchronous and group replication. 1) Asynchronous replication performance is high but data may be lost. 2) Semi-synchronous replication improves data security but increases latency. 3) Group replication supports multi-master replication and failover, suitable for high availability requirements.

The EXPLAIN statement can be used to analyze and improve SQL query performance. 1. Execute the EXPLAIN statement to view the query plan. 2. Analyze the output results, pay attention to access type, index usage and JOIN order. 3. Create or adjust indexes based on the analysis results, optimize JOIN operations, and avoid full table scanning to improve query efficiency.

Using mysqldump for logical backup and MySQLEnterpriseBackup for hot backup are effective ways to back up MySQL databases. 1. Use mysqldump to back up the database: mysqldump-uroot-pmydatabase>mydatabase_backup.sql. 2. Use MySQLEnterpriseBackup for hot backup: mysqlbackup--user=root-password=password--backup-dir=/path/to/backupbackup. When recovering, use the corresponding life

The main reasons for slow MySQL query include missing or improper use of indexes, query complexity, excessive data volume and insufficient hardware resources. Optimization suggestions include: 1. Create appropriate indexes; 2. Optimize query statements; 3. Use table partitioning technology; 4. Appropriately upgrade hardware.

MySQL view is a virtual table based on SQL query results and does not store data. 1) Views simplify complex queries, 2) Enhance data security, and 3) Maintain data consistency. Views are stored queries in databases that can be used like tables, but data is generated dynamically.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

SublimeText3 Chinese version
Chinese version, very easy to use

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
