hackaday.com Open in urlscan Pro
192.0.66.96  Public Scan

URL: https://hackaday.com/2014/05/28/interview-inventing-the-unix-sudo-command/
Submission: On June 07 via manual from IN — Scanned from DE

Form analysis 10 forms found in the DOM

GET https://hackaday.com/

<form role="search" method="get" class="search-form" action="https://hackaday.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

<form onsubmit="return false;" id="share-menu">
  <label>Title:</label>
  <div class="share-entry">
    <input type="text" id="article-title" readonly="true" value="Interview: Inventing The Unix “sudo” Command">
    <button id="copy-title">Copy</button>
  </div>
  <label>Short Link:</label>
  <div class="share-entry">
    <input type="text" id="article-link" readonly="true" value="https://hackaday.com/?p=123096">
    <button id="copy-link" onclick="">Copy</button>
  </div>
</form>

<form id="commentform" class="comment-form">
  <iframe title="Comment Form"
    src="https://jetpack.wordpress.com/jetpack-comment/?blogid=156670177&amp;postid=123096&amp;comment_registration=0&amp;require_name_email=1&amp;stc_enabled=1&amp;stb_enabled=1&amp;show_avatars=0&amp;avatar_default=mystery&amp;greeting=Leave+a+Reply&amp;jetpack_comments_nonce=2df0f44293&amp;greeting_reply=Leave+a+Reply+to+%25s&amp;color_scheme=dark&amp;lang=en_US&amp;jetpack_version=10.9&amp;show_cookie_consent=10&amp;has_cookie_consent=0&amp;token_key=%3Bnormal%3B&amp;sig=832f3916e801e034fffee4e489e10096816c2bc4#parent=https%3A%2F%2Fhackaday.com%2F2014%2F05%2F28%2Finterview-inventing-the-unix-sudo-command%2F"
    name="jetpack_remote_comment" style="width: 100%; height: 60px; border: 0px;" class="jetpack_remote_comment" id="jetpack_remote_comment" sandbox="allow-same-origin allow-top-navigation allow-scripts allow-forms allow-popups" scrolling="no">
  </iframe>
  <!--[if !IE]><!-->
  <script>
    document.addEventListener('DOMContentLoaded', function() {
      var commentForms = document.getElementsByClassName('jetpack_remote_comment');
      for (var i = 0; i < commentForms.length; i++) {
        commentForms[i].allowTransparency = false;
        commentForms[i].scrolling = 'no';
      }
    });
  </script>
  <!--<![endif]-->
</form>

GET https://hackaday.com/

<form role="search" method="get" class="search-form" action="https://hackaday.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Name: mc-embedded-subscribe-formPOST //hackaday.us11.list-manage.com/subscribe/post?u=80fc49ec84df168e48c00c18a&id=a428253bfe

<form role="subscribe" action="//hackaday.us11.list-manage.com/subscribe/post?u=80fc49ec84df168e48c00c18a&amp;id=a428253bfe" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="subscribe-form validate"
  target="_blank" novalidate="">
  <div id="mc_embed_signup_scroll">
    <label for="mce-EMAIL">
      <input type="email" value="" name="EMAIL" class="subscribe-field" placeholder="Enter Email Address" id="mce-EMAIL" required="">
    </label>
    <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->
    <div style="position: absolute; left: -5000px;"><input type="text" name="b_80fc49ec84df168e48c00c18a_a428253bfe" tabindex="-1" value=""></div>
    <input type="submit" class="subscribe-submit" id="mc-embedded-subscribe" value="Subscribe">
  </div>
</form>

GET https://hackaday.com/

<form role="search" method="get" class="search-form" action="https://hackaday.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Name: mc-embedded-subscribe-formPOST //hackaday.us11.list-manage.com/subscribe/post?u=80fc49ec84df168e48c00c18a&id=a428253bfe

<form role="subscribe" action="//hackaday.us11.list-manage.com/subscribe/post?u=80fc49ec84df168e48c00c18a&amp;id=a428253bfe" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="subscribe-form validate"
  target="_blank" novalidate="">
  <div id="mc_embed_signup_scroll">
    <label for="mce-EMAIL">
      <input type="email" value="" name="EMAIL" class="subscribe-field" placeholder="Enter Email Address" id="mce-EMAIL" required="">
    </label>
    <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->
    <div style="position: absolute; left: -5000px;"><input type="text" name="b_80fc49ec84df168e48c00c18a_a428253bfe" tabindex="-1" value=""></div>
    <input type="submit" class="subscribe-submit" id="mc-embedded-subscribe" value="Subscribe">
  </div>
</form>

GET https://hackaday.com

<form action="https://hackaday.com" method="get"><label class="screen-reader-text" for="cat">Categories</label><select name="cat" id="cat" class="postform">
    <option value="-1">Select Category</option>
    <option class="level-0" value="114554125">3d Printer hacks</option>
    <option class="level-0" value="18020710">Android Hacks</option>
    <option class="level-0" value="18020705">Arduino Hacks</option>
    <option class="level-0" value="27981650">ARM</option>
    <option class="level-0" value="422579952">Art</option>
    <option class="level-0" value="422589899">Artificial Intelligence</option>
    <option class="level-0" value="422573560">Ask Hackaday</option>
    <option class="level-0" value="64298109">ATtiny Hacks</option>
    <option class="level-0" value="422590491">Battery Hacks</option>
    <option class="level-0" value="25122024">Beer Hacks</option>
    <option class="level-0" value="422577767">Biography</option>
    <option class="level-0" value="12115263">blackberry hacks</option>
    <option class="level-0" value="422570206">Business</option>
    <option class="level-0" value="422573558">car hacks</option>
    <option class="level-0" value="11894719">Cellphone Hacks</option>
    <option class="level-0" value="35745764">chemistry hacks</option>
    <option class="level-0" value="422573559">classic hacks</option>
    <option class="level-0" value="31677810">clock hacks</option>
    <option class="level-0" value="18755632">cnc hacks</option>
    <option class="level-0" value="568165">computer hacks</option>
    <option class="level-0" value="422573570">cons</option>
    <option class="level-0" value="5738">contests</option>
    <option class="level-0" value="422573551">cooking hacks</option>
    <option class="level-0" value="2588813">Crowd Funding</option>
    <option class="level-0" value="421976847">Curated</option>
    <option class="level-0" value="422570209">Current Events</option>
    <option class="level-0" value="422590009">Cyberdecks</option>
    <option class="level-0" value="10969032">digital audio hacks</option>
    <option class="level-0" value="10969033">digital cameras hacks</option>
    <option class="level-0" value="10969034">downloads hacks</option>
    <option class="level-0" value="107827385">drone hacks</option>
    <option class="level-0" value="63176382">Engine Hacks</option>
    <option class="level-0" value="422570207">Engineering</option>
    <option class="level-0" value="212825112">Fail of the Week</option>
    <option class="level-0" value="35890">Featured</option>
    <option class="level-0" value="422570208">Fiction</option>
    <option class="level-0" value="551890">firefox hacks</option>
    <option class="level-0" value="53446541">FPGA</option>
    <option class="level-0" value="18020562">g1 hacks</option>
    <option class="level-0" value="422578065">Games</option>
    <option class="level-0" value="320557">google hacks</option>
    <option class="level-0" value="10969036">gps hacks</option>
    <option class="level-0" value="24535490">green hacks</option>
    <option class="level-0" value="190105353">Hackaday Columns</option>
    <option class="level-0" value="27311668">Hackaday links</option>
    <option class="level-0" value="289711781">Hackaday Store</option>
    <option class="level-0" value="21755374">Hackerspaces</option>
    <option class="level-0" value="422573553">HackIt</option>
    <option class="level-0" value="10969037">handhelds hacks</option>
    <option class="level-0" value="422573549">hardware</option>
    <option class="level-0" value="422590036">High Voltage</option>
    <option class="level-0" value="421979219">History</option>
    <option class="level-0" value="66307084">Holiday Hacks</option>
    <option class="level-0" value="10969038">home entertainment hacks</option>
    <option class="level-0" value="5660882">home hacks</option>
    <option class="level-0" value="422573566">how-to</option>
    <option class="level-0" value="422570204">Interest</option>
    <option class="level-0" value="908478">internet hacks</option>
    <option class="level-0" value="831">Interviews</option>
    <option class="level-0" value="1416772">iphone hacks</option>
    <option class="level-0" value="1275163">ipod hacks</option>
    <option class="level-0" value="4157506">Kindle hacks</option>
    <option class="level-0" value="46717088">Kinect hacks</option>
    <option class="level-0" value="10969048">laptops hacks</option>
    <option class="level-0" value="422573554">Laser Hacks</option>
    <option class="level-0" value="422573557">LED Hacks</option>
    <option class="level-0" value="422573568">Lifehacks</option>
    <option class="level-0" value="729674">Linux Hacks</option>
    <option class="level-0" value="20732807">lockpicking hacks</option>
    <option class="level-0" value="10969060">Mac Hacks</option>
    <option class="level-0" value="422582715">Machine Learning</option>
    <option class="level-0" value="422573573">Major Tom</option>
    <option class="level-0" value="11284667">Medical Hacks</option>
    <option class="level-0" value="139916">Microcontrollers</option>
    <option class="level-0" value="5611793">Misc Hacks</option>
    <option class="level-0" value="18020730">Multitouch Hacks</option>
    <option class="level-0" value="22652725">Musical Hacks</option>
    <option class="level-0" value="18020722">Netbook Hacks</option>
    <option class="level-0" value="6166512">Network Hacks</option>
    <option class="level-0" value="103">News</option>
    <option class="level-0" value="1861880">Nintendo DS Hacks</option>
    <option class="level-0" value="114555425">Nintendo Game Boy Hacks</option>
    <option class="level-0" value="18020685">Nintendo Hacks</option>
    <option class="level-0" value="422573552">Nintendo Wii Hacks</option>
    <option class="level-0" value="118011206">Nook Hacks</option>
    <option class="level-0" value="422570205">Original Art</option>
    <option class="level-0" value="114556430">Palm Pre Hacks</option>
    <option class="level-0" value="422573571">Parts</option>
    <option class="level-0" value="10969081">Peripherals Hacks</option>
    <option class="level-0" value="16325149">Phone Hacks</option>
    <option class="level-0" value="10969088">Playstation Hacks</option>
    <option class="level-0" value="2060">Podcasts</option>
    <option class="level-0" value="10969096">Portable Audio Hacks</option>
    <option class="level-0" value="10969099">Portable Video Hacks</option>
    <option class="level-0" value="588444">PSP Hacks</option>
    <option class="level-0" value="23971578">Radio Hacks</option>
    <option class="level-0" value="47">Rants</option>
    <option class="level-0" value="69218551">Raspberry Pi</option>
    <option class="level-0" value="21870780">Repair Hacks</option>
    <option class="level-0" value="422578063">Retrocomputing</option>
    <option class="level-0" value="212824350">Retrotechtacular</option>
    <option class="level-0" value="422590062">Reverse Engineering</option>
    <option class="level-0" value="422573565">Reviews</option>
    <option class="level-0" value="10969101">Robots Hacks</option>
    <option class="level-0" value="422573563">Roundup</option>
    <option class="level-0" value="422578013">Science</option>
    <option class="level-0" value="10969111">Security Hacks</option>
    <option class="level-0" value="422570203">Skills</option>
    <option class="level-0" value="422573572">Slider</option>
    <option class="level-0" value="2301">Software Development</option>
    <option class="level-0" value="3796421">Software Hacks</option>
    <option class="level-0" value="10969116">Solar Hacks</option>
    <option class="level-0" value="422577709">Space</option>
    <option class="level-0" value="10969121">Tablet Hacks</option>
    <option class="level-0" value="3075183">Teardown</option>
    <option class="level-0" value="12936984">Tech Hacks</option>
    <option class="level-0" value="227104736">The Hackaday Prize</option>
    <option class="level-0" value="10969130">Tool Hacks</option>
    <option class="level-0" value="25277004">Toy Hacks</option>
    <option class="level-0" value="10969134">Transportation Hacks</option>
    <option class="level-0" value="1">Uncategorized</option>
    <option class="level-0" value="422573556">Video Hacks</option>
    <option class="level-0" value="34942364">Virtual Reality</option>
    <option class="level-0" value="50802420">Weapons Hacks</option>
    <option class="level-0" value="12552193">Wearable Hacks</option>
    <option class="level-0" value="39510952">Weekly Roundup</option>
    <option class="level-0" value="4891215">Wireless Hacks</option>
    <option class="level-0" value="7079455">Xbox Hacks</option>
  </select>
</form>

Name: mc-embedded-subscribe-formPOST //hackaday.us11.list-manage.com/subscribe/post?u=80fc49ec84df168e48c00c18a&id=a428253bfe

<form role="subscribe" action="//hackaday.us11.list-manage.com/subscribe/post?u=80fc49ec84df168e48c00c18a&amp;id=a428253bfe" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="subscribe-form validate"
  target="_blank" novalidate="">
  <div id="mc_embed_signup_scroll">
    <label for="mce-EMAIL">
      <input type="email" value="" name="EMAIL" class="subscribe-field" placeholder="Enter Email Address" id="mce-EMAIL" required="">
    </label>
    <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->
    <div style="position: absolute; left: -5000px;"><input type="text" name="b_80fc49ec84df168e48c00c18a_a428253bfe" tabindex="-1" value=""></div>
    <input type="submit" class="subscribe-submit" id="mc-embedded-subscribe" value="Subscribe">
  </div>
</form>

<form id="jp-carousel-comment-form">
  <label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
  <textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
  <div id="jp-carousel-comment-form-submit-and-info-wrapper">
    <div id="jp-carousel-comment-form-commenting-as">
      <fieldset>
        <label for="jp-carousel-comment-form-email-field">Email (Required)</label>
        <input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-author-field">Name (Required)</label>
        <input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-url-field">Website</label>
        <input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
      </fieldset>
    </div>
    <input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment">
  </div>
</form>

Text Content

Skip to content


HACKADAY

Primary Menu
 * Home
 * Blog
 * Hackaday.io
 * Tindie
 * Hackaday Prize
 * Submit
 * About
 * Search for:

June 7, 2022


INTERVIEW: INVENTING THE UNIX “SUDO” COMMAND

114 Comments
 * by:
   Aleksandar Bradic

May 28, 2014
 * 
 * 
 * 
 * 
 * 

Title:
Copy
Short Link:
Copy


It was just one of these nights. We were sitting at the O’Neil’s San Mateo Pub,
taking a break after a long day at the Maker Faire. Hackaday was hosting an
informal drink-up and a steady stream of colorful characters has just started
flowing in. That’s when we met [Robert Coggeshall].



[xkcd, 149]It started off as a normal discussion – he runs Small Batch
Assembly and does a lot of interesting things in the maker space. Then he
brought up a fascinating detail – “Oh, did you know I also co-invented sudo back
in the 80’s?”



If you ever did as much as touch a Unix system, you’ll know this is a big deal.
What came as an even bigger surprise was that something like sudo had to be
“invented” in the first place. When thinking about the base Unix toolkit, there
is always this feeling that it all emerged from some primordial soup of ideas
deep inside of Bell Labs, brought to life by the infinite wisdom of [Ken
Thompson] and the rest of the gang. Turns out that wasn’t always the case. We
couldn’t miss asking [Bob] for an interview, and he told us how it all came
about…



THE HACK

The story itself is a fairly common one – it starts with a problem and ends with
a hack. [Bob] and his colleague [Cliff Spencer] were working at SUNY/Buffalo at
the time, and [Bob] was in charge of administration of their Unix
infrastructure. Since Unix was a multiuser system from the very beginnings,
being a sysadmin meant executing a lot of commands as a superuser. The standard
way of doing so was using the “su” command, which enabled user to switch to a
superuser mode. While this generally did the trick, it opened a lot of
opportunities for human error – it was just too easy to forget you’re in a
“root” mode and end up causing inadvertent damage to the system. [Bob] and
[Cliff] thought of a better way – instead of constantly switching, why not
simply create a tool that enables executing individual commands as a superuser,
without changing the actual user id in the shell. They quickly whipped up a hack
that combined two standard Posix system calls – setuid() and execvp() in order
to achieve such functionality. The command was named “sudo“, short for
superuser-do ([Bob] insists that correct pronunciation is /ˈsuːduː/, not
/ˈsuːdoʊ/).

GOING OPEN SOURCE

After proving to be an indispensable tool in the sysadmin arsenal at SUNY, sudo
slowly began to make its way into other research groups and was formally “open
sourced” in 1985. In those days Open Source was not yet all the rage (Richard
Stallman had just come out with his GNU Manifesto the same year), so the act of
“open sourcing” essentially meant posting the source code on the Usenet. And on
December 15th, 1985 that’s what they did. [Bob] helped us track down
the original message posted to the net.sources group.

THERE BE TROLLS

Another fascinating historical artifact that can be found in the
thread following the original post is an early example of the Internet Troll
species:

--
isn't this the same as saying:
su -f root -c "some commands here"

why reinvent the wheel? plus this doens't have to be recompiled when
there is a new root passwd.

i find that most unix programs get written again and again and again,
when the one you wanted was already there in the first place.

tom
--


Though it is true that sudo didn’t invent anything fundamentally new, it did
something better – it provided an efficient solution to a real problem. And
because [Bob] and [Cliff] cared enough to share it with the world, other people
happily adopted it and continued to improve. Today sudo counts 9944 lines of
code (up from 153 lines in the original release) and is maintained by [Todd C.
Miller]. Over 30 years in age, it still continues to receive code contributions
and regularly issues new releases.

 

 * 
 * 
 * 
 * 

Posted in Featured, Interviews, Linux HacksTagged bob coggeshall, sudo


POST NAVIGATION

← OpenExposer, The DIY SLA Printer
Sense & Spray Air Freshener Says Cheese →



114 THOUGHTS ON “INTERVIEW: INVENTING THE UNIX “SUDO” COMMAND”

 1.  demon256 says:
     May 28, 2014 at 10:04 am
     
     “[Bob] insists that correct pronunciation is /ˈsuːduː/, not /ˈsuːdoʊ/”
     
     Seriously ? This crap again ? This is on the same level as “nerd vs geek”,
     and the only people who give a toss about it don’t belong in either group.
     
     Nitpicking about the pronunciation of a command is ridiculous.
     
     Aside from that, an interesting interview. :)
     
     Report comment
     Reply
     1. cb88 says:
        May 28, 2014 at 10:15 am
        
        I think the pronunciation is fairly obvious… anyone pronouncing it with
        the same ending as Pseudo is trippin’
        
        sudo actually makes less sense know than the 80’s since we have more
        things to remind us of if the console we are interacting with is root or
        not… (window titles, color consoles etc.. )
        
        Report comment
        Reply
        1. David Kuder says:
           May 28, 2014 at 4:37 pm
           
           The intent isn’t just to remind you that you are performing
           operations as root, but to act as a gate keeper to determine who can
           do what as root. It is far easier to remove a person from the sudoers
           file than to change the root password and notify 30 people of the
           change. Just because Tim needs the ability to execute shutdown /
           reboot commands on the financials server doesn’t mean he should have
           the ability to impersonate Jill and use her credentials to change his
           wages in the payroll database…
           
           Report comment
           Reply
           1. Carlos W says:
              May 28, 2014 at 5:28 pm
              
              “sudo bash” and you are root for all purposes. Then you can
              impersonate Jill.
              
              Report comment
              Reply
              1. Paul says:
                 May 28, 2014 at 5:52 pm
                 
                 Apparently you do not understand what sudo does and how to
                 properly configure it.
                 
                 A properly configured sudoers file will allow you to not only
                 control WHO can user it, but also WHAT they can do. This is why
                 su and sudo are NOT the same thing anymore (maybe back in 1985
                 they kinda were, but that is no longer the case and has been
                 for some time).
                 
                 You don’t simply say “these people can use sudo and can do
                 anything root does.”
                 
                 Though you can, it’s poor practice. You can group people and
                 limit the commands they can run so that someone cannot simply
                 run “sudo bash” and poof they become full superuser.
                 
                 Report comment
                 
              2. kaidenshi says:
                 May 28, 2014 at 7:21 pm
                 
                 Or just “sudo su”, like so many command line tutorials around
                 the web insist on, even though it really only makes sense on
                 distros like Ubuntu that have the root account disabled by
                 default.
                 
                 Report comment
                 
              3. rewolff says:
                 May 29, 2014 at 3:48 am
                 
                 I’m replying to the replies to this, not to your post. But the
                 reply button on those replies is absent.
                 
                 The thing is that privileged commands are usually privileged
                 for a reason. Once you have the permission to run one command
                 as root, it is usually trivial to leverage that permission to
                 full root access.
                 
                 This is partly because the commands you’ll be having permission
                 for are (apparently) not setuid-root. So they are not scanned
                 for “the usual suspects”.
                 
                 A slightly “too trivial” example that everybody will
                 understand: Suppose we want to allow Jill to edit
                 /etc/resolv.conf because she does networking stuff. So you
                 allow jill to run sudo vi /etc/resolv.conf. You specify the
                 argument to “vi” so she wont “sudo vi /etc/passwd” to change
                 her UID into the number 0. But once in vi /etc/resolv.conf she
                 can :e /etc/passwd and read/modify/write the passwd file. All
                 functionality builtin, no bugs required. Just published
                 behaviour.
                 
                 Report comment
                 
              4. gabriel says:
                 May 30, 2014 at 11:30 am
                 
                 sudo is way ahead of you. `sudo -s` or `sudo -s john`
                 
                 Report comment
                 
              
           
        
     2. Mike Szczys says:
        May 28, 2014 at 10:19 am
        
        Watch the video interview. He mentions that he doesn’t care how *you*
        say it. But he believes the way he says it is correct.
        
        Report comment
        Reply
        1. demon256 says:
           May 28, 2014 at 10:43 am
           
           Of course he says that. Because he has no control over how others say
           it. But bringing it up alone is idiotic.
           
           Report comment
           Reply
           1. Alex says:
              May 28, 2014 at 10:52 am
              
              You seem to care about it a lot more than he does.
              
              Report comment
              Reply
              
           2. Eirinn says:
              May 28, 2014 at 12:11 pm
              
              Since he co-invented it he pretty much gets to name it. I could
              call you Daemon256isha because i think it sounds fancier, but that
              doesn’t make it right does it now?
              
              Report comment
              Reply
              1. GZ says:
                 May 28, 2014 at 2:05 pm
                 
                 Don’t make fun of Dalmatian256 like that.
                 
                 Report comment
                 
              2. SavannahLion says:
                 May 28, 2014 at 6:25 pm
                 
                 I pronounce it differently, but to type it here would probably
                 result in a ban
                 
                 Report comment
                 
              
           
        2. kaidenshi says:
           May 28, 2014 at 7:26 pm
           
           I was shocked to realize that I actually have been pronouncing it the
           way the creator intended all this time. I don’t usually do that; for
           example, I pronounce SATA as “ess ay tee ay” (i.e. spelled out),
           instead of “SAT-ah” like most people in the tech world. “SAT-ah” just
           sounds silly to my ears, much like “scuzzy” for SCSI did back in the
           day.
           
           Report comment
           Reply
           1. phnx says:
              May 29, 2014 at 3:50 am
              
              Oddly I say ‘scuzzy’ but am militantly against ‘saytah’ (SATA) and
              ‘gooey’ (GUI).
              
              Report comment
              Reply
              
           2. cb88 says:
              May 29, 2014 at 10:04 am
              
              Don’t forget the precursor to SCSI … SASI :D … who wouldn’t want a
              sassy computer bus :P
              
              Report comment
              Reply
              
           
        
     3. Brian Benchoff says:
        May 28, 2014 at 10:50 am
        
        .gif is pronounced with a hard g, despite what the creator of the format
        says.
        
        Report comment
        Reply
        1. Ben says:
           May 28, 2014 at 11:04 am
           
           Apparently Larry Boucher intended SCSI to be pronounced “sexy”. That
           didn’t work out either.
           
           Report comment
           Reply
           1. Torque says:
              May 28, 2014 at 2:32 pm
              
              “I’m SCSI and I know it”…..
              
              Report comment
              Reply
              
           2. JRDM says:
              May 28, 2014 at 2:37 pm
              
              I’m totally unaware of that one. I can see it, but I wonder if it
              was dropped for being a bit less appropriate.
              
              Report comment
              Reply
              
           3. Tom says:
              May 28, 2014 at 3:13 pm
              
              You’re supposed to pronounce it as an Italian apology now, right?
              
              Report comment
              Reply
              1. Spork says:
                 May 28, 2014 at 6:32 pm
                 
                 @Tom, I skull your comment.
                 
                 Cool interview. Seems obvious now that you would want a sudo
                 command and Microsoft even tried to get on board (kinda) with
                 UAC. Still, it’s this type of “invention” that causes a
                 paradigm shift. When I learned Linux, I always set up sudoers
                 and use sudo rather than su.
                 
                 Report comment
                 
              2. Greenaum says:
                 May 29, 2014 at 11:47 am
                 
                 We didn’t (AFAIK) have it on the System V, Honeywell Bull mini
                 we had in the early 90s at college. Wyse 60 serial terminals,
                 oooh! So I dunno how popular it was and why our system didn’t
                 have it. The students spent half our time hacking the thing and
                 finding out interesting stuff to do, so sure we’d have seen it
                 under “su” in the ls -la.
                 
                 Report comment
                 
              3. Greenaum says:
                 May 29, 2014 at 1:27 pm
                 
                 Oh, I see I mentioned that the other day, pardon me. Doesn’t
                 take much excuse to get me going on about those terminals tho,
                 they were LOVELY! Stil want one to run off a serial port now.
                 On Ebay they’re not cheap.
                 
                 Ironically you can get the “thin client” stuff Wyse (and
                 everyone else) made later in the 1990s / 2000s, for almost
                 giveaway prices. $30 or so for a “thin client” from the stupid
                 “let’s push thin clients on everbody (but make sure they run
                 Intel and Windows)” fad of a few years ago. Real, proper 8-bit
                 serial terminals still go for well over $100.
                 
                 Report comment
                 
              
           4. Kristian says:
              May 28, 2014 at 11:16 pm
              
              I think Mike might have had the same idea when he made his last
              name Szczys ;)
              
              Report comment
              Reply
              
           
        2. Jason says:
           May 28, 2014 at 11:37 am
           
           Amen!
           
           Report comment
           Reply
           
        3. Greenaum says:
           May 28, 2014 at 1:28 pm
           
           “G” for “graphics”. Obvious!
           
           Report comment
           Reply
           
        
     
 2.  John says:
     May 28, 2014 at 10:06 am
     
     Hmm, was hoping that this article may give me some idea of “why” but even
     after 20 years of using only Linux that still evades me. Perhaps never
     using it is my problem.
     
     Report comment
     Reply
     1. demon256 says:
        May 28, 2014 at 10:08 am
        
        “While this generally did the trick, it opened a lot of opportunities
        for human error – it was just too easy to forget you’re in a “root” mode
        and end up causing inadvertent damage to the system.”
        
        I believe that answers your question. :P
        
        Report comment
        Reply
        1. John says:
           May 28, 2014 at 10:11 am
           
           Sadly no. What does more damage, configuring under root and giving no
           one the password, letting users do what they need to and if they
           can’t they ask you or giving them the ability to run commands that
           they shoudn’t?
           
           Sudo is installed by default on all distributions that I know so
           removing it is just another thing you have to do before you can let
           Billy Moron loose on the machine.
           
           Report comment
           Reply
           1. John says:
              May 28, 2014 at 10:14 am
              
              I now have to spend eternity looking at lose instead of loose, I
              hate not being able to edit posts. :)
              
              Report comment
              Reply
              1. Mike Szczys says:
                 May 28, 2014 at 10:20 am
                 
                 I got your back… fixed.
                 
                 Report comment
                 
              2. brett says:
                 May 28, 2014 at 12:23 pm
                 
                 I think both versions work, don’t they? :)
                 
                 Report comment
                 
              3. ng says:
                 May 28, 2014 at 10:21 pm
                 
                 @Mike
                 
                 Yay!
                 
                 Report comment
                 
              
           2. Jonathan says:
              May 28, 2014 at 10:17 am
              
              What distributions let any user run sudo by default? None that
              I’ve used, excluding the first/only account created by default in
              ubuntu. All subsequent users are blocked from sudo.
              
              Report comment
              Reply
              1. John says:
                 May 28, 2014 at 10:22 am
                 
                 But that one is enough if you are sticking a one user system on
                 a laptop for someone and I would think that is the most common
                 system installed by the masses. I am sure I am wrong here,
                 because I cannot believe so many people use it and think it is
                 good. I tend to believe that if you f*** up then you are to
                 blame and if I do something stupid as the root user then I will
                 accept the consequences, there is nothing quite like giving
                 yourself several days extra work for teaching you to be
                 careful. :)
                 
                 Report comment
                 
              2. Greenaum says:
                 May 28, 2014 at 1:43 pm
                 
                 I think the idea is, that an admin, which nowadays since
                 desktop Unix (ie Linux) has arrived, is often the sole user,
                 can spend most of his time in user mode. Even if you own the
                 machine, spending all day as root means you can make bigger
                 mistakes, while not giving any real advantages.
                 
                 So the single user can spend all day as a user, where his
                 machine is protected from many mistakes he might make, or
                 anything that’s invaded his user account. But since he’s the
                 sole user he also needs to tweak and administrate things.
                 Instead of making him log out and back in again, for just one
                 or two jobs, he can use sudo. Sudo checks he’s allowed to use
                 it, and does whatever important system job while the guy can
                 still stay in his nice safe user account all day.
                 
                 Unix wasn’t designed, CMIIW, to be used in root mode all day.
                 The root account is only for adminning the system, not normal
                 user-type tasks. Sudo’s just a shortcut. The sort of thing that
                 starts off as a shell-script and ends up growing into a system
                 tool.
                 
                 Personally we didn’t have it on the Unix I learned on, with
                 Wyse green-screen terminals and all, and we didn’t miss it. If
                 you’ve no need for it on your system you can always delete it.
                 But security-wise, being able to isolate specific tasks to
                 root-land, is much safer than spending all day there exposing
                 the system to bugs and threats, running your ordinary software
                 as root needlessly.
                 
                 Which is a problem Microsoft eventually got around to looking
                 at. Maybe they’ll have a go at doing it properly some version
                 number / year / Spanish word / version number in the future.
                 
                 Report comment
                 
              
           3. Ast says:
              May 28, 2014 at 10:19 am
              
              That’s what the sudoers file is for. Usually only users in an
              admin-group can use sudo. Regular users cannot. So if you setup a
              computer for your friend Billy Moron, jsut make sure he is a
              regular, unprivileged user.
              
              Report comment
              Reply
              
           4. what says:
              May 28, 2014 at 10:26 am
              
              “billy moron” can’t run programs they shouldn’t if they don’t have
              the root password. that’s the point. sudo requires you to enter
              the root password to run programs with root permissions.
              
              Report comment
              Reply
              1. Jerry says:
                 May 28, 2014 at 11:10 am
                 
                 No – if you had the root password you could login as root…or su
                 to root.
                 
                 Sudo provides the setting to allow certain users access to run
                 certain commands with root permissions. The password sudo asks
                 you for is your password, not the root password.
                 
                 Report comment
                 
              
           
        
     2. David Carrier says:
        May 28, 2014 at 12:31 pm
        
        I never understood it either. The only time I ever use it is to do this
        once on systems that don’t have a root password by default:
        
        sudo passwd
        
        From then on, I just use su. I cannot think of any time that I’ve wanted
        to run exactly one command as root.
        
        Report comment
        Reply
        1. daler says:
           May 28, 2014 at 2:06 pm
           
           sudo apt-get install pacman4console
           
           Report comment
           Reply
           
        
     3. thoriumbr says:
        May 28, 2014 at 1:52 pm
        
        The problem is that you are looking at the wrong problem:
        – Your problem is manage a system with only one user: you. You have the
        root password, you can do anything, can blow up the system, and nobody
        cares.
        – His problem is how to manage a system with N users (where N > 10,
        probably N > 100), and make sure that some authorized users could run a
        few privileged commands, without giving the root password for all of
        them. Changing the root password would need to tell the password to
        every trusted user. If someone changes the password and forgets it,
        everyone is locked out unless there’s a backdoor somewhere, and
        backdoors are a terrible thing to plant on a system.
        
        I am a sysadmin, and we have LOTS of users. Some of them are devs, they
        create a poorly designed and poorly tested application on our servers,
        and the server crawls like a crippled tortoise. This happens a lot
        because they tested on an environment with only one user (the dev), and
        thinks it will behave the same once a hundred thousand users connect at
        the same time.
        
        su -c asks for the root password, the master key. sudo asks for the user
        password, the ordinary key, and only trusted users can run trusted
        commands.
        
        If you think sudo is useless, you are thinking just like my devs…
        
        Report comment
        Reply
        
     
 3.  cantido says:
     May 28, 2014 at 10:34 am
     
     >the thread following the original post is an early example of the Internet
     Troll species:
     
     Pointing out valid information has only been “trolling” since the “don’t be
     rude to me or I’ll tell my dad on you” generation of cry babies have taken
     over the internet.
     
     Report comment
     Reply
     1. WJCarpenter says:
        May 28, 2014 at 10:54 am
        
        I agree with cantldo. It’s not trolling if you are asking a legitimate
        question, which that was.
        
        (OK, a confession. I just read the article and didn’t watch the video.
        But…) The clearest benefit to me of sudo is that you don’t have to give
        out a single root password to N entitled people. Each uses his/her own
        password with sudo. The whole world of superuser password management
        gets simplified by an order of magnitude. That obviously doesn’t matter
        much for a single-user system, but it goes up an N**2 for shops with
        many admins.
        
        Report comment
        Reply
        1. Trui says:
           May 28, 2014 at 12:30 pm
           
           Of course, now every user that is allowed to use sudo essentially
           becomes a superuser, and needs to have his personal password managed
           as if it was a superuser password.
           
           Report comment
           Reply
           1. JimmyNeutron111 says:
              May 28, 2014 at 3:52 pm
              
              Yes, but only because that’s how everyone should treat their own
              password(s) anyway.
              
              If, using your (implied) logic, there are varying degrees of
              acceptable password management which depend on how much access an
              account garners the beholder, then I would have to say *No*, as
              sudoers could have varied access and would only be considered
              “superusers” for the allowed commands associated with their
              individual account.
              
              Report comment
              Reply
              
           2. notmyfault2000 says:
              May 28, 2014 at 5:43 pm
              
              And if someone transfers to a department that no longer needs
              superuser access, you can just remove them from the list of people
              that can sudo.
              
              Were you handing out the root password to everyone, you’d have to
              update the password, tell everyone that needs to know, and either
              hope the removed person doesn’t ask someone for the new password
              or very publicly broadcast to everyone that so-and-so no longer
              has access to the system’s superuser. And hope the person they ask
              remembers they no longer have that access.
              
              (also misclicked report comment, meant to reply)
              
              Report comment
              Reply
              1. Trui says:
                 May 28, 2014 at 9:59 pm
                 
                 If you can’t trust a person, it is very dangerous to give them
                 sudo access in the first place, as they can use it to create a
                 back door for themselves later.
                 
                 Report comment
                 
              
           3. eldorel says:
              May 28, 2014 at 11:58 pm
              
              Sudo can be configured to give a user full root privileges, (which
              is the default for the first user created in Ubuntu).
              
              However, it is designed to allow restricted access to specific
              commands.
              
              For example, one of my devs has access to Mount as rsu, but no
              other commands.
              
              Report comment
              Reply
              1. Trui says:
                 May 29, 2014 at 4:29 am
                 
                 What is ‘rsu’ ?
                 
                 access to mount can be quickly elevated to complete root
                 access.
                 
                 Report comment
                 
              
           
        
     2. meanie says:
        May 28, 2014 at 11:28 am
        
        Man a thousand times this. I haven’t seen a legitimate troll in years,
        its usually you disagree and I don’t like it so your a troll go away.
        
        Report comment
        Reply
        
     3. Blue Footed Booby says:
        May 29, 2014 at 5:33 am
        
        @cantido
        I like that you pretend this is some kind of new development and not an
        age-old problem with managing people. Like, if you can’t think of a
        single historical case of some powerful individual who doomed
        him/herself buy building a hug-box of yes-men then I don’t know what to
        tell you.
        
        Report comment
        Reply
        
     4. Duwogg says:
        June 3, 2014 at 9:29 am
        
        TRUE!!! Any critial comment these days gets twisted to trolling by
        whiney asses these days.Your work will be judged by others should it see
        the light of day, and god forbid someone might know something you don’t
        and maybe a better way of doing something. But if tyou don’t word things
        for a 4 year old who just lost their puppy, look out! you’ll get labled
        a troll and tossed under a bridge somewhere.
        
        Report comment
        Reply
        
     
 4.  JRDM says:
     May 28, 2014 at 10:47 am
     
     “It’s the same as typing a longer command” <- by people that prefer to type
     more, rather than less, I guess.
     
     I suppose the most basic functionality could be done as a bash alias.
     
     Report comment
     Reply
     1. cantido says:
        May 28, 2014 at 10:55 am
        
        su -c cat /dev/urandom > /dev/sda
        sudo cat /dev/urandom > /dev/sda
        
        Report comment
        Reply
        1. JRDM says:
           May 28, 2014 at 11:10 am
           
           Then ” -f root” as in the post isn’t necessary?
           
           Report comment
           Reply
           
        2. steven says:
           May 28, 2014 at 11:18 am
           
           Sure, those commands don’t differ much in typing effort but they
           require different passwords to make happen. If you are the main user
           and root, it probably doesn’t matter one bit. I administer systems
           with multiple non-privileged users and a couple of privileged ones.
           It is MUCH nicer and easier to manage to use sudo and not have a
           single root password passing through multiple hands. As for Billy
           Moron, when I set up a system for friends or family that first,
           default privileged user is set up for me (to handle sysadmin tasks
           that they will INEVITABLY come to ask about). The last step in my
           setup is to make a non-privileged account for the person I’m building
           the system for. If they get to understand their system, I can simply
           add them to /etc/sudoers later.
           
           Report comment
           Reply
           
        3. Jerry says:
           May 28, 2014 at 11:21 am
           
           but it’s not the same – users don’t require the root password, and
           they can be restricted to running only certain commands with root
           priveleges, not all commands.
           
           Furthermore the sudo logs this access and commands run – with su,
           you’d only have the ‘login’ logged.
           
           Report comment
           Reply
           
        4. David Kuder says:
           May 28, 2014 at 4:46 pm
           
           shame that neither of those will work, as the redirection takes place
           in the user’s permission context, not the superuser’s. you need to
           quote the redirection for it to be performed by the superuser shell.
           
           Report comment
           Reply
           1. cantido says:
              May 28, 2014 at 6:33 pm
              
              That’s true. But even with the quotes they would be the same
              length and that’s the point I was making. If the length of stuff
              you have to type is the only reason sudo exists then it would be
              pretty pointless.
              
              Report comment
              Reply
              1. JRDM says:
                 May 28, 2014 at 8:03 pm
                 
                 I’m still not convinced your point is valid, given the line
                 shown in the article. But hey, if you’re going to congratulate
                 yourself without bothering to respond to questions, there you
                 go.
                 
                 Report comment
                 
              
           
        5. Meee says:
           May 30, 2014 at 7:21 pm
           
           Have you tried these commands? On a system with correct permissions
           for /dev/sda, and as long as you’re not already in a root shell, they
           will do no damage.
           
           Report comment
           Reply
           
        
     
 5.  Chris says:
     May 28, 2014 at 11:01 am
     
     su-dew… yeah… I’m going to file that under things that the creator
     pronounces wrong right next to “jif”
     
     Report comment
     Reply
     1. JRDM says:
        May 28, 2014 at 11:26 am
        
        Whatever your preference may be, his pronunciation is more consistent
        with the meaning of the command. And it’s not a Japanese word.
        
        Report comment
        Reply
        
     2. Eirinn says:
        May 28, 2014 at 12:25 pm
        
        He’s the creator, like it not, if you pronounce it differently it’s
        pretty much wrong. Chrys.
        
        Report comment
        Reply
        1. CFWhitman says:
           May 28, 2014 at 2:18 pm
           
           Well, if that’s true then there are a lot of people who say a lot of
           things “wrong.”
           
           Generally, however, any pronunciation that is adopted by a large
           percentage of people that use the word ends up being considered
           correct. I think by that estimation, either pronunciation would be
           considered correct.
           
           He himself states that he doesn’t care how people pronounce it. He
           just says ‘SOO-doo’ himself.
           
           Personally, I generally tend to say ‘SOO-doe’ when I’m pronouncing it
           phoneticially or ‘ess-yoo-doo’ if I’m referring to its origin. It’s
           easier to get people to type it correctly that way. Really, if you’re
           going to say that ‘doe’ is incorrect because it’s from the word “do,”
           then how is ‘soo’ correct? Like Mr. Coggeshall, though, I don’t have
           a problem with whichever way people feel like saying it.
           
           Report comment
           Reply
           
        2. Blue Footed Booby says:
           May 29, 2014 at 5:41 am
           
           No. The rules of grammar and pronunciation are descriptive rather
           than prescriptive, no matter how much middle school English teachers
           may protest. The creator is the final authority on how the term they
           coined was *intended* to be pronounced, but how it’s actually
           pronounced defines what is correct in general parlance, for better or
           worse. Understanding this fact is the universal chill pill for
           language nazis everywhere.
           
           How I learned to stop worrying and love the sue-dough.
           
           Report comment
           Reply
           
        
     3. John says:
        May 28, 2014 at 1:40 pm
        
        You must use a strange alphabet if “Sudo” comes next to “Jif” , the
        mis-pronunciation of “Les Miserables” which everyone knows is really
        pronounced “Miserable Les”should surely come between them in your
        database.
        
        Report comment
        Reply
        
     4. Greenaum says:
        May 28, 2014 at 1:47 pm
        
        It’s “su”, as in super, sounds like “sue”. Then “do”, as in “superuser,
        please do this task for me”. Su-do. It’s obvious, how can anyone get it
        wrong?
        
        Report comment
        Reply
        1. WJCarpenter says:
           May 28, 2014 at 1:48 pm
           
           “Those who ignore history are condemned to mispronounce it.” — famous
           old saying
           
           Report comment
           Reply
           
        2. JimmyNeutron111 says:
           May 28, 2014 at 3:57 pm
           
           I think it’s “su” as in “s”uper”u”ser.
           
           Just sayin’.
           
           Report comment
           Reply
           1. Leonard says:
              May 29, 2014 at 4:40 am
              
              I think it’s “su”as in “s”et “u”id.
              
              ;)
              
              Report comment
              Reply
              1. funklord says:
                 May 29, 2014 at 1:01 pm
                 
                 I always thought it was Switch User.
                 
                 Report comment
                 
              
           
        
     
 6.  FellowBadger says:
     May 28, 2014 at 11:22 am
     
     The comment that you claim is a troll is actually responding to the
     previous programs posted on the thread, e.g. asroot (“recompiled when
     there is a new root passwd”.) Tom Christiansen probably would have
     recognized the value of sudo over su -f root since sudo doesn’t require
     root password.
     
     Report comment
     Reply
     
 7.  Tod E. Kurt (@todbot) says:
     May 28, 2014 at 11:23 am
     
     Awesome article. Love seeing Unix history. Since it’s in our phones and
     TVs, it’s very relevant. And sudo rules.
     
     Report comment
     Reply
     
 8.  vonskippy says:
     May 28, 2014 at 11:38 am
     
     Somehow Unix Greybeards managed for decades not to f**k up their systems
     using root, then Unoobtu comes along and tells everyone users are too
     stupid to be trusted.
     
     Sudo this sudo that sudo everything is about as useful (and ten times as
     annoying) as all the UAC popups in Windows Vista.
     
     Report comment
     Reply
     1. John says:
        May 28, 2014 at 1:07 pm
        
        I feel I have to add also that the “if it aint broke don’t fix it” has
        also disappeared from Linux now and updates seem to add more broken bits
        and bloat rather than just being about mending stuff. Where do I go next
        once I get totally peed off with it, that is the hard one to solve. The
        latest one to annoy me was the Chrome update a few days ago, the mouse
        now lets go of the side scroll bars if you move too far from the window,
        that is so irritating. :) Still has a long way to go before it stops
        being the most usable OS in the world though. :)
        
        Report comment
        Reply
        1. Jerry says:
           May 28, 2014 at 10:12 pm
           
           Technically a Chrome update has nothing to do with Linux…you’re being
           annoyed up the wrong tree.
           
           Report comment
           Reply
           
        
     2. ng says:
        May 28, 2014 at 10:27 pm
        
        Of course for those decades being a Unix Admin meant only being a Unix
        Admin. Now it means software development, project management,
        virtualization, clustering, sans, networks, hardening, tunneling, dba,
        accounting, salesman, and so much more.
        
        Long past are the days of the lone admin in the basement of some huge
        building typing away on a model m connected directly to a machine.
        
        Information tech has grown up. Part of that means accepting that
        everyone makes mistakes.
        
        Report comment
        Reply
        
     
 9.  Michel says:
     May 28, 2014 at 11:45 am
     
     Interesting, because in the “old” Unix world (around 1980-1990), there was
     a command (if I remember correctly, it was an obscure hack picked somewhere
     that we compiled on our system) doing approximately the same thing, called
     “…” therefore hidden to a normal “ls” command : it was the time of security
     by obscurity :)
     
     Report comment
     Reply
     
 10. Will Lyon says:
     May 28, 2014 at 11:59 am
     
     NOT A HACK!
     
     Report comment
     Reply
     1. static says:
        May 28, 2014 at 12:50 pm
        
        sure it’s a hack he and his partner in crime hacked the available set of
        commands for an operating system, and sounds like the command itself was
        subject to hacking.
        
        Report comment
        Reply
        
     
 11. David Anderson says:
     May 28, 2014 at 1:10 pm
     
     SUNY Buffalo is the University at Buffalo (www.buffalo.edu). Buffalo State
     College is a different place. Bob is talking about the University at
     Buffalo.
     
     Report comment
     Reply
     
 12. sudo make me a sandwich says:
     May 28, 2014 at 1:19 pm
     
     The comment about tom being a Troll is very unfair. He was referring to the
     force.c program posted in the same thread which requires the encrypted root
     password be compiled into the program. tom’s comment is completely
     legitimate in that context.
     
     Report comment
     Reply
     
 13. Sven says:
     May 28, 2014 at 1:26 pm
     
     Am i the only one who tried mousing over the XKCD picture to read the alt
     text?
     
     Report comment
     Reply
     
 14. pcf11 says:
     May 28, 2014 at 1:49 pm
     
     That’s nice. Did I ever say that Dennis Ritchie grew up in my home town?
     Because he did. He moved a few miles away but I’d still see him around from
     time, to time. Now there’s someone famous in the computing world.
     
     Report comment
     Reply
     
 15. static says:
     May 28, 2014 at 2:12 pm
     
     In light no one does and most likely can’t know everything there is to know
     about everything, I’m going to call BS on the notion than pronunciation
     isn’t important. I grew up in a community where anyone 10 years older than
     I spoke one of several dialects of German as a second language. That
     colored their English so much often I was left to figure out WTF they where
     talking about. I once visited an relative that had a car being repaired by
     body shop of “Mexicans” for whom English was their second language. The
     body man was telling my relative he he still had to “black it”, that’s what
     in sound like to me. As he continue to say that as he continued to speak
     with my relative, it was clear he meant he needed block sand the work.
     where a user password becomes a pseudo root password I can see where some
     came to that pronunciation. In my opinion history is important, so
     Coggeshall, while it’s beyond his control should have the last word.
     
     The audio of Bob’s voice was up and down as it played here. Perhaps it was
     due to inconsistent mic placement, but where I was listening while doing
     email I wouldn’t noticed. In the age of digital audio surely there’s a way
     to eliminate the wind noise somehow
     
     Report comment
     Reply
     1. Galane says:
        May 28, 2014 at 2:47 pm
        
        Some people in the southeastern USA pronounce door like dough. But how
        to they pronounce “dough”?
        
        Report comment
        Reply
        1. JimmyNeutron111 says:
           May 28, 2014 at 4:06 pm
           
           Well, based on my experience, it would be pronounced (and sometimes,
           spelled) the same way. Best ever was an office e-mail which named
           someone as a “pillow of the community”.
           
           Report comment
           Reply
           
        
     2. Greenaum says:
        May 30, 2014 at 12:47 pm
        
        “10 years older than ME”, not “I”. One of the more annoying
        over-corrections. Almost as bad as calling the eighth letter of the
        alphabet “haitch”. I’ve been known to break people’s spines for doing
        that.
        
        Report comment
        Reply
        1. Brian Benchoff says:
           May 30, 2014 at 1:01 pm
           
           Can we calm down on correcting grammar here? It’s one thing if it’s
           for the posts, but now your doing the comments. I mean, dam, people.
           
           Report comment
           Reply
           1. steamcheng says:
              June 3, 2014 at 9:59 am
              
              It would be one thing if he were correct, but he is wrong. the
              original post was correct, “…older than I.”
              
              Report comment
              Reply
              
           
        
     3. white crane says:
        June 1, 2014 at 6:36 pm
        
        pseudo is pronounced “sedo” or “say-doe” in places that sudo is
        pronounced sue-doe. It’s only “sue due” if a space separates the su do.
        Same for SCSI being scuzzy and not sexy which would be SXSI or the
        spanish variant SXCI (not really serious of course).
        
        Report comment
        Reply
        1. JRDM says:
           June 1, 2014 at 6:41 pm
           
           I’m not seeing any of that. For example: “pseudo |ˈso͞odō|”
           
           Your suggested pronunciation for sudo doesn’t make sense as it’s not
           a Japanese word, so it shouldn’t be pronounced like judo.
           
           Report comment
           Reply
           1. JRDM says:
              June 1, 2014 at 6:48 pm
              
              Oops, your comments on SCSI, yeah, I agree.
              
              Report comment
              Reply
              
           
        
     
 16. GZ says:
     May 28, 2014 at 2:20 pm
     
     Like it or not, language is a collective understanding. Words and born and
     die. Meanings shift over time. A creator of thing only has limited control
     over it and generally only for a short while.
     
     The words as we use them today will evolve and no matter how much you
     battle, if the population insists on using “Literal” for “Figurative” can
     you even hope to address “sudo?”
     
     I just felt the need to axs that.
     
     Report comment
     Reply
     1. GZ says:
        May 28, 2014 at 2:21 pm
        
        “Words are born” .. sigh. I’m sure there are others.
        
        Report comment
        Reply
        
     
 17. brynet says:
     May 28, 2014 at 2:44 pm
     
     A lot of people don’t realize this, but Sudo is developed by an OpenBSD
     developer, Todd C. Miller, who is also credited for creating the
     strlcpy/strlcat API that is widely used today (*BSD, Apple, Android, Linux
     kernel).
     
     http://www.courtesan.com/todd/papers/strlcpy.html
     
     Michael W Lucas has written a book on Sudo that is a good read, he also
     recently presented at BSDCan 2014′ on Sudo.
     
     https://www.michaelwlucas.com/nonfiction/sudo-mastery
     http://www.bsdcan.org/2014/schedule/events/456.en.html
     
     Report comment
     Reply
     
 18. Galane says:
     May 28, 2014 at 2:45 pm
     
     Linus Torvalds pronounces Linux “Leenux” and his first name “Leenus” but
     apparently nobody else does.
     
     Report comment
     Reply
     1. WJCarpenter says:
        May 28, 2014 at 3:43 pm
        
        You are slightly mis-informed:
        https://www.youtube.com/watch?v=5IfHm6R5le0
        
        Report comment
        Reply
        1. JimmyNeutron111 says:
           May 28, 2014 at 4:11 pm
           
           Thanks for the link. I’ve read a lot about him, but never actually
           seen him or heard him speak. Just from that little bit (and what I’ve
           read), I think I like him. :)
           
           Report comment
           Reply
           1. John says:
              May 29, 2014 at 12:49 am
              
              He is a God.
              
              Report comment
              Reply
              
           
        
     
 19. OneShot Willie says:
     May 28, 2014 at 3:50 pm
     
     It’s so nice to read a “You’re doing it wrong!” fest, but really, in the
     end as long as who ever you’re around understands you, you should probably
     refer to the “when in rome” rule.
     
     And, as for southerners, the rule is to put an “H” phonetically after the
     first vowel. So,
     Martha becomes Mahtha, etc. As such, the phrase “yew aint from around hair,
     is ye?” isn’t talking about a tree known for it’s strength and resilience.
     
     So, it’s common to be able to tell what someone is saying by context
     (unless they’re scottish – no one can understand them even other scots!) ;
     )
     
     Report comment
     Reply
     1. JimmyNeutron111 says:
        May 28, 2014 at 4:19 pm
        
        ROFL! Anyone else remember Ozzy saying, “rayeeo-own”, over and over to
        the TV remote?
        
        He also said something along the lines of, “Peepel say I talkis way
        ‘cauza alla drugsz, but I’m just Sco-ish, it’sow weall talk.”
        
        Report comment
        Reply
        1. Greenaum says:
           May 30, 2014 at 1:04 pm
           
           Presuming you mean THE Ozzy (and how many Ozzys are there?), he’s not
           Scottish. Most other people who talk like that have had at least a
           couple of strokes.
           
           Report comment
           Reply
           
        
     
 20. Scott Moore says:
     May 28, 2014 at 5:33 pm
     
     9944 lines of code? Yikes! How complicated can it be to check for the
     privilege and then pipe the given command as root? I suppose a gander at
     the source is in order.
     
     Report comment
     Reply
     1. Spork says:
        May 28, 2014 at 7:20 pm
        
        Apparently it takes quite a few lines of code to do that effectively!
        Link for reference:
        http://www.sudo.ws/repos/sudo
        
        Report comment
        Reply
        
     
 21. Xoop says:
     May 28, 2014 at 9:03 pm
     
     sudo was created by people who don’t understand security.
     No, it’s not exactly an accepted unix idiom. And in it’s default form, it’s
     generally only used by newbies.
     
     Report comment
     Reply
     
 22. kamathln says:
     May 28, 2014 at 11:23 pm
     
     You simply don’t put the words “open source” and “Richard Stallman” in the
     same sentence. https://www.gnu.org/philosophy/words-to-avoid.html#Open
     
     Report comment
     Reply
     
 23. John says:
     May 29, 2014 at 1:03 am
     
     OK, I’m persuaded. The problem now moves to the distros. I think that if
     you are a big user / installer of Linux with multi-user systems then you
     had better know what you are doing. The same is not true for those of us
     that prefer Linux and would like more people to make daily use of it. We
     want to persuade people that it is easy to install and use, is stable and
     gives no problems.
     
     It would help the not too experienced people if sudo was not there by
     default and root password was set at install or a compulsory root access
     account was set up as well as a user account that didn’t have sudo.
     
     As it is now you can’t just stick a CD in and install without opening a
     command window and typing things, this puts so many people off.
     
     The way it is now you either:
     Install from CD, set root password, delete sudo
     or, more correctly:
     Install from CD, add a new user, edit sudoers to restrict the user using
     sudo and the first account to do it.
     
     The first option is a lot quicker and easier, it is safe and secure. In
     order to force people to do it “properly” the distros need changing on
     their default installation. This change will not affect the multiuser
     admins.
     
     Report comment
     Reply
     
 24. Bob Coggeshall (@BobCoggeshall) says:
     May 29, 2014 at 5:16 am
     
     Hey everyone. Really enjoyed reading the comments, so far. Many, many
     people have contributed to sudo over the years. I am proud to have played
     the small initial role that I did. Cheers. ..c
     
     Report comment
     Reply
     
 25. Ren says:
     May 29, 2014 at 9:23 am
     
     Wow, xkcd right in the article! Another HaD pre-emptive strike!
     
     sudo Hackaday
     Ren Tescher wins the Hackaday Prize!
     
     (darn! it didn’t work!)
     
     Report comment
     Reply
     


LEAVE A REPLY CANCEL REPLY



Please be kind and respectful to help make the comments section excellent.
(Comment Policy)

This site uses Akismet to reduce spam. Learn how your comment data is processed.




SEARCH

Search for:


NEVER MISS A HACK

Follow on facebook Follow on twitter Follow on youtube Follow on rss Contact us


SUBSCRIBE




IF YOU MISSED IT


 * NASA TURNS TO COMMERCIAL PARTNERS FOR SPACESUITS
   
   21 Comments


 * THE GREAT EURO SAT HACK SHOULD BE A WARNING TO US ALL
   
   38 Comments


 * ROGUE WAVES ARE MYSTERIOUS AND BIG
   
   32 Comments


 * THE JOY OF BROADCAST MEDIA VS. THE PARADOX OF CHOICE
   
   55 Comments


 * HANDLING BULK MATERIAL: WHY DOES MY CAT FOOD GET STUCK?
   
   42 Comments

More from this category



OUR COLUMNS


 * AERIAL ROBOTICS HACK CHAT
   
   1 Comment


 * HACKADAY LINKS: JUNE 5, 2022
   
   16 Comments


 * HACKADAY PODCAST 171: RENT THE APPLE TOOLKIT, DIY AN INDUSTRIAL CNC, OR SAVE
   THE BIRDS WITH 3D PRINTING
   
   3 Comments


 * THIS WEEK IN SECURITY: FOLLINA, OPEN REDIRECT RCE, AND ANNOYWARE
   
   1 Comment


 * LINUX FU: EASY WIDGETS
   
   5 Comments

More from this category


SEARCH

Search for:


NEVER MISS A HACK

Follow on facebook Follow on twitter Follow on youtube Follow on rss Contact us


SUBSCRIBE




IF YOU MISSED IT


 * NASA TURNS TO COMMERCIAL PARTNERS FOR SPACESUITS
   
   21 Comments


 * THE GREAT EURO SAT HACK SHOULD BE A WARNING TO US ALL
   
   38 Comments


 * ROGUE WAVES ARE MYSTERIOUS AND BIG
   
   32 Comments


 * THE JOY OF BROADCAST MEDIA VS. THE PARADOX OF CHOICE
   
   55 Comments


 * HANDLING BULK MATERIAL: WHY DOES MY CAT FOOD GET STUCK?
   
   42 Comments

More from this category


CATEGORIES

Categories Select Category 3d Printer hacks Android Hacks Arduino Hacks ARM Art
Artificial Intelligence Ask Hackaday ATtiny Hacks Battery Hacks Beer Hacks
Biography blackberry hacks Business car hacks Cellphone Hacks chemistry hacks
classic hacks clock hacks cnc hacks computer hacks cons contests cooking hacks
Crowd Funding Curated Current Events Cyberdecks digital audio hacks digital
cameras hacks downloads hacks drone hacks Engine Hacks Engineering Fail of the
Week Featured Fiction firefox hacks FPGA g1 hacks Games google hacks gps hacks
green hacks Hackaday Columns Hackaday links Hackaday Store Hackerspaces HackIt
handhelds hacks hardware High Voltage History Holiday Hacks home entertainment
hacks home hacks how-to Interest internet hacks Interviews iphone hacks ipod
hacks Kindle hacks Kinect hacks laptops hacks Laser Hacks LED Hacks Lifehacks
Linux Hacks lockpicking hacks Mac Hacks Machine Learning Major Tom Medical Hacks
Microcontrollers Misc Hacks Multitouch Hacks Musical Hacks Netbook Hacks Network
Hacks News Nintendo DS Hacks Nintendo Game Boy Hacks Nintendo Hacks Nintendo Wii
Hacks Nook Hacks Original Art Palm Pre Hacks Parts Peripherals Hacks Phone Hacks
Playstation Hacks Podcasts Portable Audio Hacks Portable Video Hacks PSP Hacks
Radio Hacks Rants Raspberry Pi Repair Hacks Retrocomputing Retrotechtacular
Reverse Engineering Reviews Robots Hacks Roundup Science Security Hacks Skills
Slider Software Development Software Hacks Solar Hacks Space Tablet Hacks
Teardown Tech Hacks The Hackaday Prize Tool Hacks Toy Hacks Transportation Hacks
Uncategorized Video Hacks Virtual Reality Weapons Hacks Wearable Hacks Weekly
Roundup Wireless Hacks Xbox Hacks


OUR COLUMNS


 * AERIAL ROBOTICS HACK CHAT
   
   1 Comment


 * HACKADAY LINKS: JUNE 5, 2022
   
   16 Comments


 * HACKADAY PODCAST 171: RENT THE APPLE TOOLKIT, DIY AN INDUSTRIAL CNC, OR SAVE
   THE BIRDS WITH 3D PRINTING
   
   3 Comments


 * THIS WEEK IN SECURITY: FOLLINA, OPEN REDIRECT RCE, AND ANNOYWARE
   
   1 Comment


 * LINUX FU: EASY WIDGETS
   
   5 Comments

More from this category


RECENT COMMENTS

 * metalman on 3D-Printed Power Loom Shows How Complex Weaving Really Is
 * Alphatek on 3D-Printed Power Loom Shows How Complex Weaving Really Is
 * tachyon1 on DIY Keyboard Can’t Get Much Smaller
 * Foldi-One on New Part Day: X1501 Makes For A Tiny And Open Linux SoM
 * zoobab on New Part Day: X1501 Makes For A Tiny And Open Linux SoM
 * Francois Otis on This $4 Desalination Device Provides Drinking Water For The
   Whole Family
 * pelrun on Outline 2022: Everyone Should Go To A Demo Party
 * Stefano on Refilling Single-Use Miele Dishwasher AutoDos Detergent Dispensing
   Disks
 * Reimu NotMoe on New Part Day: X1501 Makes For A Tiny And Open Linux SoM
 * pelrun on Outline 2022: Everyone Should Go To A Demo Party


NOW ON HACKADAY.IO

 * Sergei V. Bogdanov liked PWM Solar Charge Controller.
 * Circuits DIY has updated details to Water Level Sensor with ATtiny85 and
   Buzzer.
 * Circuits DIY has updated the project titled Water Level Sensor with ATtiny85
   and Buzzer.
 * Ken KD5ZXG wrote a reply on Incandescent RAM.
 * Ken KD5ZXG wrote a reply on project log Homebrew Computers & Transistors, and
   surely more....
 * teraz wrote a comment on Notkia.
 * teraz wrote a reply on Notkia.
 * teraz wrote a reply on Notkia.
 * Stanley.bouwer liked Industry IoT Modbus device..
 * teraz wrote a reply on X1501 Pico SoM.


 * Home
 * Blog
 * Hackaday.io
 * Tindie
 * Hackaday Prize
 * Video
 * Submit A Tip
 * About
 * Contact Us


NEVER MISS A HACK

Follow on facebook Follow on twitter Follow on youtube Follow on rss Contact us


SUBSCRIBE TO NEWSLETTER


Copyright © 2022 | Hackaday, Hack A Day, and the Skull and Wrenches Logo are
Trademarks of Hackaday.com | Privacy Policy | Terms of Service
Powered by WordPress VIP

By using our website and services, you expressly agree to the placement of our
performance, functionality and advertising cookies. Learn more

OK
 

Loading Comments...

 

Write a Comment...
Email (Required) Name (Required) Website