{"id":57322,"date":"2024-10-07T18:45:18","date_gmt":"2024-10-07T18:45:18","guid":{"rendered":"http:\/\/18e65a7d-ae73-42de-aa44-c3008dbf3032"},"modified":"2024-10-07T18:45:18","modified_gmt":"2024-10-07T18:45:18","slug":"need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/","title":{"rendered":"Need to manage Linux passwords on the command line? No GUI, no problem!"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f07777b5abecfae036dad262c55e921d73b261a2\/2023\/08\/14\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\/guake2.jpg?auto=webp&amp;width=768\" alt=\"Guake open on Ubuntu Budgie.\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/e738c1205a6bd2184243faf802364f2e0d967590\/2023\/08\/14\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\/guake2.jpg?auto=webp&amp;width=1024\" alt=\"Guake open on Ubuntu Budgie.\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\/2023\/08\/14\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\/guake2.jpg?auto=webp&amp;width=1280\" alt=\"Guake open on Ubuntu Budgie.\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\/2023\/08\/14\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\/guake2.jpg?auto=webp&amp;width=1280\" alt=\"Guake open on Ubuntu Budgie.\" width=\"1280\" height=\"537.5328083989501\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>I can now more easily run Linux commands at-will.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Jack Wallen\/ZDNET<\/span><\/figcaption><\/figure>\n<p>I cannot tell you how many times I&#8217;ve had to manage user passwords in Linux without the help of a GUI app. Whether it&#8217;s on a server or because I&#8217;m using SSH to access a remote machine, knowing the commands available for that task has saved my skin on several occasions.&nbsp;<\/p>\n<p>The good news is that there&#8217;s only one command you <em>must<\/em>&nbsp;know to manage those passwords from the command line interface (CLI). However, there&#8217;s a second command I consider essential as well.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/the-first-5-linux-commands-every-new-user-should-learn\/\" rel=\"follow\">The first 5 Linux commands every new user should learn<\/a><\/strong><\/p>\n<p>I want to address both of these commands and show you how powerful and helpful they can be.<\/p>\n<p>Are you ready for this?<\/p>\n<h2>The passwd command<\/h2>\n<p>The name of this command always trips up new users at first. When I first started working with Linux, it took me a while for my fingers to remember the command is <em>passwd <\/em>and not <em>password<\/em>.&nbsp;<\/p>\n<p>The passwd command enables you to set, change, and check the status of a password. It also can force a user to change their password and lock\/unlock accounts.<\/p>\n<p><!----><\/p>\n<p>Let me show you how to do each of those things. Don&#8217;t worry about <a href=\"https:\/\/www.zdnet.com\/article\/best-linux-desktops-for-beginners\/\" rel=\"follow\">what distribution you are using<\/a>, as the <em>passwd <\/em>command ships with them all.<\/p>\n<p>First, let&#8217;s set a new password. This will be necessary only when a user is first created from the command line. Some distributions will require you to set a password during user creation, others do not. If you find the <em>adduser<\/em> command doesn&#8217;t require setting a password for that new user, you can create one with the command:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo passwd USER<\/pre>\n<\/div>\n<p>Where USER is the user in question.<\/p>\n<p>Changing a password can be done by an administrator or by a standard user. The administrator can change the password of any user on the system and the standard user can only change their own password.<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/thinking-about-switching-to-linux-things-you-need-to-know\/\" rel=\"follow\">Thinking about switching to Linux? 10 things you need to know<\/a><\/strong><\/p>\n<p>For the admin to change a password, the command is:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo passwd USER<\/pre>\n<\/div>\n<p>Where USER is the user in question.<\/p>\n<p>For a user to change their own password, the command is simply:<\/p>\n<p>To check the status of a password, issue the command:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo passwd -S USER<\/pre>\n<\/div>\n<p>Where USER is the user in question.<\/p>\n<p>The output will include the username, status, date last changed, minimum password age, maximum password age, warning period, and inactive period.<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-linux-desktops-for-beginners\/\" rel=\"follow\"><strong>The best Linux distros for beginners<\/strong><\/a><\/p>\n<p>You can also check the status of all user passwords with the command:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo passwd -Sa<\/pre>\n<\/div>\n<p>The above command will also include system accounts.<\/p>\n<p>Now, let&#8217;s force a user to change their password, which is done with the command:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo passwd -e USER<\/pre>\n<\/div>\n<p>Where USER is the name of the user in question. When the user next logs in, they&#8217;ll be prompted for their current password and then instructed to set a new one.<\/p>\n<p>Finally, you can lock and unlock a user account with the <em>passwd <\/em>command. To lock an account, the command is:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo passwd -l USER<\/pre>\n<\/div>\n<p>Where USER is the name of the user in question.<\/p>\n<p>The user will no longer be able to log into their account. To unlock the user account, the command is:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo passwd u USER<\/pre>\n<\/div>\n<p>Where USER is the name of the user in question.<\/p>\n<h2>The chage command<\/h2>\n<p>The <em>chage <\/em>command is used to manage password expiry. Why would you use this instead of the <em>passwd <\/em>command? Simply put, the <em>chage <\/em>command gives you more control over password expiration. This can come in handy when you need to create temporary accounts on your Linux system. You can set a password to expire after a certain period, at which point the user will not longer be able to log in. This can be helpful if you have guests staying for a set period or if you have an employee who will be leaving the company on a specific date.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/this-linux-distro-has-a-smart-feature-that-vastly-improved-my-workflow\/\" rel=\"follow\">This Linux distro has a smart feature that vastly improved my workflow<\/a><\/strong><\/p>\n<p>Let&#8217;s say you want to use <em>chage<\/em> to force a user to change a password on a specific date. For example, if you want to force a password change on October 31, 2024, for user olivia, the command would be:<\/p>\n<div class=\"c-shortcodeCodeSnippet\" readability=\"7\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo chage -d 2024-10-31 olivia<\/pre>\n<\/div>\n<p>When the olivia user goes to log in on that date, they will be forced to change their password.<\/p>\n<p>Let&#8217;s say you want to force an account expiration date. For that, use the E option like this:<\/p>\n<div class=\"c-shortcodeCodeSnippet\" readability=\"7\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo chage -E 2024-10-31 olivia<\/pre>\n<\/div>\n<p>You can also lock user accounts with <em>chage<\/em> like so:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo chage -E 0 USER<\/pre>\n<\/div>\n<p>Where USER is the name of the user in question.<\/p>\n<p>If you want to remove an expiry date from an account, the command would look like this:<\/p>\n<div class=\"c-shortcodeCodeSnippet\" readability=\"7\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo chage --expiredate -1 USER<\/pre>\n<\/div>\n<p>Where USER is the name of the user in question.<\/p>\n<p>Finally, you can specify the number of days between required password changes. Let&#8217;s say you want a user to change their password every 30 days. For that, the command would be:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo chage -E 30 USER<\/pre>\n<\/div>\n<p>Where USER is the name of the user in question.<\/p>\n<p>Once you&#8217;ve executed the above command, the user will have to change their password every 30 days. You can also set the warning period for the user. Instead of being warned on the day of, you can let them know the day before with the command:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo chage -W 1 USER<\/pre>\n<\/div>\n<p>Where USER is the name of the user in question.<\/p>\n<p>You can also remove the explicit expiration date with:<\/p>\n<div class=\"c-shortcodeCodeSnippet\">\n<pre class=\"c-shortcodeCodeSnippet_code\">sudo chage -E -1 USER<\/pre>\n<\/div>\n<p>Where USER is the name of the user in question.<\/p>\n<p>And that, my friends, is how you can manage user passwords from the command line.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you ever had to change or manage a user password on Linux, I&#8217;ve got two essential commands you need to know &#8211; and how to use them.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-57322","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Need to manage Linux passwords on the command line? No GUI, no problem! 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Need to manage Linux passwords on the command line? No GUI, no problem! 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-07T18:45:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\/2023\/08\/14\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\/guake2.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Need to manage Linux passwords on the command line? No GUI, no problem!\",\"datePublished\":\"2024-10-07T18:45:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/\"},\"wordCount\":940,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\\\/2023\\\/08\\\/14\\\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\\\/guake2.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/\",\"name\":\"Need to manage Linux passwords on the command line? No GUI, no problem! 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\\\/2023\\\/08\\\/14\\\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\\\/guake2.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2024-10-07T18:45:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\\\/2023\\\/08\\\/14\\\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\\\/guake2.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\\\/2023\\\/08\\\/14\\\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\\\/guake2.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Need to manage Linux passwords on the command line? No GUI, no problem!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Need to manage Linux passwords on the command line? No GUI, no problem! 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/","og_locale":"en_US","og_type":"article","og_title":"Need to manage Linux passwords on the command line? No GUI, no problem! 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-10-07T18:45:18+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\/2023\/08\/14\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\/guake2.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Need to manage Linux passwords on the command line? No GUI, no problem!","datePublished":"2024-10-07T18:45:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/"},"wordCount":940,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\/2023\/08\/14\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\/guake2.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/","url":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/","name":"Need to manage Linux passwords on the command line? No GUI, no problem! 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\/2023\/08\/14\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\/guake2.jpg?auto=webp&amp;width=1280","datePublished":"2024-10-07T18:45:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\/2023\/08\/14\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\/guake2.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/a5bad8e084788a11c4585be44eeb4d4f2cd4f85f\/2023\/08\/14\/e1dad8eb-89ff-4cf6-b4e0-1221fd29a8c9\/guake2.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/need-to-manage-linux-passwords-on-the-command-line-no-gui-no-problem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Need to manage Linux passwords on the command line? No GUI, no problem!"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57322"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57322\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}