Debian Linux系统图形界面相当的消耗硬件资源,比如开几个虚拟机就已经顶不住了,所以把这些Linux服务器的图形界面关掉,换成命令行界面,CLI:command Line Interface。现在的Linux发行版本登陆界面都是默认的GUI界面,如果按照旧版本的修改inittab文件,在一些比较新的版本是没有这个文件的,因为Linux的启动服务机制发生改变,以下方法将实现Debian系统启用命令行界面,关闭图形界面。
修改Grub配置文件启用命令行界面
1.打开grup配置文件
nano /etc/default/grub
2.修改
GRUB_CMDLINE_LINUX=”” 修改为:GRUB_CMDLINE_LINUX=”text”
3.更新grub
update-grub
4.更新系统服务管理器配置
systemctl set-default multi-user.target
5.重启:init 6
附:所要修改的代码如下:
# If you change this file, run ‘update-grub’ afterwards to update
# /boot/grub/grub.cfg.
# For full documentation of the options in this file, see:
# info -f grub -n ‘Simple configuration’
GRUB_DEFAULT=0
GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR=lsb_release -i -s 2> /dev/null || echo Debian
GRUB_CMDLINE_LINUX_DEFAULT="quiet"
GRUB_CMDLINE_LINUX="text"
# Uncomment to enable BadRAM filtering, modify to suit your needs
# This works with Linux (no patch required) and with any kernel that obtains
# the memory map information from GRUB (GNU Mach, kernel of FreeBSD …)
#GRUB_BADRAM=”0x01234567,0xfefefefe,0x89abcdef,0xefefefef”
# Uncomment to disable graphical terminal (grub-pc only)
#GRUB_TERMINAL=console
# The resolution used on graphical terminal
# note that you can use only modes which your graphic card supports via VBE
# you can see them in real GRUB with the command `vbeinfo’
#GRUB_GFXMODE=640x480
# Uncomment if you don’t want GRUB to pass “root=UUID=xxx” parameter to Linux
#GRUB_DISABLE_LINUX_UUID=true
# Uncomment to disable generation of recovery mode menu entries
#GRUB_DISABLE_RECOVERY=”true”
# Uncomment to get a beep at grub start
#GRUB_INIT_TUNE=”480 440 1”
解除debian root用户登陆限制
1.打开gdm配置文件
nano /etc/gdm3/deamon.conf
2.配置安全设置
[security] 下一行增加 AllowRoot = ture 即可
3.去除gdm登陆用户名检测
打开文件 /etc/pam.d/gdm-autologin,并其相关配置信息删除或注释掉:auth required pam_succeed_if.so user != root quiet_success
附:修改后的gdm-autologin文件:
#%PAM-1.0
auth requisite pam_nologin.so
#auth required pam_succeed_if.so user != root quiet_success
auth required pam_permit.so
@include common-account
# SELinux needs to be the first session rule. This ensures that any
# lingering context has been cleared. Without this it is possible
# that a module could execute code in the wrong domain.
session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close
session required pam_loginuid.so
# SELinux needs to intervene at login time to ensure that the process
# starts in the proper default security context. Only sessions which are
# intended to run in the user’s context should be run after this.
session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open
session optional pam_keyinit.so force revoke
session required pam_limits.so
session required pam_env.so readenv=1
session required pam_env.so readenv=1 envfile=/etc/default/locale
@include common-session
@include common-password
相关主题