Skip to main content

How to enable Root User and access the parts of Mac?

Mac users often wonder how to enable the Root User account in the system. Hence this guide is mentioning the methods and steps to enable the Root User account in Mac systems. You need to go deep into your Mac to enable this account, but before proceeding with the method, you should know the reason for enabling the account.
Mac has some files which cannot be accessed through a user account. The Root User account allows you to access these files and move them without setting any complexities. The file deletion, recovery and scanning becomes easier in the account. But, the modification or changes in these files can cause severe damage or harm to the Mac system. So you must acknowledge the necessity to enable the Root User account and access the files.

Here is how to enable Root User and access the parts of Mac

Create the Root User Account

To create the Root User account, you will require to refer the System Preferences of your Mac.
  1. Click the Apple logo and a drop-down menu list will open.
  2. Now, click System Preferences from the menu.
  3. Select the Users & Groups.
  4. Move to the bottom left of the window and click the lock icon.
  5. Enter the Admin username and password.
  6. Click the Login Options and click to Join tab.
  7. Click the Open Directory Utility tab.
  8. Again, click the lock icon from the left bottom of the corner.
  9. Enter the password and go to Directory Utility.
  10. Click Edit from the toolbar and select Enable Root User option.
  11. Type a password. Ensure that the password should not match with the admin account and you can remember it.
  12. When you are done with providing the password, click Ok.
  13. You just created the Root User account.

The Terminal is an alternative method to create a Root User account.

Press Command + N key combination to open Finder window in your Mac.
  1. Click Application and move to click Utility option.
  2. Now click to launch Terminal.
  3. Type the command – dsenableroot and press the Return or Enter key.
  4. The admin username will display.
  5. Now, enter the admin password.
  6. Press Return key.
  7. You may require to enter the password again and press Enter.
  8. The Terminal will pop up the Root User message.

Log into Root User account

It is not complicated to log into the Root User account on the Mac system. The login is similar to other accounts.
  1. Log out of the current account from your Mac.
  2. Now, the Mac login screen will appear.
  3. Click the Other option.
  4. Now enter the login credentials which you recently created for your Root User account.
  5. The account will look like a regular user account, but the difference is that the account is allowing to access every file in the system.

If you do not require the Root User, then you can disable the account.

  1. Click the Apple logo and open the drop-down menu.
  2. Click System Preferences and move to Users & Groups option.
  3. Click the lock icon and proceed to enter the admin password.
  4. Click the Login Options and select Join tab.
  5. Go to the Open Directory Utility and click the Edit tab.
  6. Now select Disable, the Root User.
Remember, you must access the Root User account only when it is necessary or else the modification in the files may change the settings of the system. The Root can make the system vulnerable and easy prey to malware, hence it is a piece of advice to log out of the account and return to the regular account on your Mac system.
About us:
Dawn Martin is a self-professed security expert; she has been making the people aware of the security threats. Her passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at norton.com/setup.

Comments

Popular posts from this blog

10 Best Privacy Extensions for Google Chrome

Recently, we all are using Google Chrome because it is one of the most common internet browsers available for all individuals and businesses. However, it will always provide you a simple, clean, responsive and also provides you a much-secured browsing experience. Even the Google Chrome antivirus settings are one of the best settings, as there is always a new and emerging thought available online. While to create extra security protection, there are many security extension is available in the Chrome Web Store only to secure Google Chrome. It always provides us a host of built-in features who’s aimed is to maintain your privacy, including the capabilities to surf the web in Incognito mode or to easily manage websites data collection records on your browsing habits. But the other or third party Chrome Extensions can bring your privacy to the next level. With the help of these privacy extensions in the Chrome Web Store, users can do everything by blocking ads to get easy access to yo...

How to Make Use of the Google Reverse Image Search

Get to know about the origin of the picture, take help of your Mac, laptop, tablet or the PC. Through Google to reverse image search, you can research the origins of an image that has been found online. It may be a historical picture that is shown with a petite context or a picture that seems falsified, in such cases you can find the internet for its other uses. Performing a Google Reverse Image Search mission with the help of the Drag and Drop and Open Google Images On your device, locate image file. To the ‘Google Images’ search page, choose and drag the file. Users will see a changed search box when the image will be placed over it. Drop the image; Google will start looking for it. In the Google Search page, your results will be shown. Performing a Google Reverse Image with the help of a picture’s URL You got an image online, but you are not willing to download it. At the contrary, look for it by pasting and copying and pasting the URL. Look for the image that you w...

How to Fix Double NAT Detected in Xbox One Network Settings

Even though Xbox One is one of the most incredible gaming consoles with robust features, sometimes users may encounter issues while using it. Users may encounter the Double NAT detected error on their Xbox One, and they may be daunted by this technical language. However, this error can be resolved easily. Let’s quickly go through what double NAT is, and the method to fix this error. What is Double NAT? Usually, in any typical home network, the Microsoft’s gaming console is hooked to the router for accessing the net. The Xbox One gets allocated to a private IP address when you connect it, and this assists in its identification in the local network. Also, the home network comes with a certain public Internet Protocol address that is unique to it. NAT is the acronym for Network Address Translation, and it enables several gadgets to share a single public Internet Protocol address when the internet connection is allowed. NAT has an integral part in connectivity for MPGs as it deci...