superuser

(redirected from Root access)

superuser

[Unix] Synonym root, avatar. This usage has spread to non-Unix environments; the superuser is any account with all wheel bits on. A more specific term than wheel.

superuser

A person with unlimited access privileges who can perform any and all operations within the computer. See root user.
References in periodicals archive ?
Further, Huawei has said that it will not allow root access for future security concerns.
Anyone with root access has ubiquitous and unfettered access.
A new app based on the Pokemon Go game available on the Google Play store can seize root access rights of Android smartphones and display unsolicited ads.
By exploiting these vulnerabilities, malicious users could potentially ccess video and audio feeds from any camera connected to the vulnerable cloud service; remotely gain root access to a camera and use it as an entry-point for further attacks on other devices on both local and external networks; steal personal information such as users' social network accounts and information which is used to send users notifications; and even remotely "brick" vulnerable cameras.
The implant carries multiple exploits for root access and is also capable of taking pictures and videos, seizing call records, SMS, geolocation, calendar events and business-related information stored in the device's memory.
The much-needed patch to address the high-risk root access security bug for the MacOS High Sierra has been released.
'SeaPea' is installed using root access and remains on the device until either the hard drive is reformatted or the system is upgraded.
According to Check Point, an attacker who exploits any of the four vulnerabilities can gain enough privileges to root access a device.
It does not require root access, it does not contain any watermarks, and it is always 100% ad free and very easy to use with one action to start and stop recording.
In addition, it will provide The Root access to greater resources, as well as an opportunity to expand our reach and scale our business.
This malware creates a root access of the user's device, which was discovered in 2011.