Linux Professional Institute LPIC-1 Exam 101

GNU and Unix Commands

Work on the Command Line Part 1 Single shell commands and one line command sequences

In this guide, you’ll master four primary Linux login methods—both local and remote, text-based and graphical-mode. We’ll begin with a high-level overview, then dive into each approach with hands-on examples and best practices. This structured, practical walkthrough is perfect for sysadmins, DevOps engineers, and Linux enthusiasts.

Four Primary Linux Login Methods

Login MethodDescriptionUse Case
Local text-mode consoleDirect tty login via Ctrl+Alt+FnServers without X11/Wayland
Local graphical-mode consoleGUI login manager (GDM, LightDM, SDDM)Workstations and desktops
Remote text-mode via SSHSecure Shell connectionHeadless servers, automation scripts
Remote graphical-mode via VNC or RDPRemote Desktop Protocol (RDP/VNC clients)Remote GUI access, support, demos

The image illustrates four login methods: local text-mode console, remote text-mode login, local graphical-mode console, and remote graphical-mode login. Each method is represented with icons showing user and console interactions.


Consoles vs. Terminal Emulators

A console historically meant a physical keyboard and monitor connected to a host. Today it usually refers to virtual terminals (VTs) that display boot messages or provide text logins. A terminal emulator is a GUI application (GNOME Terminal, Konsole, xterm) that mimics a console within your desktop.

[  OK  ] Mounted Mount unit for snapd, revision 13270.
[  OK  ] Finished Tell Plymouth To Write Out Runtime Data...
[  OK  ] Starting Network Time Synchronization...
[  OK  ] Reached target Network Name Lookups.

After boot, switch to VT2 with:

Ctrl + Alt + F2

Use Ctrl + Alt + F1 (or F7) to return to your GUI session.

Note

Virtual terminals let you run multiple independent login sessions in text mode.
Use chvt N as root to switch from the shell.


Local Text-Mode Login

On a headless server or in a VM without X11/Wayland, you log in at the console:

CentOS Stream 8
Kernel 4.18.0-338.el8.x86_64 on an x86_64

LFCS-CentOS login: aaron
Password:
  1. Type your username at the login: prompt and press Enter.
  2. Enter your password (no characters appear on screen).
  3. To end the session, type:
exit

Note

Passwords aren’t echoed for security. If you mistype, press Enter and retry.


Local Graphical-Mode Login

Graphical login managers (GDM, LightDM, SDDM) present a friendly GUI:

  1. Select or type your username.
  2. Enter your password in the input field.
  3. Press Enter or click Sign In.

The image shows a CentOS login screen with a list of user accounts, highlighting one named "Aaron." The screen is labeled "Local GUI" and includes icons for system functions.

Warning

Always log out or lock your session when leaving your workstation unattended.


Remote Text-Mode Login via SSH

SSH (Secure Shell) is the industry standard for encrypted text-mode logins. Telnet is deprecated because it transmits credentials in plain text.

ProtocolSecurityPortExample Client
SSHEncrypted22ssh, PuTTY
TelnetPlain text23telnet (discouraged)

The image illustrates remote text-mode login methods, comparing SSH (Secure Shell) as a secure option and Telnet as an insecure option.

  1. Find the server’s IP address:
ip addr show
  1. Look for a line like inet 192.168.0.17/24.
  2. Connect via SSH:
ssh [email protected]
  1. Enter your password when prompted. Once authenticated, you’re at the remote shell:
[aaron@LFCS-CentOS ~]$

Note

You can also use SSH keys for passwordless login:
ssh-keygenssh-copy-id [email protected].


Remote Graphical-Mode Login (VNC / RDP)

For full desktop access over the network:

  1. Install or enable a VNC/RDP server on the host:
    • VNC: TigerVNC, RealVNC
    • RDP: xrdp
  2. On your client, open the matching viewer (RealVNC Viewer, Microsoft Remote Desktop).
  3. Enter the server’s IP and port (e.g., 192.168.0.17:1 for VNC).
  4. Authenticate with your Linux credentials.

Note

Performance and encryption depend on your server’s configuration. For secure tunnels, combine VNC with SSH port forwarding:

ssh -L 5901:localhost:5901 [email protected]

Then point your VNC client at localhost:5901.


Further Reading & References

Watch Video

Watch video content

Previous
Linux as a Virtualization Guest Containers