|
The other way to do it is to not touch the shadow file. *remove the computer from the network while doing this* mount up the partition and add in a user to your /etc/password file with a UID of 0 and a GID of 0 (I usually use Tux) Then save the file and reboot. When you are asked for the user put in the one you just created (eg Tux) that should let you in without a password, then since you are root you should be able to change the root password to something you know. Just make sure you remove the temporary user (Tux) otherwise you will cause all sorts of security issues. *add the computer back to the network* Later and happy hacking Dany Allard bogi wrote:
-- ************************* This e-mail and any attachments are confidential and may also be a privileged communication. It is intended solely for the person (s) to whom it is addressed. If you are not the intended addressee of the message, please reply to this message to let us know you received it in error and also delete the message from your system. Trema Laboratories Inc. does not authorize any person to distribute, print, copy or otherwise disclose this e-mail message without the express and specific permission of Trema Laboratories Inc. ******************************* |
_______________________________________________ clug-talk mailing list [EMAIL PROTECTED] http://clug.ca/mailman/listinfo/clug-talk_clug.ca

