Thanks for the suggestions on my problem with a corrupted root pw.  I was
able to get a new root pw via the route of using sudo to change the root
password.  I checked it by bringing up the system in single user mode and
entered the new password and it worked.  I also checked it by issuing su
and gave the new password, which worked. Thanks to all you replied. This
really helped me out!

Comer

On Thu, Jan 15, 2015 at 6:40 AM, <
debian-user-digest-requ...@lists.debian.org> wrote:

> Content-Type: text/plain
>
> debian-user-digest Digest                               Volume 2015 :
> Issue 51
>
> Today's Topics:
>   Re: Directories changing their side   [ The Wanderer <
> wande...@fastmail.fm> ]
>   Re: Directories changing their side   [ Pertti Kosunen
> <pertti.kosunen@pp.n ]
>   Re: Find obsolete packages without u  [ Fredrik Jonson <
> fred...@jonson.org> ]
>   Re: Directories changing their side   [ Ric Moore <wayward4...@gmail.com>
> ]
>   problem with corrupted root password  [ Comer Duncan <
> comer.dun...@gmail.co ]
>   Re: problem with corrupted root pass  [ Rob Owens <row...@ptd.net> ]
>   Re: Have I been hacked?               [ Brian <a...@cityscape.co.uk> ]
>   Re: Have I been hacked?               [ Brian <a...@cityscape.co.uk> ]
>   Re: Have I been hacked?               [ John Hasler <jhas...@newsguy.com>
> ]
>   Re: problem with corrupted root pass  [ Gary Dale <garyd...@torfree.net>
> ]
>   Re: Have I been hacked?               [ Bob Proulx <b...@proulx.com> ]
>   Re: Disable server so it does not st  [ Bob Proulx <b...@proulx.com> ]
>   Re: problem with corrupted root pass  [ Bob Proulx <b...@proulx.com> ]
>
> Date: Wed, 14 Jan 2015 09:25:28 -0500
> From: The Wanderer <wande...@fastmail.fm>
> To: debian-user@lists.debian.org
> Subject: Re: Directories changing their side when copied!
> Message-ID: <54b67c58.5090...@fastmail.fm>
> Content-Type: multipart/signed; micalg=pgp-sha512;
>  protocol="application/pgp-signature";
>  boundary="1nbMw8HPgnp8BtgCwbQMCbxTNmMPHT7kE"
>
> This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
> --1nbMw8HPgnp8BtgCwbQMCbxTNmMPHT7kE
> Content-Type: text/plain; charset=utf-8
> Content-Transfer-Encoding: quoted-printable
>
> On 01/14/2015 at 09:16 AM, Rodolfo Medina wrote:
>
> > Hi all.
> >=20
> > I realized that the same directory, once copied onto vfat pendrive
> > with `cp' or also `rsync', have a size (detected with `du') that
> > doesn't match with the source.
> >=20
> > Please help.
>
> This is probably because du reports "size on disk" - that is, the amount
> by which the available space on the disk would be increased if the file
> weren't present - rather than the actual number of bytes in the file,
> and the difference between those two numbers will vary depending on what
> filesystem the file is sitting on.
>
> Specifically, FAT-based filesystems have different overhead from EXT*
> filesystems, which are probably what a modern Debian system is using by
> default. Thus, since du reports "total size including filesystem
> overhead", the space consumed by a file on a FAT FS will likely be
> different from the space consumed by that file on an EXT FS.
>
> The principle underlying this has been reported by Windows at least as
> far back as Windows 95. If you right-click on a file in the Windows
> file-manager program (Windows Explorer) and choose Properties, the
> resulting dialog will give you two different file-size values; I believe
> they're labeled "size in bytes" and "size on disk". The latter is what
> du reports, and is what differs depending on what filesystem the file is
> sitting on.
>
> --=20
>    The Wanderer hopes that this is less confusing to read than it felt
> like when he was writing it
>
> The reasonable man adapts himself to the world; the unreasonable one
> persists in trying to adapt the world to himself. Therefore all
> progress depends on the unreasonable man.         -- George Bernard Shaw
>
>
> --1nbMw8HPgnp8BtgCwbQMCbxTNmMPHT7kE
> Content-Type: application/pgp-signature; name="signature.asc"
> Content-Description: OpenPGP digital signature
> Content-Disposition: attachment; filename="signature.asc"
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
>
> iQIcBAEBCgAGBQJUtnxhAAoJEASpNY00KDJr1NIQAI3Jz9JbnSED0CeovRT3uruV
> DVooDpFVQwKQWDcjKDTsMG3xx3kaJbAvmvy2HtoSdT8UT7ZqCmvrv1aiNIxubhfi
> h7G0Vll717LpOh7EBr/GYy3KoACBfTwIwFTXGgRSWVA8hKbub11n1smJtgOrh1dX
> M1peYUVNH6Oqy7EQhIZCZwouU3bXBjSZilGVmSJEdvN+wkRiFKC27xc+lNC5IcR7
> +qZwFwrTrcHJo71p65c2h6r7Jz8pLWLplNymtC2wer9wBc3gfKRt7XcLm6H0Vt6V
> PWg+qag5ufivfV+bOCAlf8kMLx8hYHNXmrs87GuI315iIJHzNUG6U16PsdgWawWd
> Llp6Lk9pNBUWewidw/t5Dz3HwlgVq/Ppo+WMxNnXBwiQfDipNFlue0JZq+WFWt2g
> mY8UQ25X6ixoWzyhsTioCyR9uN0cL3wBT6cEs0o3vbOjam9vV6tn+mBuC9awZ1Zn
> avWrP55F7DOBzXYNjnNeR89BXRfphVJ1/nTH73BjW13SayO3sHCiv2NCFmDp1Mwp
> Fh/5KDSogSt6Xst1FGBtkO3fUJ1Uedome71elLFhG/2NjSuOaq99+gbLNYzNpSDg
> hMxqOQi25v46tQOXYjPoqVrbUzshX13XBV1DAyL8ag27WTH/HXXYTgCuOyfw1vcL
> fS9Xmu/H7lhhQT9pM9sQ
> =XcsO
> -----END PGP SIGNATURE-----
>
> --1nbMw8HPgnp8BtgCwbQMCbxTNmMPHT7kE--
>
> Date: Wed, 14 Jan 2015 16:21:46 +0200
> From: Pertti Kosunen <pertti.kosu...@pp.nic.fi>
> To: debian-user@lists.debian.org
> Subject: Re: Directories changing their side when copied!
> message-id: <54b67b7a.8000...@pp.nic.fi>
> Content-Type: text/plain; charset=windows-1252; format=flowed
> Content-Transfer-Encoding: 7bit
>
> On 14.1.2015 16:16, Rodolfo Medina wrote:
> > Hi all.
> >
> > I realized that the same directory, once copied onto vfat pendrive with
> `cp' or
> > also `rsync', have a size (detected with `du') that doesn't match with
> the
> > source.
>
> diff -r /original/dir /pendrive/dir
>
> Date: 14 Jan 2015 16:32:18 GMT
> From: Fredrik Jonson <fred...@jonson.org>
> To: debian-user@lists.debian.org
> Subject: Re: Find obsolete packages without using aptitude?
> Message-ID: <slrnmbd6gi.g6k.fred...@biggles.jonson.org>
>
> Bob Proulx wrote:
>
> >  Try this:
> >
> >    apt-show-versions | grep -v uptodate
> >
> >  Or read my answer posted here Saturday:
> >
> >    https://lists.debian.org/debian-user/2015/01/msg00358.html
>
> Thanks, excellent. I'll try to improve the variety of my search phrases,
> and digging deeper in the archive before posting next time.
>
> --
> Fredrik Jonson
>
> Date: Wed, 14 Jan 2015 14:07:52 -0500
> From: Ric Moore <wayward4...@gmail.com>
> To: debian-user@lists.debian.org
> Subject: Re: Directories changing their side when copied!
> Message-ID: <54b6be88.4070...@gmail.com>
> Content-Type: text/plain; charset=utf-8; format=flowed
> Content-Transfer-Encoding: 7bit
>
> On 01/14/2015 09:16 AM, Rodolfo Medina wrote:
> > Hi all.
> >
> > I realized that the same directory, once copied onto vfat pendrive with
> `cp' or
> > also `rsync', have a size (detected with `du') that doesn't match with
> the
> > source.
>
> Different block sizes.
> http://lists.slug.org.au/public/slug/2004/07/msg00003.html
>
> :)  Ric
>
>
>
> --
> My father, Victor Moore (Vic) used to say:
> "There are two Great Sins in the world...
> ..the Sin of Ignorance, and the Sin of Stupidity.
> Only the former may be overcome." R.I.P. Dad.
> Linux user# 44256
>
> Date: Wed, 14 Jan 2015 15:07:09 -0500
> From: Comer Duncan <comer.dun...@gmail.com>
> To: debian-user@lists.debian.org
> Subject: problem with corrupted root password
> Message-ID: <CAEL1xhCd-G3zeDf_UG7N7Ah=
> yjzpda_0wpvfcpghjfrtwhp...@mail.gmail.com>
> Content-Type: multipart/alternative; boundary=089e013d1734d0ec9b050ca24892
>
> --089e013d1734d0ec9b050ca24892
> Content-Type: text/plain; charset=UTF-8
>
> I recently got wheezy up and running.  I installed xfce4 and like it.
>
> However, today in the process of trying to spawn a root terminal (in
> Accessories) and going through a cycle of trying to get authorized but
> being prevented by repeated complaints that the system password I used was
> not correct, I now find that I can not get logged in in single-user mode!
> I have thus royally screwed up.  So, how can I get the system password
> changed to something new?
>
> Thanks for help and apologies for making such an error.
>
> Comer
>
> --089e013d1734d0ec9b050ca24892
> Content-Type: text/html; charset=UTF-8
> Content-Transfer-Encoding: quoted-printable
>
> <div dir=3D"ltr">I recently got wheezy up and running.=C2=A0 I installed
> xf=
> ce4 and like it.<div><br></div><div>However, today in the process of
> trying=
>  to spawn a root terminal (in Accessories) and going through a cycle of
> try=
> ing to get authorized but being prevented by repeated complaints that the
> s=
> ystem password I used was not correct, I now find that I can not get
> logged=
>  in in single-user mode!=C2=A0 I have thus royally screwed up.=C2=A0 So,
> ho=
> w can I get the system password changed to something
> new?=C2=A0</div><div><=
> br></div><div>Thanks for help and apologies for making such an error. =C2=
> =A0</div><div><br></div><div>Comer</div></div>
>
> --089e013d1734d0ec9b050ca24892--
>
> Date: Wed, 14 Jan 2015 16:26:14 -0500
> From: Rob Owens <row...@ptd.net>
> To: debian-user@lists.debian.org
> Subject: Re: problem with corrupted root password
> Message-ID: <20150114212614.ga8...@ptd.net>
> Content-Type: multipart/signed; micalg=pgp-sha1;
>         protocol="application/pgp-signature"; boundary="jRHKVT23PllUwdXP"
> Content-Disposition: inline
>
> --jRHKVT23PllUwdXP
> Content-Type: text/plain; charset=us-ascii
> Content-Disposition: inline
> Content-Transfer-Encoding: quoted-printable
>
> On Wed, Jan 14, 2015 at 03:07:09PM -0500, Comer Duncan wrote:
> > I recently got wheezy up and running.  I installed xfce4 and like it.
> >=20
> > However, today in the process of trying to spawn a root terminal (in
> > Accessories) and going through a cycle of trying to get authorized but
> > being prevented by repeated complaints that the system password I used
> was
> > not correct, I now find that I can not get logged in in single-user mode!
> > I have thus royally screwed up.  So, how can I get the system password
> > changed to something new?
> >=20
> > Thanks for help and apologies for making such an error.
>
> Boot using a Live CD, then as root:
>
> mount /dev/sda1 /mnt/sda1 (or whatever device is your root partition)
> chroot /mnt/sda1
> passwd=20
>
> --jRHKVT23PllUwdXP
> Content-Type: application/pgp-signature; name="signature.asc"
> Content-Description: Digital signature
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.12 (GNU/Linux)
>
> iQIcBAEBAgAGBQJUtt72AAoJEPb6Pr/i0F2KxBEP/RNlH5pQ0/2sydudHhY5nUVV
> tExtS9gRfCeOqEPRPKj0oO23SpbBjnSaNRoZ69tysH9bYJ0OGWHM/sSAHQw9tEtp
> NNezc2b/I6lRQDrEIVm08N3KFtzXFL7vKPwFrxxLN7n4fYinYijiYqLrD98aE4ho
> HHHbwLTYwrXEIKGXKdt6Y2mbo/YxzurueF3FPxnptzBUeFd/CwkwGKhOoAbQHYMg
> yv1Ua6QWWg/2a2F4OK+ZlvRnDxeGyguHLPyvfxB4WeU+vdoOKmtrqYOIceUUuL9u
> cYJJmhDKUonEaA0AWITny+oozA+MF6WK9AIs5YPaYOqI4H3P/Lo3FDXBiSH6Y9WM
> vh/7jRbU+rjXtGEZzVcQNoKLrX6XQdxj/q6iiQpIfPzoKJhmpUcdtvRHUko65Bf1
> Ww2TL9hbqM2T+sA122i4+gc+uAup+dnwP5aJQbrYew45oxV0o8QXfXXylYQdj4p+
> WU5HsCYDvGFnVRR2wCRjFayqyOC1SuqQRmQ7KPQPV4dFEdI+fiQMJxokvLUJZo14
> k8BieHgMi0CVK2HmYdq1K8I8I4GHgdCXtx9F5Gc+pEPIUby2LB58ydq2n81QNmhe
> in5Ux9aNlfwH1/gK/wytNCXmeTP3V5DNP7A2xPtBQnndnw9S7YRL4tvseYDOFoVM
> +ZbaJsQ9D00lZeX6VQ/m
> =9j3a
> -----END PGP SIGNATURE-----
>
> --jRHKVT23PllUwdXP--
>
> Date: Wed, 14 Jan 2015 21:56:05 +0000
> From: Brian <a...@cityscape.co.uk>
> To: debian-user@lists.debian.org
> Subject: Re: Have I been hacked?
> Message-ID: <20150114215605.gb15...@copernicus.demon.co.uk>
> Content-Type: text/plain; charset=utf-8
> Content-Disposition: inline
> Content-Transfer-Encoding: 8bit
>
> On Tue 13 Jan 2015 at 22:16:12 -0700, Bob Proulx wrote:
>
> > Brian wrote:
> > > Seeing that my argument that enforcing (if it is possible) an
> > > unmemorable password is not in the best interests of security doesn't
> > > gain any tracton, let me try a different tack.
> > >
> > > The password
> > >
> > >   TwasBrilligAndTheSlithyToves
> > >
> > > strikes me as a pretty good one for an ssh login. (I have capitalised
> > > some letters for readability, not to add complexity). Personally, I
> find
> > > it easy to remember and associate with ssh and my account. I cannot see
> > > why it is not a good password for me.
> >
> >   Why passwords have never been weaker—and crackers have never been
> stronger
> >   http://arstechnica.com/security/2012/08/passwords-under-assault/
> >
> >   Most importantly, a series of leaks over the past few years containing
> >   more than 100 million real-world passwords have provided crackers with
> >   important new insights about how people in different walks of life
> >   choose passwords on different sites or in different settings.  The
> >   ever-growing list of leaked passwords allows programmers to write
> >   rules that make cracking algorithms faster and more accurate; password
> >   attacks have become cut-and-paste exercises that even script kiddies
> >   can perform with ease.
> >
> > To summarize the problem it is that you as a human are unique in the
> > universe, just like everyone else.  Analyzing 100 million passwords
> > exposes the human bias that you introduce that you don't realize you
> > are introducing.  It is "big data" removing the uniqueness and
> > reducing the search space.
>
> A good article. There is a follow-up at
>
>
> http://arstechnica.com/security/2013/03/how-i-became-a-password-cracker/
>
> Although it affects a user, the lack of security at a site is not fixable
> by
> him and is not his responsibility. If usernames and hashes are exposed to
> an off-line attack I would agree the only certain protection is a long,
> complex password comprising random characters. It would be beyond the
> present techniques to match the hash in any realistic time.
>
> I am still going to maintain that "TwasBrilligAndTheSlithyToves" is a
> more than adquate password for logging in *on-line*. If I were to lack
> trust in the maintenence of security at a site I might consider a change
> of heart. But then - what would I base my judgement on. apart from the
> theoretcal possibility?
>
> > I won't say that the technique you show above is a bad thing.  But the
> > current wisdom is that it isn't good enough anymore because after
> > analyzing millions of real world passwords, programs can now guess
> > what humans will do much of the time.  So what you really need is
> > something other than what a human would produce.
>
> We are still on off-line cracking? How does this sound?
>
> Memorable passwords are good. Long, complex passwords are also good. One
> needn't exclude the other.
>
> I can remember "TwasBrilligAndTheSlithyToves" and associate it with an
> account.
>
> Before signing up I do
>
>     echo TwasBrilligAndTheSlithyToves | sha1sum | base64 | cut -c -30
>
> The output is what I give to a site as a password.
>
> Furthermore, before any future logins I can run the command again to get
> the same password. Isn't this on-line and off-line cracking taken care
> of?
>
> Date: Wed, 14 Jan 2015 21:56:53 +0000
> From: Brian <a...@cityscape.co.uk>
> To: debian-user@lists.debian.org
> Subject: Re: Have I been hacked?
> Message-ID: <20150114215653.gc15...@copernicus.demon.co.uk>
> Content-Type: text/plain; charset=us-ascii
> Content-Disposition: inline
>
> On Wed 14 Jan 2015 at 18:52:06 +0900, Joel Rees wrote:
>
> > 2015/01/13 5:17 "Brian" <a...@cityscape.co.uk>:
> > >
> > > strikes me as a pretty good one for an ssh login. (I have capitalised
> > > some letters for readability, not to add complexity). Personally, I
> find
> > > it easy to remember and associate with ssh and my account. I cannot see
> > > why it is not a good password for me.
> >
> > Just remember that fail2ban only does temporary tarpitting, and only if
> the
> > attacks are repeated to quickly.
>
> How about
>
>
> http://whyscream.net/wiki/index.php/Fail2ban_monitoring_Fail2ban#Warning:_pick_the_right_jail
>
> > > The automated probes wouldn't get close to cracking it.
> >
> > Think of a bot farm continuously hitting a crowd of targets, once a
> second,
> > cycling through spoofed IPs, using informed strategies instead of pure
> > brute force. If they can spoof one IP, they can spoof another.
>
> Does this increase the number of connections per second?
>
> > > The danger might
> > > be a directed attack - from friends, associates, colleagues etc. If
> they
> > > knew about my fixation on Lewis Carroll they might have a go at
> breaking
> > > in.
> >
> > If they think you have something they want, people you don't know will
> find
> > out about your interests. Blog posts, posts here, etc.
>
> 500,000.000 million on the internet at least. It's not my turn yet.
>
> > > Actually, it would be ok as a password for banking access too. There
> > > surely cannot be a banking site which does not take action after a
> > > number of failed logins. Maybe not using fail2ban, but a similar
> > > approach which protects both parties.
> >
> > Means you end up going to the bank in person, to get the lock removed.
>
> The telephone?
>
> People would be heavily critical if a bank did not take steps to monitor
> logins and act on unusual activity.
>
> > Banks aren't perfect, though. You could come to considerable trouble
> > should, for instance, a bank employee decide to do a little investigating
> > passwords in her spare time, without permission.
> >
> > But it's your bank account. Go for it.
>
> I have no knowledge or control over what goes on in a bank, Why lose
> sleep over worrying about it?
>
> Date: Wed, 14 Jan 2015 16:28:14 -0600
> From: John Hasler <jhas...@newsguy.com>
> To: debian-user@lists.debian.org
> Subject: Re: Have I been hacked?
> Message-ID: <87oaq1dmkh....@thumper.dhh.gt.org>
> Content-Type: text/plain
>
> Brian writes:
> > I can remember "TwasBrilligAndTheSlithyToves" and associate it with an
> > account.
>
> > Before signing up I do
>
> >    echo TwasBrilligAndTheSlithyToves | sha1sum | base64 | cut -c -30
>
> > The output is what I give to a site as a password.
>
> > Furthermore, before any future logins I can run the command again to get
> > the same password.
>
> Or you can install one of the software packages that do that for you.
> --
> John Hasler
> jhas...@newsguy.com
> Elmwood, WI USA
>
> Date: Wed, 14 Jan 2015 18:01:18 -0500
> From: Gary Dale <garyd...@torfree.net>
> To: debian-user@lists.debian.org
> Subject: Re: problem with corrupted root password
> Message-ID: <54b6f53e.60...@torfree.net>
> Content-Type: text/plain; charset=windows-1252; format=flowed
> Content-Transfer-Encoding: 7bit
>
> On 14/01/15 04:26 PM, Rob Owens wrote:
> > On Wed, Jan 14, 2015 at 03:07:09PM -0500, Comer Duncan wrote:
> >> I recently got wheezy up and running.  I installed xfce4 and like it.
> >>
> >> However, today in the process of trying to spawn a root terminal (in
> >> Accessories) and going through a cycle of trying to get authorized but
> >> being prevented by repeated complaints that the system password I used
> was
> >> not correct, I now find that I can not get logged in in single-user
> mode!
> >> I have thus royally screwed up.  So, how can I get the system password
> >> changed to something new?
> >>
> >> Thanks for help and apologies for making such an error.
> > Boot using a Live CD, then as root:
> >
> > mount /dev/sda1 /mnt/sda1 (or whatever device is your root partition)
> > chroot /mnt/sda1
> > passwd
> I'd change the chroot command to
>    chroot /mnt/sda1 bash
>
> to ensure you get the correct shell. System Rescue CD, for example, uses
> zsh by default so chrooting with specifying the shell will get you a
> not-found error.
>
> Date: Wed, 14 Jan 2015 17:37:04 -0700
> From: Bob Proulx <b...@proulx.com>
> To: debian-user@lists.debian.org
> Subject: Re: Have I been hacked?
> Message-ID: <20150114172259240251530.noccsple...@bob.proulx.com>
> Content-Type: multipart/signed; micalg=pgp-sha1;
>         protocol="application/pgp-signature"; boundary="fUYQa+Pmc3FrFX/N"
> Content-Disposition: inline
>
> --fUYQa+Pmc3FrFX/N
> Content-Type: text/plain; charset=us-ascii
> Content-Disposition: inline
> Content-Transfer-Encoding: quoted-printable
>
> Brian wrote:
> > Bob Proulx wrote:
> > > Brian wrote:
> > I am still going to maintain that "TwasBrilligAndTheSlithyToves" is a
> > more than adquate password for logging in *on-line*. If I were to lack
> > trust in the maintenence of security at a site I might consider a change
> > of heart. But then - what would I base my judgement on. apart from the
> > theoretcal possibility?
> >=20
> > > I won't say that the technique you show above is a bad thing.  But the
> > > current wisdom is that it isn't good enough anymore because after
> > > analyzing millions of real world passwords, programs can now guess
> > > what humans will do much of the time.  So what you really need is
> > > something other than what a human would produce.
> >=20
> > We are still on off-line cracking? How does this sound?
>
> Oops.  You caught me.  Everyone else continued to talk about offline
> cracking and I had pretty much given up and lost track of the topic.
> But you were specifically said online and emphasized it.  My bad.
>
> Although I was trying to address specifically the trust in site
> security.  It is only a matter of time before a high profile site is
> so mired in its own bureaucracy that they lose track of its own
> security and expose this information.  Historically speaking.
>
> But the original poster was talking about a personal Debian system.
> For a personal system one could probably get away with using a pretty
> weak password.  Your password method would be a pretty strong one for
> a personal system.  If the system is compromised to the point that
> /etc/shadow with the hashes exposed for an offline attack then you
> should scrape it clean and install from known good pristine sources
> and start again using all different passwords than before.  The weak
> password wouldn't have been the problem in that case.  The attack
> could only have only have come through some other vector into the
> machine.
>
> Bob
>
> P.S.  Before leaving remote web sites entirely behind...
> Most important is to use a unique password per site.  Then using a
> strong password only if I care about having that data cracked.  I use
> my fair share of weak throwaway passwords on weak throwaway sites.
> But I never reuse them across sites.
>
> --fUYQa+Pmc3FrFX/N
> Content-Type: application/pgp-signature; name="signature.asc"
> Content-Description: Digital signature
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
>
> iEYEARECAAYFAlS3C7AACgkQ0pRcO8E2ULbg5QCffKfvVuN/u3HLdIxvcszWad8F
> nIcAnRMtL5YwMXAg/RjmRBBqVmrJRSK5
> =yJmm
> -----END PGP SIGNATURE-----
>
> --fUYQa+Pmc3FrFX/N--
>
> Date: Wed, 14 Jan 2015 17:44:10 -0700
> From: Bob Proulx <b...@proulx.com>
> To: debian-user@lists.debian.org
> Subject: Re: Disable server so it does not start on reboot (even after
>  upgrade)?
> Message-ID: <20150114173803291331115.noccsple...@bob.proulx.com>
> Content-Type: multipart/signed; micalg=pgp-sha1;
>         protocol="application/pgp-signature"; boundary="V0207lvV8h4k8FAm"
> Content-Disposition: inline
>
> --V0207lvV8h4k8FAm
> Content-Type: text/plain; charset=us-ascii
> Content-Disposition: inline
> Content-Transfer-Encoding: quoted-printable
>
> Tony Baldwin wrote:
> > Andrei POPESCU wrote:
> > > Xavi wrote:
> > > > First I do:
> > > >=20
> > > > sudo update-rc.d -f apache2 remove
> > > >=20
> > > > and then, to assert the rc.d links are not recreated,=20
> > > > I recreate them stopped in all runlevels:
> > > >=20
> > > > sudo update-rc.d apache2 stop 80 0 1 2 3 4 5 6 .
>
> Was that associated with some previous thread?
>
> > > Or one could just use 'disable'.
>
> Or it could be removed.  Why have it installed if it isn't going to be
> running?
>
>   apt-get remove apache2
>
> Personally I "purge" instead of remove but I know I have etckeeper
> keeping /etc backed up along with a real off system backup too.  So I
> can purge things without thinking knowing if I didn't want that I
> could recover the /etc conffiles from backup.
>
> > Couldn't you just turn apache2 off in rcconf?
>
> If one mentions rcconf then one might as well mention chkconfig too.
> Basically the same thing but perhaps more familiar to people coming
> =66rom other software distributions.
>
> > Or did I miss something in this thread?
>
> This thread has little context.  :-(
>
> Bob
>
> --V0207lvV8h4k8FAm
> Content-Type: application/pgp-signature; name="signature.asc"
> Content-Description: Digital signature
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
>
> iEYEARECAAYFAlS3DVoACgkQ0pRcO8E2ULagBQCfWv93IvWIUsAX4OuXJPBKM7j/
> rOcAn08B5LNVbI5dMZl/GGTwWLzaiZfn
> =BMsG
> -----END PGP SIGNATURE-----
>
> --V0207lvV8h4k8FAm--
>
> Date: Wed, 14 Jan 2015 17:51:35 -0700
> From: Bob Proulx <b...@proulx.com>
> To: debian-user@lists.debian.org
> Subject: Re: problem with corrupted root password
> Message-ID: <20150114174838299279820.noccsple...@bob.proulx.com>
> Content-Type: multipart/signed; micalg=pgp-sha1;
>         protocol="application/pgp-signature"; boundary="t0UkRYy7tHLRMCai"
> Content-Disposition: inline
>
> --t0UkRYy7tHLRMCai
> Content-Type: text/plain; charset=us-ascii
> Content-Disposition: inline
>
> Comer Duncan wrote:
> > However, today in the process of trying to spawn a root terminal (in
> > Accessories) and going through a cycle of trying to get authorized but
> > being prevented by repeated complaints that the system password I used
> was
> > not correct, I now find that I can not get logged in in single-user mode!
> > I have thus royally screwed up.  So, how can I get the system password
> > changed to something new?
>
> Did you get added to the sudo group?  If you are lucky then you did
> and you can use your own password instead of root.
>
>   $ sudo passwd root
>   $ su -
>   #
>
> Worth a try.  Remember that sudo asks for your password not root's
> password.  Also you can use sudo to list what sudo actions are
> available to you.
>
>   $ sudo -l
>
> Bob
>
> --t0UkRYy7tHLRMCai
> Content-Type: application/pgp-signature; name="signature.asc"
> Content-Description: Digital signature
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
>
> iEYEARECAAYFAlS3DxcACgkQ0pRcO8E2ULZk0QCdG1JY1xrM7XMgYa3twd2nxsHA
> qk8AnRY3QoKE7Q/AfQqrcW6qcPa78Q1v
> =ad3/
> -----END PGP SIGNATURE-----
>
> --t0UkRYy7tHLRMCai--
>
>

Reply via email to