Alyce,

> Thanks, Mike?should I IPL in single user mode to do your suggested steps 
below?
No, IPL the install system (e.g. SLES10S2 EXEC) - you see this puts an 
install system into memory and on the network, but then you have access to 
the affected disk (the one with the /etc/shadow that has the encrypted 
root password that was forgotten/changed) - so the root password on 
/dev/dasda1 is just a file system to the Linux in memory.  When you 
"chroot" its like warping into another dimension (of course that dimension 
may need other file systems mounted to do the warping :))  Report back if 
you run into that issue.

Does this make sense?

"Mike MacIsaac" <mike...@us.ibm.com>   (845) 433-7061

Reply via email to