Probably most people here know this, but for those that don't:
the way to protect sensitive data is to cipher it, wether as a ciphered
partition (CFS) or, if that's too slow, there are other ways
on the same principal.
these tools require another password (a "mount" password) for accessing
the oprotected data, /etc/passwd (or other files) do not change a thing.
that way, people can trash your data, but not copy it.
--Guy.
> So what? You just can use Norton Disk Editor or whatever to find the
> /etc/passwd on raw disk and wipe root password. I did it once when I was
> young and did not know about init=/bin/sh. If you have means to access a
> device circumventing OS mechanisms, you have Full Control (TM) on the
> device anyway, with or without driver.
>
> --
> [EMAIL PROTECTED] \/ There shall be counsels taken
> Stanislav Malyshev /\ Stronger than Morgul-spells
> phone +972-3-9316425 /\ JRRT LotR.
> http://sharat.co.il/frodo/ whois:!SM8333