Greg Thomas wrote:
>
> > In reply to the infamous question, "Forget your LINUX root password???",
> > the reply is:
> >
> > "The best way to fix this is to start Linux in single user mode (runlevel
> > 1).
> > You can do this by typing linux single at the lilo prompt. After the kernel
> > loads you will be left at a bash prompt logged in as root. At this point you
> > can change your password with the passwd command. To continue onto
> > multi-user
> > mode (run level 3) just hit 'ctrl d'. That should do it."
> >
> > How can an Admin maintain 'any' security???
>
> By physically securing your machine. Somebody else may point out lilo
> passwords and BIOS passwords, also.
This is not the only way to secure your system, otherwise we are saying
that linux is a poor os for enterprise applications.
First, you must do the above, as well as disabling booting from floppy
in the BIOS. There is also a way to use sulogin from inittab to require
a password when booting into single user mode. Look up cryptographic
filesystems and such. It all depends on who you're trying to keep out,
and for how long.
The Security HOWTO and books on security are good places to start. Then
on to sites like rootshell, l0pht, and antionline for more info.
Security isn't impossible, it's just a full time education :-)
--
lunaslide * PGP key->pgpkeys.mit.edu port 11371
* * * * * *
Yep. I have a very active imagination; it's been a personal
condition of mine for years now. * -Bruce Sterling
* * * * *
-
To get out of this list, please send email to [EMAIL PROTECTED] with
this text in its body: unsubscribe suse-linux-e
Check out the SuSE-FAQ at http://www.suse.com/Support/Doku/FAQ/ and the
archive at http://www.suse.com/Mailinglists/suse-linux-e/index.html