Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
some linux systems can be booted into single user mode without asking for a password. then u could change the passwords if u'd like.
when u see the lilo prompt, type:
(assuming that linux is the label that boots ur linux partition, if not use the label u set up and add " 1" to it)
i don't know if red hat asks for a passwd when u boot into single user mode, but if it doesn't ur now able to change the passwords. if it does ask for the root passwd, then i guess this was a useless post
the best way to solved this problem is by using a rescue disc.
you need to boot either from a floppy, a cd or even another linux bootable partition on cd. then you mount you own linux partition in /mnt for an example (e.g. mount /dev/hda1 /mnt) then you can edit your password file(s) as /mnt/etc/passwd (and /mnt/etc/shadow if you have a shadow password file) there you will find one line per user with different fields separated by columns (":"). on each line second field is the password (please check this because I don't have the doc near me, right now) it can have 4 different kind of values : "" if there is no password (shouldn't be the case), "*" if there is no valid password (when this user is there for system needs but nobody will use it to logon), a cryptic string with which you password will be controled, an 'x' (in passwd) which means that the cryptic value is stored in the shadow file.
the solution is to set this field to "" in (both) the file(s) (for user root) so that you can then restart the computer and logon with no password.
If having the root password temporarily set to blank is a security issue, I think you could change the password without rebooting by using the following command : "chroot /mnt passwd root"... but I never tried this by myself, and i'm not sure there are no risks. Another solution would be to disconnect all network devices when doing this.
masterc, no he can't log in at all, therefore he needs to nuke the root password, which ALL distros will allow, exluding some systems which have had security systems like bastille specifically installed.