Since you can boot from a CD, you can
1) Run fsck on your "real" drives from the CD without mounting them (which is what you should have done).
2) Mount your "real" file system and chroot to it, and then set (or unset) the "root" password using the usual tools. (No need to know your "root" password for this since you are already logged in as "root" from the CD).
So, first, not giving you the root password but letting you boot from CD was rather foolish on the part of the management that didn't want you to have it. And, second, disabling the root account (which is all removing the root password accomplishes) has no deleterious consequences.
<edit>
If you "report" your post, the moderator(s) might move it to the Security forum where you might get more targeted responses.
</edit>
Note that Ubuntu installs with "root" disabled, and works quite well. (Personally, I like to be able to work on administration tasks as "root," so I always enable "root" on my systems, but most Ubuntu users don't bother to do so.)
Last edited by PTrenholme; 12-12-2010 at 03:02 PM.
|