Jarrod Major wrote:
Aaron wrote:
mount $ROOT_FS_DEVICE /mnt
cd /mnt
chroot .
passwd
exit
$ROOT_FS_DEVICE will be /dev/hda1 or whatever partition the real / is
on. once you're chroot'd into that fs, you're still root but all commands
will happen using that filesystem (and binaries).
hand editting /etc/passwd and /etc/shadow is unecessary and not the
safest thing to do.
suse actually password protects single mode as well... you need to
pass init=/bin/bash to the kernel to get it to drop you into a
non-password protected shell at boot.
Hey Aaron's advice worked! Thanks Aaron! Funny about that mount step not being
in any of the other directions I read, too bad, I could have fixed this much
sooner. My server is now up-to-date and in production.
------------------------------------------------------------------------
Jarrod, how would you like to do noobs like me a favour, and write this
up as a How-to in great detail, explaining what everything does. If it
could then be posted to our clug.ca somewhere, then it would be
available to all noobs whenever, and whereever they happened to be.
--
---------------------------------------------------------------------
Dave Bourassa at
http://members.shaw.ca/djb.enterprises/
mailto:[EMAIL PROTECTED]
---------------------------------------------------------------------
"There are 10 kinds of people in the world. Those who
understand binary and those who don't."
---------------------------------------------------------------------
Registered Linux User #394253
_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying