add the following line to menu.lst password --md5 MD5_SUM_OF_YOUR_PASSWORD
after creating the password md5sum of your password, using grub > md5crypt. This is NOT by any means, a very good security measure. It's just a way to stop a lazy attacker or your little brother. The rule still applies that if you have physical access to the box, you can do what whatever you want. If you want to be serious about protecting a system from physical attacks, you'll need to look at encrypting the entire hard drive. Ref: http://www.markmmanning.com/blog/labels/Linux.html And the password can be reset very simple by a live cd. 1) Get a recovery CD (usually any installation CD will do it) 2) Boot the system off the CD 3) Hit Ctrl F2 or Ctl F3 -- get a shell (you are not in single user mode you are in the Highest level: Creator mode -- in this mode you are not playing at being GOD, you are GOD (root pretends to be GOD, it isn't) 4) Mount the slice that has the passwd file (hopefully the volume isn't encrypted (all mine are...) 5) vi /mount/path/etc/shadow (on the line with root - usually something like this: root:<--- Edit this part Out --->:14685:0:99999:7::: Edit the section between the 1st two colons (the section indicated by <--- Edit this part Out ---> ...)) 6) Reboot without CD Learn More: http://www.gnu.org/software/grub/manual/grub.html#Security -- Anoop Jacob Thomas http://anoop.caremedia.org -- "Freedom is the only law". "Freedom Unplugged" http://www.ilug-tvm.org You received this message because you are subscribed to the Google Groups "ilug-tvm" group. To control your subscription visit http://groups.google.co.in/group/ilug-tvm/subscribe To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For details visit the google group page: http://groups.google.com/group/ilug-tvm?hl=en
