Another, dirtier option is to boot using init=vi as a kernel option. This will bypass single use password protection as well.
> -----Original Message----- > From: sentinel [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, February 04, 2003 7:19 PM > To: [EMAIL PROTECTED] > Subject: RE: Recover root password > > If that's the case then I recommend booting into another environment, > mounting your root disk and removing the root password. I like the > following distro for recovering from emergencies such as this > > http://www.toms.net/rb/ > > If the password is not stored in /etc/passwd then most likely he's using > shadow passwords. Remove the password from /etc/shadow and reboot. > > > > > > ----------------------------------- > If he's put a password on the single bootup option, he's hosed. > He'll have to crack the password file - but I'm thinking that the > root password is not stored there... > > > > -- > redhat-list mailing list > unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe > https://listman.redhat.com/mailman/listinfo/redhat-list -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe https://listman.redhat.com/mailman/listinfo/redhat-list