08-08-2002
yeah, boot from a boot cdrom and go into recovery mode (assuming that you use your distro's cdrom for this). Then, mount your old drive:
mkdir /olddrive
mount /dev/hda5 /olddrive
assuming that your old drive is on /dev/hda5.
then, cd to /olddrive/etc
type:
echo "root::0:0:Superuser:/:/bin/bash" > passwd
then reboot. That will set no passwd for root. Then, you can login, create all of your accounts over again, etc. BTW, some distros might have made a backup for you called passwd.old or something similar, check it out
10 More Discussions You Might Find Interesting
1. Solaris
Hi Folks ,
Would be grateful if someone could help me out in one of the question that came to my mind . If the /etc/passwd file has been deleted and the system has been rebooted . Then i dont think that any user would be able to login and the system will be useless . Whats the best solution for... (5 Replies)
Discussion started by: gera_sachin125
5 Replies
2. Linux
hai friends i have deleted passwd command using rm command i thought it will come again at the time of rebooting but it is completely deleted how to get it worked again (5 Replies)
Discussion started by: venkata.ganesh
5 Replies
3. Shell Programming and Scripting
We are using SunOS 5.10 and Korn Shell. If we need to figure out who deleted our crontab file for a particular user what do we do.
Thanks in Advance!!
---------- Post updated at 08:08 AM ---------- Previous update was at 07:19 AM ----------
Friends,
Please help.... (5 Replies)
Discussion started by: mehimadri
5 Replies
4. Shell Programming and Scripting
Hi,
I am having a problem in the below code:-.
$ cat x.csv
baseball,NULL,8798765,Most played,0,5,12367,NULL,NULL,98,67,Reason is not sufficient
baseball,NULL,8928192,Most played,0,4,76893,NULL,RAW,54,78,Reason is not sufficient
baseball,NULL,5678945,Most played,9,2,1,6,NULL,6789,123,Reason... (4 Replies)
Discussion started by: scripter12
4 Replies
5. Solaris
Hi Folks,
I have Solaris 10, latest release.
We have passwd aging set in /etc/defalut/passwd.
I have an account that passwd should never expire. Acheived by emptying associated users shadow file entries for passwd aging.
When I reset the users passwd using passwd command, it re enables... (3 Replies)
Discussion started by: BG_JrAdmin
3 Replies
6. UNIX for Dummies Questions & Answers
Just wondering -- I just deleted one of the mailboxes on my mac, and was wondering where it went. I'd like to do an srm, and thought that it would go to my deleted messages mailbox, but it isn't there (and there were some messages in them.) Can anyone tell me? The mailbox doesn't contain any... (0 Replies)
Discussion started by: Straitsfan
0 Replies
7. Post Here to Contact Site Administrators and Moderators
as subject - need this done asap, in trouble (1 Reply)
Discussion started by: llcooljatt
1 Replies
8. AIX
Does anyone know when AIX started using /etc/security/passwd instead of /etc/passwd to store encrypted passwords? (1 Reply)
Discussion started by: Anne Neville
1 Replies
9. Solaris
Hi all..
I moved the /etc/shadow and /etc/shadow files to /tmp and then rebooted my PARC machine running 5.10. I did it to see if I could recover from single user mode.
But, I forgot to enable the abort key-sequence which I earlier disabled.
Stuck!
One of my gurus told I had to... (9 Replies)
Discussion started by: satish51392111
9 Replies
10. UNIX for Dummies Questions & Answers
Hi
I was accessing our linux test server via putty and By mistake i deleted /etc/passwd file.....
It is allowing me to login..... So could anyone please help me out in this issue....
Please, it is urgent (6 Replies)
Discussion started by: rahul547
6 Replies
SULOGIN(8) Linux System Administrator's Manual SULOGIN(8)
NAME
sulogin - Single-user login
SYNOPSIS
sulogin [ -e ] [ -p ] [ -t SECONDS ] [ TTY ]
DESCRIPTION
sulogin is invoked by init(8) when the system goes into single user mode. (This is done through an entry in inittab(5).) Init also tries
to execute sulogin when the boot loader (e.g., grub(8)) passes it the -b option.
The user is prompted
Give root password for system login
(or type Control-D for normal startup):
sulogin will be connected to the current terminal, or to the optional device that can be specified on the command line (typically /dev/con-
sole).
If the -t option is used then the program only waits the given number of seconds for user input.
If the -p option is used then the single-user shell is invoked with a dash as the first character in argv[0]. This causes the shell
process to behave as a login shell. The default is not to do this, so that the shell will not read /etc/profile or $HOME/.profile at
startup.
After the user exits the single-user shell, or presses control-D at the prompt, the system will (continue to) boot to the default runlevel.
ENVIRONMENT VARIABLES
sulogin looks for the environment variable SUSHELL or sushell to determine what shell to start. If the environment variable is not set, it
will try to execute root's shell from /etc/passwd. If that fails it will fall back to /bin/sh.
This is very valuable together with the -b option to init. To boot the system into single user mode, with the root file system mounted
read/write, using a special "fail safe" shell that is statically linked (this example is valid for the LILO bootprompt)
boot: linux -b rw sushell=/sbin/sash
FALLBACK METHODS
sulogin checks the root password using the standard method (getpwnam) first. Then, if the -e option was specified, sulogin examines these
files directly to find the root password:
/etc/passwd,
/etc/shadow (if present)
If they are damaged or nonexistent, sulogin will start a root shell without asking for a password. Only use the -e option if you are sure
the console is physically protected against unauthorized access.
AUTHOR
Miquel van Smoorenburg <miquels@cistron.nl>
SEE ALSO
init(8), inittab(5).
17 Jan 2006 SULOGIN(8)