09-09-2001
lost root password using (SAM) trusted security
I have used the system administration management trusted security system and in the process the root password have been changed or lost.
Is there any possible way to recover root status after this incident
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I've forgotten root password on one of Solaris machines, i searched in forumes to find a similar case but there's no proceudre here to reinintialize root password, cause most of related commands & even single user mode needs root password that i don't have.
Any solution would be helpful.
--rgrds,... (9 Replies)
Discussion started by: nikk
9 Replies
2. UNIX for Advanced & Expert Users
Hello ...
I lost my password root !
maybe someone can to help me to log in HP_UX,
i started the server in " Singel - User" and i changed my
password to new password and it`s not working ..
what i must to do ??? (4 Replies)
Discussion started by: yanly
4 Replies
3. UNIX for Advanced & Expert Users
I have recently become the sys adm guy for our unix systems here for my shop. I have a pretty good understanding of the system, but there is just some stuff that I don't know. Right now one of those things is to recover the password for a unix system.
I know that there is a way that you can use... (2 Replies)
Discussion started by: GlockCW
2 Replies
4. Answers to Frequently Asked Questions
We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies
5. Linux
wish to know how to access root password it root password is forgotten in linux (1 Reply)
Discussion started by: wojtyla
1 Replies
6. UNIX for Dummies Questions & Answers
I'm attempting to blank out the root user password on a machine that we have forgotten the password for. I have been using the advice posted on this site to boot from CDROM in single user mode, then mounting the root slice and editing the /etc/shadow file. Each time I save the shadow file and... (1 Reply)
Discussion started by: gonzotonka
1 Replies
7. UNIX for Advanced & Expert Users
This is a common question im sure... I bought a RS/6000 Model 240. Aix 4.3.3 loaded. No root password was supplied to me, but I do have the install media (4 disks). I want to drop into maint mode. So I place the cd into the drive, restart the box ( by pressing the power button, since i do not have... (3 Replies)
Discussion started by: JoeJohnSmith
3 Replies
8. SCO
I dont have the cds, what can i do? (2 Replies)
Discussion started by: sopapa
2 Replies
9. SCO
Hi All,
It seems that someone in my organization had changed the root password
on a SCO Openserver 6 box.
Apparently, there are no emergency boot disks. I think they were never
created because there is no floppy drive on the machine. I've tried to
use the Openserver 6 media installations... (2 Replies)
Discussion started by: gseyforth
2 Replies
10. Solaris
Hi All
Hope it's okay to post on this sub-forum, couldn't find a better place
I've got a 480R running solaris 8 with veritas volume manager managing all filesystems, including an encapsulated root disk (I believe the root disk is encapsulated as one of the root mirror disks has an entry under... (1 Reply)
Discussion started by: sunnyd76
1 Replies
LEARN ABOUT REDHAT
hosts.equiv
HOSTS.EQUIV(5) Linux Programmer's Manual HOSTS.EQUIV(5)
NAME
/etc/hosts.equiv - list of hosts and users that are granted "trusted" r command access to your system
DESCRIPTION
The hosts.equiv file allows or denies hosts and users to use the r-commands (e.g. rlogin, rsh or rcp) without supplying a password.
The file uses the following format:
[ + | - ] [hostname] [username]
The hostname is the name of a host which is logically equivalent to the local host. Users logged into that host are allowed to access like-
named user accounts on the local host without supplying a password. The hostname may be (optionally) preceded by a plus (+) sign. If the
plus sign is used alone it allows any host to access your system. You can expicitly deny access to a host by preceding the hostname by a
minus (-) sign. Users from that host must always supply a password. For security reasons you should always use the FQDN of the hostname
and not the short hostname.
The username entry grants a specific user access to all user accounts (except root) without supplying a password. That means the user is
NOT restricted to like-named accounts. The username may be (optionally) preceded by a plus (+) sign. You can also explicitly deny access to
a specific user by preceding the username with a minus (-) sign. This says that the user is not trusted no matter what other entries for
that host exist.
Netgroups can be specified by preceding the netgroup by an @ sign.
Be extremely careful when using the plus (+) sign. A simple typographical error could result in a standalone plus sign. A standalone plus
sign is a wildcard character that means "any host"!
FILES
/etc/hosts.equiv
NOTE
Some systems will only honor the contents of this file when it has owner root and no write permission for anybody else. Some exceptionally
paranoid systems even require that there be no other hard links to the file.
SEE ALSO
rhosts(5), rshd(8), rlogind(8)
Linux 1995-01-29 HOSTS.EQUIV(5)