1, insert the system installation CD, restart the machine, press the Del button quickly when booting, enter the CMOS, change the boot sequence to the CD first, then start the Linux installation program, press F5, press the prompt to enter Linux Return to the rescue mode, enter the rescue mode, then select the language and keyboard, you can directly press Enter, the program prompts that the Linux system on the hard disk has been installed to /mnt/sysimage, and then the super user prompt #.
2, enter the hard disk etc directory: cd /mnt/sysimage/etc, first do backup anti-failure:
cp shadow shadow.old modify the shadow file properties to be writable: chmod +w Shadow Then use vi to modify it: find the line containing the root user information: root: ...:, the first two colons are encrypted passwords, delete it (colon can not be deleted), save and exit. Thus the root password is empty 1Y0-308.
not be taken with the user's vi follows: find a DOS floppy disk is inserted, the Shadow copy to DOS disk: mcopy shadow a: /Windows CCIA Then at annex Notepad with SCSA Modify it, pay attention to open the file type must select all files (*.*), save and exit. Finally, copy it back: mcopy a:/shadow mnt/sysimage/etc
3. Change the Shadow property back to read-only: chmod -w shadow, and finally enter Exit to exit and remove the CD.
4, for safety reasons, after the restart to give should add root password in a terminal window
First, what is haproxyHAProxy provides high availability, load balancing, and agents based on TCP a
Installation instructions 1, this installation package can be deployed on all Linux systems of Alib
The network is often dropped. Many technicians think that the router is unstable. The ac
Preparation before erection: To set up a DNS server, you must install a software program that provi
How to view the operation record after user login under Linux
In-depth study on Lvs scheduling strategy
Restart Apache commands under Linux
Why is the linux system newly mounted partition already used more than 100 M space
Linux System Bash Vulnerability Fixing Method
Method of operating a Bluetooth phone in the Linux operating system, the so-called
Remote connection in Linux SSH and VNC graphics mode
What is the difference between Linux process priority NI and PR?
Let Windows 2000 services run better
Win 7 Device Manager Causes Explorer.exe to Crash
The safe delete hardware icon in the lower right corner of Win7 is missing. How to do
Some tips on how to redirect in Linux I/O
Vista modify the registry to completely disable the control panel
Windows10 system prompts "Workback version is out of date" solution
Win8 system LOL can not be installed solution
Solve the problem of Windows 7 playing games can not start or can not full screen, etc.