1, insert the system installation CD, restart the machine, press the Del button quickly when booting, enter the CMOS, change the boot sequence to the CD first, then start the Linux installation program, press F5, press the prompt to enter Linuxrescue Enter, enter the rescue mode, the next is to select the language and keyboard, you can directly press Enter, the program prompts that the Linux system on the hard disk has been installed to /mnt/sysimage, and then the super user prompt #.
2, enter the hard disk etc directory: cd /mnt /sysimage /etc, first do backup anti-failure:
cpshadowshadow.old modify the shadow file properties can be written: chmod + wshadow and then modified with vi: Find the line containing the root user information: root:....:, the encrypted password between the first two colons, delete it (the colon can not be deleted), save and exit. This way the root password is empty.
Users who do not use vi can take the following methods: find a DOS disk into the floppy disk drive, copy the Shadow to the DOS disk: mcopyshadowa: /then modify it with the notepad in the attached file under Windows, pay attention to open the file type Be sure to select all files (*.*) and save them. Finally, copy back:
mcopya:/shadowmnt/sysimage/etc
3. Change the Shadow property back to read-only: chmod-wshadow, and finally enter Exit to exit and remove the CD.
4. For security reasons, you should add a password to root in the terminal window after restarting.
In order to ensure the normal operation of the Linux system and accurately solve various system prob
Generally speaking, after installing ubuntu, the centralized display driver has been installed. Howe
Linux is a derivative of Unix operating system , Linux has built-in tools to view the current proce
The use of X capacitors and Y capacitors, and their differences: 1. DC blocking 2. Bypass 3. Coupl
The difference between Linux and Windows system threads
Under linux rm delete non-empty directory
Package installation method under Linux
Under the Linux operating system to prevent hacking skills
Configure Network Bonding on CentOS 6 /RHEL 6
Using Linux System IP Masquerading Against Hacker Attacks
Linux system (Debian and Ubuntu) completely remove wine
CentOS Linux lftp command backup file
Smart Win7 system search does not leave traces of history
What should I do if the Win8 system restarts after blue screen or blue screen?
Combined shortcuts in Windows 7 system
Windows10 can't be installed. Prompt error 80240016 What to do
What can I do if I can't delete Baidu browser under Win7 system?
How does the Win10 Mobile system keyboard cursor controller adjust the left and right position?
Use Windows 7's own backup tool