>|> Boot from CD and remove the corrupted root password (or enter a
>|> known crypted password in /etc/shadow (I think /etc/shadow is
>|> corrupted and not /etc/passwd!)
> If this works, it implys that setting up a single user root
>password is useless.
No, no no. That's why you can (and should IMHO) set up an eeprom
password. The boot monitor can operate in three different modes:
-- no security
-- some security (you can boot without the password but CAN'T supply
any boot parameter -- like 'boot cdrom')
-- max. security (you can't do anything without the password).
Yes, I know: you can still 'brake his' but it requires hardware
intervention (and you risc the life of the machine), but you can
not protect the machine against a hardware hacker: I just unplug the
disc, take it home, plug it into my machine as a second disc, and
I'm done.
Gyula
--
| When I am weaker than you, I ask you for freedom because that is according|
|to your principles; when I am stronger than you, I take away your freedom|
|because that is according to my principles. -- Frank Herbert|