Retrieve password for Fedora 14 [closed] - linux

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
Hello I use a Fedora 14 VM on my Macbook pro. I haven't logged into it for a while and now I have forgot its password, I am trying to see if there is a way I could retrieve my password. I have looked around on google, and all I get is how to change a root password, but I am not looking for that.
I am stuck at the initial login screen, and am trying to see if I can retrieve my password.

Ok, all i needed was a little patience. Below link would help us as to how to modify the password.
This one shows how to edit password for root, if someone wants to change the password for a user, then it has to be passwd username.
http://www.labtestproject.com/using_linux/step_by_step_to_reset_change_root_password_on_fedora_10
Hope this helps someone.

If you can still have full access to grub, you can add the argument "init=/bin/sh" to the kernel argument, and then boot the system. This will bring you directly to the shell (no password is asked). From there you can modify the /etc/passwd file as ease and get your system back to work.

Related

Can a malware prompt the user to type the system password? [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 7 years ago.
Improve this question
On OS X, when I install new software, the system pops up a dialogue window and asks me to input administrator password.
Is it possible that some malware pops up a window which is exactly the same as the real one, except that it stores the password and send it somewhere?
// Update
The password of my local machine would be useful:
1, when a hacker has already got into my system, and need my password to execute priviledged commands;
2, when a hacker has already got my account name, and only need a password to hack into my account. Many people use a single password in a number of places and the local password is a good guess for the account's password.
yes it is.
why should it not be possible? it even sounds to hard to write such a behavior for a malware.
but actually i dont know why a malware want to send your the administration password from your local computer to someone.
//#update
yeah for sure u can use a password for some things, but if u are able to create a malware, which gets acces to a computer to sniff your passwort for the local account, you should be also able to do this stuff without having the password.
for sure, many malwares want to get passwords, but they normally try to get passwords for onlineaccounts or your banking account.
but at last the answer of your question still is: yes it is possible

Linux box is full. I am not able to login to linux box. [closed]

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
In one of my linux box, some program (database archiver process) has consumed all the space available. I am not able to access this box using ssh username# so that I can login to box and do the clean up and fix the rouge process. Could you please let me know how we can connect this box in such scenario.
If it is local machine, unattachment the hard drive and then connect it with another PC then manually remove extra files there.
You will have to login as root.
If you have physical access to the machine, boot a live version of your linux from CD/DVD/USB. From there you can get a root shell, mount the drive, and clean it up.

Limited permissions on linux [closed]

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
I want to give a specific user on Linux some privileges to enable him to run commands like shutdown or apt-get. I don't want to use the SUID bit since there are other users that I don't want to let them use these commands.
How do I do something like this?
sudo would probably be the easiest way to do this. You'll want to add something like the following to the sudoers file
username ALL=(ALL) /sbin/shutdown, /usr/bin/apt-get
where username is replaced with the user's actual username. You should be able to google for some examples - here is one such page.
Editing the sudoers file can be done safely by using the visudo program.

How can I check the history of my centos VPS? Linux [closed]

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
I'm about to hand out my root server password to a company for them to fix an issue that I have with mydns.
I'm sure they are all above board (and I will change the root password after they have finished) but I just want to be sure.
I know (well I think) I can login after them and execute history to see what they did, but I know if they are dishonest, they can just clear the history. I'm worried in case a rogue employee does something malicious or installs keylogging software (which has happened when my mate let another company manage his VPS).
So is there anything I can do? Does the history command backup somewhere? Can I install a keylogger to verify the commands they execute are not malicious?
Any ideas welcome. Ideally I appreciate I shouldn't give out my root password if I don't trust them. But I am in a very difficult situation and have no choice.
Since you are giving them root access, there is nothing you can do from within the machine that they could not subvert with a rootkit.
Your only way to be sure would be to mount the filesystem in another machine and compare the changes made to the files by comparing with a previously made snapshot/backup.

Sign script in Linux for SSH access [closed]

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
I want grant user rights to copy a specific file from a remote server via SSH. And I do not want to give him any opportunity to execute something else on a remote server.
I have an access to a remote machine but I'm not an adimistrator, and I want to give another user possibility to copy specific file but nothing else.
Is there any way to sign a script in linux to avoid modification of this script or something similar that could help?
There is a solution to restrict SSH run only specific command:
http://chihungchan.blogspot.com/2008/08/restrict-ssh-to-run-specific-command.html

Resources