Linux Lite Forums
Software - Support => Other => Topic started by: ukbrian on February 22, 2015, 11:24:19 AM
-
How or is it possible to change the root password on a running live DVD please
-
I can't imagine an event where you need it?
-
I can't imagine an event where you need it?
I'm a forgetful old man and I have a rescue iso I put together a few years ago for Mint LMDE users for installing their qt4-fsarchiver backups because the official one was cr*p and I want to install it in virtualbox but it demands a password before it will let me proceed.
I use very few but can't guess this one so changing the password is my last option, I don't want to install the app and screenlets again as I think I had to tweak the code when python was upgraded.
I think it's a very good idea that is being used insome distros to ask for a root password when you install, it stops folk asking what it is.
Another of my gripes is that when your installing and setting the passwords they should default to displaying what's entered with a check box to toggle for business users.
The best windows virtualbox XP install I have you run as admin and no silly business passwords are asked for, bliss for normal folk, I hate bringing business practices into my home.
No passwords ever
(http://i724.photobucket.com/albums/ww242/ukbrian/th_ignorance-bliss_zpsoqhnp1xj.gif) (http://s724.photobucket.com/user/ukbrian/media/ignorance-bliss_zpsoqhnp1xj.gif.html)
Would it be so awful for the devs to do something to help us normal folk?.
(http://i724.photobucket.com/albums/ww242/ukbrian/th_swings-bliss_zpsenknywio.gif) (http://s724.photobucket.com/user/ukbrian/media/swings-bliss_zpsenknywio.gif.html)
I guess it could start a revolution though
(http://i838.photobucket.com/albums/zz310/holling99/Monkey/happy.gif)
Sorry I read your last post after I posted this, tongue in cheek Welsh humour.
-
I don't think it is possible to change password on a live system as the iso and dvd image is read only. No?
I might be wrong though. It will entail extracting the iso off of the disk. Then chrooting into the extracted iso probably.
Not something for the unskilled or timid.
https://help.ubuntu.com/community/LiveCDCustomization (https://help.ubuntu.com/community/LiveCDCustomization)
Look at
Customization limits
I guess. Though no idea how to extract or chroot into a live media already burnt.
-
I don't think it is possible to change password on a live system as the iso and dvd image is read only. No?
I might be wrong though.
Thanks Rok
How about if I put the ISO on a USB? or summat
I do the stranges of things sometimes, good road tester, just been reading about Deepin the Ubuntu based distro with a desktop done in HTML5, seems the right approach to this old fool, cross platform etc, they've changed to a 12 month release cycle from 6 months.
-
Why put the iso on usb? If you have it on file? Just copy/extract/unzip it and chroot into it and make your changes.
Then fly on usb, cd,dvd after you reset it so it uses no password. I think the Ubuntu Link I showed how to set that up.
-
I think that SolydXK use a simular method.
If I may be so bold as to ask for some of your valuable time and use teamviewer to link our machines and you could talk me through it as I record the video but then I remembered you have a slow connection, maybe use, nah if something struggles find a way around it.
I want OS's that never ever ask me for a password again, I don't want nanny holding my hand, so how do I run them as root? I run XP as admin and that works well.
How often does windows ask a user for a password? I only run XP as admin so I can access all the folders.
Is there a line I can add to sudoers that would do what I want I normally add "user ALL=(ALL) NOPASSWD: ALL"
I hate having to relinquish my hold on the mouse to type in the keyboard, it's so non productive.
edit
Mind you I could actually set the default language in Lite to "English UK" then.
-
If the disk is based on Mint the root password may be blank. The sudo commands on some live cd/dvd don't require a password.
-
Is there a line I can add to sudoers that would do what I want I normally add "user ALL=(ALL) NOPASSWD: ALL"
Then change "root ALL=(ALL:ALL) ALL" to "root ALL=(ALL) NOPASSWD: ALL"
Not a good idea, but I think that is what you are looking for...
-
If the disk is based on Mint the root password may be blank. The sudo commands on some live cd/dvd don't require a password.
Cheers avj
The iso was done on Saline OS Squeeze and created with remastersys methods but it was made to help users of Mint LMDE
Off to try blank see what happens.
No luck I'm totally useless, I need an engineer. :P
Is the password stored somewhere where I can find out what it is rather than changing it?
-
Thank you Sir Mr AustinTexas
You are my hero
(http://i724.photobucket.com/albums/ww242/ukbrian/th_loveyou_zpskxxvbcxk.gif) (http://s724.photobucket.com/user/ukbrian/media/loveyou_zpskxxvbcxk.gif.html)
Can I make you a nice cup of tea Mr AustinTexas, you have saved an old man from doing a boring pointless task many times a day, with this increase in my productivity I might be able to retire early.
I was an early adopter of Ghost I found/prefered to install a quick back up rather than try to undo some messes I made, I've been running win7 for three years without any anti virus running, I just do backups with Macrium Reflect free edition, 10 minutes and I have my system back after disaster strikes.
With Debian linux I use saline-backup to clone the partition or create a backup file, it was written for Squeeze but still runs on Jessie with systemd, I want to try it on EvolveOS but Yad isn't in the repos yet, I suppose I could try it on Manjaro where the saline-backup dev moved to, it was unsettling when within 6 months Saline OS closed down and migrated away from Debian to Manjaro and Ikey closed down his Debian SolusOS and then built his own new Linux base, 2 guys I respect moving away from Debian starts you thinking about the future, wouldn't surprise me if Deepin moved from a Ubuntu base to Ikey's new base.
(http://i724.photobucket.com/albums/ww242/ukbrian/th_heavenlyDreaming_zpscnrzue3o.gif) (http://s724.photobucket.com/user/ukbrian/media/heavenlyDreaming_zpscnrzue3o.gif.html)
I'm in you debt Sir, big time, one of the main Linux irritations removed.
(http://i724.photobucket.com/albums/ww242/ukbrian/itch_zpsxhnrqunw.gif) (http://s724.photobucket.com/user/ukbrian/media/itch_zpsxhnrqunw.gif.html)
Freedom from the nanny at last, I can relax again and not be constantly irritated, my quality of life has improved.
There's always another problem though.
(http://i724.photobucket.com/albums/ww242/ukbrian/hamock-island_zps51de44da.jpeg) (http://s724.photobucket.com/user/ukbrian/media/hamock-island_zps51de44da.jpeg.html)
-
Can I make you a nice cup of tea Mr AustinTexas, you have saved an old man from doing a boring pointless task many times a day, with this increase in my productivity I might be able to retire early.
I would go for a shot of tea-quila.
-
I addedthat line to the live DVD but still no joy, it's not an ISO file it's a CD so I guess I need to create an ISO file first but xfburn don't do that so I'll have to look around for summat.
@AustinTexas I would go for a shot of tea-quila.
Good shot, I'm going to need a bit of time to think up an appropriate responce.
Meanwhile I added this line to try and get thunar to load other partitions in the sidebar quietly instead of requesting permission. It seems to work but I still have to give it a good roadtest later. user ALL=NOPASSWD: /usr/bin/thunar
Gotta burn some rubber, see ya
(http://i.imgur.com/vtjYfasm.jpg)
-
My celebration was premature :(
I'm still being asked for a bl**dy password when I try to open a partition on my internal sata drive.
Please Mr AustenTexas can you help a poor Welsh sheep sh*ging redneck?
(http://i724.photobucket.com/albums/ww242/ukbrian/th_redneck_zpsz9i03rnz.gif) (http://s724.photobucket.com/user/ukbrian/media/redneck_zpsz9i03rnz.gif.html)
-
I don't think it is sudoers (or sudo) that is managing that function, I think it is Policykit.
I find that password request to mount a partition annoying and unnecessary, also. I will see if I can figure it out...
I tried editing /etc/polkit-1/localauthority.conf.d/50-localauthority.conf
from "AdminIdentities=unix-user:0"
to "AdminIdentities=unix-user:0;unix-user:dan"
but that did not do it.
-
Thanks for trying man :D
I'm banjaxed today so I'm off to chill for a bit
-
I just installed a saline-backup of Mint and Xubuntu and in neither one did thunar ask for permission to mount partitions as I expected.
If there's anything I can check in Mint just ask.
-
locate pwd
locate passwd
you will see hidden files beginning with a "."
eg:
/etc/.pwd.lock
Some files are in code. Some not. Not a coder. So I cannot tell you how to edit. Just only how to look around.
-
The idiot is still struggling.
I installed locate but didn't get anything out of it so I used catfish but didn't find anything that looked like an answer.
I'm not giving a machine to new comers that keeps asking for passwords but I'm also not going to install mint as I will do nothing to help clem.
Thanks for trying Bro.
-
After installing locate.
sudo updatedb
is the 1st thing that should be done after a locate install. It will take a while to finish so give it some time.
The command I gave above updates the data base immediately. After that. I think a cron job in locate text file updates it periodically.
I usually just updatedb manually after downloading anything from the net so it shows later on when I need to find it.
-
I'm getting 15 lines like this when running "sudo updatedb"
/usr/bin/find: `/home/user/.gvfs': Permission denied
I'm getting this with "locate pwd" /bin/pwd
/etc/.pwd.lock
/home/user/data/ukbrian--/apps/doublecmd/doublecmd/pwd.ini
/lib/modules/3.2.0-4-686-pae/kernel/drivers/watchdog/hpwdt.ko
/sbin/unix_chkpwd
/usr/bin/pwdx
/usr/include/pwd.h
/usr/lib/python2.6/dist-packages/twisted/python/fakepwd.py
/usr/lib/python2.6/dist-packages/twisted/python/test/test_fakepwd.py
/usr/lib/python2.7/dist-packages/twisted/python/fakepwd.py
/usr/lib/python2.7/dist-packages/twisted/python/fakepwd.pyc
/usr/lib/python2.7/dist-packages/twisted/python/test/test_fakepwd.py
/usr/lib/python2.7/dist-packages/twisted/python/test/test_fakepwd.pyc
/usr/lib/syslinux/pwd.c32
/usr/share/man/fr/man1/pwd.1.gz
/usr/share/man/fr/man1/pwdx.1.gz
/usr/share/man/man1/pwd.1.gz
/usr/share/man/man1/pwdx.1.gz
/usr/share/man/man8/unix_chkpwd.8.gz
/usr/share/perl/5.14.2/pwd.pl
/usr/share/pyshared/twisted/python/fakepwd.py
/usr/share/pyshared/twisted/python/test/test_fakepwd.py
With "locate passwd" I get $ locate passwd
/etc/cron.daily/passwd
/etc/pam.d/chpasswd
/etc/pam.d/passwd
/etc/passwd
/etc/passwd-
/etc/security/opasswd
/usr/bin/gpasswd
/usr/bin/grub-mkpasswd-pbkdf2
/usr/bin/lppasswd
/usr/bin/passwd
/usr/bin/smbpasswd
/usr/include/rpcsvc/yppasswd.h
/usr/include/rpcsvc/yppasswd.x
/usr/lib/netatalk/uams_dhx2_passwd.a
/usr/lib/netatalk/uams_dhx2_passwd.so
/usr/lib/netatalk/uams_passwd.a
/usr/lib/netatalk/uams_passwd.so
/usr/sbin/chgpasswd
/usr/sbin/chpasswd
/usr/sbin/update-passwd
/usr/share/app-install/desktop/kdepasswd.desktop
/usr/share/app-install/desktop/redhat-userpasswd.desktop
/usr/share/base-passwd
/usr/share/base-passwd/group.master
/usr/share/base-passwd/passwd.master
/usr/share/cups/doc-root/help/man-lppasswd.html
/usr/share/doc/base-passwd
/usr/share/doc/base-passwd/changelog.gz
/usr/share/doc/base-passwd/copyright
/usr/share/doc/base-passwd/README
/usr/share/doc/base-passwd/users-and-groups.html
/usr/share/doc/base-passwd/users-and-groups.txt.gz
/usr/share/doc/libnet-ssleay-perl/examples/passwd-cb.pl
/usr/share/doc/passwd
/usr/share/doc/passwd/changelog.Debian.gz
/usr/share/doc/passwd/changelog.gz
/usr/share/doc/passwd/copyright
/usr/share/doc/passwd/examples
/usr/share/doc/passwd/examples/passwd.expire.cron
/usr/share/doc/passwd/NEWS.Debian.gz
/usr/share/doc/passwd/NEWS.gz
/usr/share/doc/passwd/README
/usr/share/doc/passwd/README.Debian
/usr/share/doc/passwd/TODO.gz
/usr/share/lintian/overrides/passwd
/usr/share/man/cs/man1/gpasswd.1.gz
/usr/share/man/cs/man5/passwd.5.gz
/usr/share/man/de/man1/gpasswd.1.gz
/usr/share/man/de/man1/passwd.1.gz
/usr/share/man/de/man5/passwd.5.gz
/usr/share/man/de/man8/chpasswd.8.gz
/usr/share/man/de/man8/update-passwd.8.gz
/usr/share/man/es/man8/update-passwd.8.gz
/usr/share/man/fr/man1/gpasswd.1.gz
/usr/share/man/fr/man1/passwd.1.gz
/usr/share/man/fr/man1/passwd.1SSL.gz
/usr/share/man/fr/man5/passwd.5.gz
/usr/share/man/fr/man8/chpasswd.8.gz
/usr/share/man/fr/man8/update-passwd.8.gz
/usr/share/man/hu/man1/gpasswd.1.gz
/usr/share/man/hu/man1/passwd.1.gz
/usr/share/man/hu/man5/passwd.5.gz
/usr/share/man/it/man1/gpasswd.1.gz
/usr/share/man/it/man1/passwd.1.gz
/usr/share/man/it/man5/passwd.5.gz
/usr/share/man/it/man8/chpasswd.8.gz
/usr/share/man/ja/man1/gpasswd.1.gz
/usr/share/man/ja/man1/passwd.1.gz
/usr/share/man/ja/man5/passwd.5.gz
/usr/share/man/ja/man8/chpasswd.8.gz
/usr/share/man/ja/man8/update-passwd.8.gz
/usr/share/man/ko/man5/passwd.5.gz
/usr/share/man/man1/gpasswd.1.gz
/usr/share/man/man1/grub-mkpasswd-pbkdf2.1.gz
/usr/share/man/man1/lppasswd.1.gz
/usr/share/man/man1/passwd.1.gz
/usr/share/man/man1/passwd.1ssl.gz
/usr/share/man/man5/passwd.5.gz
/usr/share/man/man5/smbpasswd.5.gz
/usr/share/man/man8/chgpasswd.8.gz
/usr/share/man/man8/chpasswd.8.gz
/usr/share/man/man8/smbpasswd.8.gz
/usr/share/man/man8/update-passwd.8.gz
/usr/share/man/pl/man8/update-passwd.8.gz
/usr/share/man/pt_BR/man1/gpasswd.1.gz
/usr/share/man/pt_BR/man5/passwd.5.gz
/usr/share/man/ru/man1/gpasswd.1.gz
/usr/share/man/ru/man1/passwd.1.gz
/usr/share/man/ru/man5/passwd.5.gz
/usr/share/man/ru/man8/chpasswd.8.gz
/usr/share/man/ru/man8/update-passwd.8.gz
/usr/share/man/sv/man1/passwd.1.gz
/usr/share/man/sv/man5/passwd.5.gz
/usr/share/man/tr/man1/passwd.1.gz
/usr/share/man/tr/man5/passwd.5.gz
/usr/share/man/zh_CN/man1/gpasswd.1.gz
/usr/share/man/zh_CN/man1/passwd.1.gz
/usr/share/man/zh_CN/man5/passwd.5.gz
/usr/share/man/zh_CN/man8/chpasswd.8.gz
/usr/share/man/zh_TW/man5/passwd.5.gz
/usr/share/man/zh_TW/man8/chpasswd.8.gz
/var/backups/passwd.bak
/var/lib/dpkg/info/base-passwd.list
/var/lib/dpkg/info/base-passwd.md5sums
/var/lib/dpkg/info/base-passwd.postinst
/var/lib/dpkg/info/passwd.conffiles
/var/lib/dpkg/info/passwd.list
/var/lib/dpkg/info/passwd.md5sums
/var/lib/dpkg/info/passwd.postinst
/var/lib/dpkg/info/passwd.preinst
I'll start another thread about my other problem
Cheers Bro
(http://i.imgur.com/rTN9Yh0.jpg)
Should the package manager ideally run that code "updatedb" whenever it adds/removes packages?
-
Should the package manager ideally run that code "updatedb" whenever it adds/removes packages?
No. I think a Cron job handles that later but cannot swear to it (see below sentence). updatdb needs to be run manually 1st before the cron job kicks in though.
Because I have seen locate has not been updated errors after a certain amount of days have passed without running updatedb manually on my rigs.
man locate
might fill in the blanks in this post.
http://linux.die.net/man/1/locate
By default, locate does not check whether files found in database still exist. locate can never report files created after the most recent update of the relevant database.
-
I was thinking about Ikey's package manager rather than debian.
Man pages and techie stuff is out of my remit but I can follow intructions, I am one of those customers you dread!