<div dir="auto">Heh, you don't even need a live CD, just interrupt grub, edit boot line and add init=/bin/bash and boot from there.<div dir="auto"><br></div><div dir="auto">This is not a bug, and here is how you can prevent it from being exploited</div><div dir="auto"><br></div><div dir="auto">1. Full disk encryption, which is usually sufficient on its own but the next two are good too.</div><div dir="auto">2. Grub password to disallow changing boot parameters</div><div dir="auto">3. Bios password to disallow changing boot order</div><div dir="auto">4. If fde is not an option then at least use dmcrypt, encfs or ecryptfs</div></div><div class="gmail_extra"><br><div class="gmail_quote">On Sep 13, 2017 11:46, "Rick Engebretson" <<a href="mailto:eng@pinenet.com" target="_blank">eng@pinenet.com</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">As I play around backing up, upgrading, and what-not, I use not-so-hotswappable hard disk drives. Sometimes I goof up and have a bad /etc/fstab file and the system will hang at boot. In older distros there were some instructions to boot to root and use "mc" to edit /etc/fstab. This newer opensuse distro had me stumped how to just get the filesystem going.<br>
<br>
So I tried the Fedora Live DVD and booted to DVD, mounted the boot hard drive in KDE "dolphin" file manager, opened the KDE editor "kwrite," edited and saved the system file /etc/fstab, and rebooted the opensuse hard drive smooth as silk.<br>
<br>
I might be wrong, but these Linux Live DVDs seem to open a giant security hole.<br>
______________________________<wbr>_________________<br>
TCLUG Mailing List - Minneapolis/St. Paul, Minnesota<br>
<a href="mailto:tclug-list@mn-linux.org" target="_blank">tclug-list@mn-linux.org</a><br>
<a href="http://mailman.mn-linux.org/mailman/listinfo/tclug-list" rel="noreferrer" target="_blank">http://mailman.mn-linux.org/ma<wbr>ilman/listinfo/tclug-list</a><br>
</blockquote></div></div>