Hi all,
Take a moment to look forward to your impending long weekend of seasonal
festivities with close family, distant relatives, and the
not-quite-distant-enough ones. Think of the present opening, the joy of
seeing another pair of socks, the screams of rage that inform you that
Ben 10 was l
On 20 December 2010 16:04, Philip Stubbs wrote:
> On 20 December 2010 15:34, Kris Douglas wrote:
>> To do this, I would use
>>
>> cp /etc/shadow /home//shadow.bak
>> cp /etc/passwd /home//passwd.bak
>>
>> then archive home
>>
>> tar -pczf home.tar.gz /home/
>>
>> then move our files onto a USB de
On 20 December 2010 15:34, Kris Douglas wrote:
> To do this, I would use
>
> cp /etc/shadow /home//shadow.bak
> cp /etc/passwd /home//passwd.bak
>
> then archive home
>
> tar -pczf home.tar.gz /home/
>
> then move our files onto a USB device
>
> cp /home/home.tar.gz /media/
>
> I'm sure there are
On 20 December 2010 15:27, Simon Greenwood wrote:
>
>
> On 20 December 2010 15:17, Gordon Burgess-Parker wrote:
>>
>> On 20/12/10 15:08, Simon Greenwood wrote:
>>
>> The issue with Windows is that there is a database at the core of the
>> authentication mechanism, and this database can get damage
On 20 December 2010 15:26, Matthew Wild wrote:
> On 20 December 2010 15:17, Gordon Burgess-Parker
> wrote:
> > On 20/12/10 15:08, Simon Greenwood wrote:
> >
> > The issue with Windows is that there is a database at the core of the
> > authentication mechanism, and this database can get damaged.
On 20 December 2010 15:26, Matthew Wild wrote:
> I don't know about anyone else on this list, but I've never seen such
> corruption as we're discussing. Sure it can happen in theory, e.g. I
> could open the system file up in my text editor (if I have root
> access) and write some gibberish there.
On 20 December 2010 15:17, Gordon Burgess-Parker wrote:
> On 20/12/10 15:08, Simon Greenwood wrote:
>
>
> The issue with Windows is that there is a database at the core of the
> authentication mechanism, and this database can get damaged. Unix and Linux
> are essentially based on flat files whi
On 20 December 2010 15:17, Gordon Burgess-Parker wrote:
> On 20/12/10 15:08, Simon Greenwood wrote:
>
> The issue with Windows is that there is a database at the core of the
> authentication mechanism, and this database can get damaged. Unix and Linux
> are essentially based on flat files which ca
On 20/12/10 15:08, Simon Greenwood wrote:
The issue with Windows is that there is a database at the core of the
authentication mechanism, and this database can get damaged. Unix and
Linux are essentially based on flat files which can be edited with the
correct permissions. It is possible to d
On 20 December 2010 14:47, Gordon Burgess-Parker wrote:
> I see loads and loads of posts on the MS forums of the type "I am the
> sole user and administrator and my account is corrupted how do I access
> my data?" with various answers being given, including the setting up of
> an Administrator ac
On Mon, Dec 20, 2010 at 02:47:35PM +, Gordon Burgess-Parker wrote:
> I see loads and loads of posts on the MS forums of the type "I am the
> sole user and administrator and my account is corrupted how do I access
> my data?" with various answers being given, including the setting up of
> an
On 20 December 2010 14:47, Gordon Burgess-Parker wrote:
> I see loads and loads of posts on the MS forums of the type "I am the
> sole user and administrator and my account is corrupted how do I access
> my data?" with various answers being given, including the setting up of
> an Administrator acc
I see loads and loads of posts on the MS forums of the type "I am the
sole user and administrator and my account is corrupted how do I access
my data?" with various answers being given, including the setting up of
an Administrator account which is never used except for emergency access
and elev
13 matches
Mail list logo