Solved

inittab problem

Posted on 1998-07-25
3
404 Views
Last Modified: 2013-12-15
i installed the red hat 5.0 and modify the inittab for login default on renlevel 5, so at beginning the login prompt will be in x window. then i messed up the x window configuration so when it starts the login screen keeps flinking and i can't input the username and password. i tried to boot from floppy then i can't find the mount point for hard drive(hda4) in fact i can't find mount point for any partition on my HD except the boot floppy and the red hat cdrom.so now i don't know how to access the hard drive. any idea?
it's i486 PC
0
Comment
Question by:smiley020999
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 3

Accepted Solution

by:
mhomann earned 100 total points
ID: 1628649
you can give the runlevel to the kernel at boot-time, for example if you're booting via LILO,
press alt to get a prompt when lilo prints 'LILO', then do an linux init 2, if your lilo section for linux has the label 'linux' and you want runlevel 2...
if you're booting with loadlin from DOS, append 'single' as option to the loadlin command line... this gets you to single user mode...

other possibility: boot from the diskettes, do 'mkdir mnt1 ; mount /dev/hda4 mnt1 -t ext2', you'll have your root file system in ~/mnt1


have fun!

0
 

Author Comment

by:smiley020999
ID: 1628650
thanks, it really works.
BTW can you suggest some books to read for these kind of tips? i can't find this in readhat manual.
0
 
LVL 3

Expert Comment

by:mhomann
ID: 1628651
the SuSE manual is quite good, and if you have the space, install the packages from series 'doc'...
especially books...

0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
pvcreate issue 5 95
Disabling security updates Ubuntu 3 66
umask commands 5 15
Apache web server - how to revoke a certificate produced by a Windows CA? 13 74
If you have a server on collocation with the super-fast CPU, that doesn't mean that you get it running at full power. Here is a preamble. When doing inventory of Linux servers, that I'm administering, I've found that some of them are running on l…
I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question