What we know so far about this Linux File System mystery:
So, just now I have plugged the HD into another C500, it booted up as before, and is sitting at a prompt. It says
.
.
.
I don't know anything about Linux, so you'll have to hold my hand through the process. I don't know what shell it's in, or how to use vi (or even if it's there).
Therefore, things that are immediately understandable to any Linux user will probably seem like gibberish to Robbb and any other non-Linux users reading this. I thought I'd explain some things as I go through what data has been given so far. At the very least it should help him to see what troubleshooting has been done and help get him to thinking about the problem.
@nullvalue
uname -a says:2.4.19-4GB-SMP #1 SMP Tue Apr 12 23:51:32 UTC 2005 i686 unknown
uname prints out general details about the system it's run on, like CPU and OS version.
The -a is the option switch which makes uname list everything it knows how to detect. Other switches can be used to show only specific pieces of this data.
In this case:
Kernel Release (or OS version in DOS/Windows lingo): 2.4.19-4GB-SMP
Kernel Version (or OS build): #1 SMP Tue Apr 12 23:51:32 UTC 2005
Machine (or CPU Type): i686
NET4: Linux IPX 0.47 for NET4.0
IPX Portions Copyright (c) 1995 Caldera. Inc
IPX Portions Copyright (c) 2000, 2001 Conectiva, Inc.
NET4: Appletalk 0.18a for Linux NET 4.0
The system is setup to interact with Netware and Appletalk LANs.
@Caluser2000
I don't know what Single user mode is, or how to mount a hdd.
There no green OK anywhere, and the text is meaningless things - I can't see anything about devices.
Single user mode is similar to Windows safe-mode in that it disables any other users from logging in and logs in to the system administrator's account through the monitor and keyboard. In Unix/Linux, the user of this account is normally called either the superuser or the root user. You have complete control over the system and can perform all maintenance tasks. Since you "forced your way in" to this account, you may have bypassed some of the standard setup routines that the system uses to set everything up correctly/normally.
There is no boot prompt - it just starts up. At first it flashes up about PC-DOS and a lot of dots, then it says the video mode is
This indicates that PC-DOS is being used to boot up the computer, possibly with DOS device drivers needed to use certain peripherals that Linux, at the time, might not have had drivers for and then boot into Linux so that it can use the loaded drivers.
I found out from google how to display my path (echo $PATH). It is: /usr/local/bin:/bin:/usr/bin:/usr/X11R6/bin:.
Looks like colon is the path separator rather than semi-colon in windows/dos.
Is this path ok? If not, what should I add and how?
This looks to be a basic path for maintenance mode. You should have access to the standard software at least. It also shows that the system should have the "X Windows" GUI installed.
It is from a 2.x kernel, presumably a Caldera distro.
The fact that Caldera shows up in the ifconfig report, doesn't necessarily mean this is a Caldera distro, but the kernel release is 2.4.19 or a 2.x kernel. The 2.4 kernel revison 19 to be exact.
@Chuck(G)
The var folder is empty
ls -l boot shows grub, vmlinux, vmlinuz, system.map, and boot -> .
grub is a standard boot loader used in Linux. It appears to be the one used for this HDD.
I learned about the /etc/passwd file (even though it doesn't contain passwords), and it has a whole bunch of system accounts, their home folders and the shell. The list of /home has a few of those same accounts. Most of the system accounts have their homes in the /var folder, even though it is empty.
I was under the impression that unix-based systems were secure and I'd never get in, but for a person such as myself who knows nothing at all about it, the procedure was pretty easy. I just hope that the loophole has since been closed.
Having direct access to any Linux or Windows system makes it vulnerable. Security really only protects a system from outside attacks. If you can access the system's BIOS menu, you can change which drive the system boots from. Once that's possible, security is not that hard to bypass.
Basically you need the boot menu, and from there you could place the system into 'single', and then you could reset the password of root. After rebooting, you're in. Fedora was a bit more complex, you had to add a shell to bash into the installation file.
Again, single mode puts you in the root user account. Since you are the root user at that point, of course you can change/reset your (the root) password.
The other thing I found is when the PC-DOS is starting up, hitting Shift stops the autoexec from running. Looking into it, there's supposed to be a PC-DOS boot menu for different kinds of linux boot (they all use vmlinuz). The menu was supposed to be in C:\TOOLS, but that folder is missing, so it goes straight into the default. In all choices the linux file system is read-only, so I wouldn't have been able to set up a network anyway.
vmlinuz is like IBMBIO.COM & IBMDOS.COM or IO.SYS & MSDOS.SYS. It's the first piece of software that has to load before Linux starts any other processes.
Having the file system set to read-only in all choices really indicates that there should be another drive or partition accessible to Linux when it boots, or that what you're accessing is only for troubleshooting/maintenance. Linux has several directories used for editable files, logs, and temporary storage in its standard file system tree. If the file system is RO, then there is no place to store the changeable data and the system won't be able to function normally.
Unlike Windows, Linux doesn't separate partitions into different "drives" but instead links all partitions, no matter which physical device they are on, into one directory tree. The fact that a directory like /var is empty, for example, suggests that another partition is linked into the directory tree there. (This is called "mounting" and done with the mount command.) It could be that this file system was split into a static partition that is always read-only and a dynamic partition for files that need to have read/write access.
Since you are new to Linux, I'd first suggest installing this HDD as a secondary drive in a computer that you can boot up in Windows or DOS and run FDISK to see what partitions it has. If there are any "unknown" partitions they are probably the Linux partitions. But it's also possible that, this being an old 2.4 kernel installation, it was installed within a DOS partition as a subdirectory or a large file. In those cases you might be able to see all the Linux files using DOS/Windows to look into the subdirectory or you'll see one large file that stores the entire file system kind of like the way a zip file contains multiple files.
It's still quite possible you can use the Linux on this drive to set up a network, if you still want to. The file system being set to read-only doesn't prevent that since you can "splice in" a read/writable partition or change the access mode to read-write.