root@seymour:~# mount   -o  rw,remount  /NOTE
You now have    complete    root    access  and read/write  privileges  on  the
machine.    This    is  an  example of  why security    of  a   physical    machine is
important.  If  someone has physical    access  to  your    computer    and knows
what    he  or  she is  doing,  that    person  can easily  and quickly gain    full    control
over    the machine and all it  contains.If  the problem exists  because the user    account was removed from    the admin
group,  enter   the following:
Click   here    to  view    code    image
root@seymour:~# adduser username    admin
If  the problem exists  because the permissions for /etc/sudoers    are
wrong,  enter   this:
Click   here    to  view    code    image
root@seymour:~# chmod   440 /etc/sudoers
If  the problem exists  because of  an  internal    problem in  /etc/sudoers,
make    a   backup  of  the existing    file    and use visudo  to  edit    it. (This   is  a
special use of  the vi  editor, covered in  Chapter 12, “Command-Line   Master
Class,  Part    2,” that    runs    a   check   on  the file    after   editing to  be  certain it  is
correct;    this    particular  problem usually occurs  when    someone edits   the file
using   another editor  that    does    not make    this    check.) The contents    of  the file
should  be  as  follows:
Click here to view code image
This file MUST be edited with the 'visudo' command as root.
Please consider adding local content in /etc/sudoers.d/ instead of
directly modifying this file.
See the man page for details on how to write a sudoers file.
Defaults    env_reset
Defaults
secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
#   Host    alias   specification#   User    alias   specification#   Cmnd    alias   specification