in /etc/shadow file, encrypted
The root password is stored in hashed form in the /etc/shadow file.
The password would be whatever the root password is set to.
Most Unix systems no longer store the passwords in the password file; it is stored in a private file called /etc/shadow, only accessible by the root account. The passwords are stored in encrypted form in that file.
Your question isn't exactly clear. If you want to secure the password, give root a secure password.
In Linux and Unix-like systems, the "root" account is the only account with all possible privileges. The "root" password would be the password needed to access this account or assume its identity.
These settings are stored in the computer's BIOS. Sometimes it is also referred to as CMOS.
It's stored in the SAM file.
It is stored in the BIOS/CMOS or security chip if there is such chip.
When it askes for user enter root, and then when it asks for password enter the password. If you don't know password for root it's a really serious problem. You can also log in as root via command line by typing "su"
Login as root in terminal then enter: #sudo Zach
Run the command "passwd". You will have to enter your old password to change it. If you are root, you will not have to enter the old password to change a user's password.
The passwd file is public and readable by anyone. For this reason you do not want to have some sensitive information placed there, such as the user's password. Passwords and password aging rules are stored in the shadow file that is only accessible by the root administrator account. This way information that is displayed by commands such as 'finger' can use public information but sensitive information such as the password of a user is not accessible.