When you log in the next time, open a terminal, and type "passwd" and it should ask for a new password. It may require the existing password, so you might need to reboot the system into single user mode, open a terminal, set the root password (using passwd), and then set your user password ("passwd <username>", without the <>'s). Then reboot out of single user mode.
If you don't know how to boot to single user mode, when at the grub screen, hit the "e" key, and then go to the line for the kernel and add the word "single" at the very end of the line (with a space between it and anything before it).
If the grub menu is password protected (it might be), you need to boot using a linux live CD, mount the partition/hard drive that has the "/etc" directory (to find the device name that your "/etc" is located before booting off the live CD by changing directories to that location "cd /etc" and then running "df -k ./" and the device/filesystem should be listed as the first option, if the device is something like "/dev/mapper/blahblahblah", it is in a Linux Volume Management (LVM) filesystem and you need to do a few extra steps after booting off the live CD, run "vgchange -ay", which should activate the LVM and create the "/dev/mapper" devices to allow you to mount the "/dev/mapper/blahblah" device), and edit the "/etc/shadow" file and remove any characters between the first and second ":"'s in the file for the root username and your username (example "root:xGHsk$821jk&43jkhrwd$.:14302:0:99999:7:::" , change to"root::14302:0:99999:7:::"). You can then reboot the system like normal and then set the passwords for root and your username.
You have just learned how easy it is to break into a linux system as well...