Chapter 6. Emergency tools: Building a system recovery device

 

This chapter covers

  • Recovering broken Linux systems
  • Controlling resources with Linux live-boot drives
  • Recovering data from damaged storage media
  • Manipulating an inaccessible file system

Don’t try to convince yourself otherwise: along with all the good stuff, you’re going to have bad days with Linux. Sometimes you’re going to forget the syntax for commands (which is why you should always keep a copy of this book within reach). You (or the users you support) are going to mistype commands and permanently destroy documents. Or, you’re going to experience that sinking feeling when you realize that some important piece of hardware or software has failed. (That’s gratitude after everything you did for it all those years.) Being properly backed up, as the last couple of chapters demonstrated, means that you can walk away from a nonfunctioning operating system (OS) or computer and rebuild it all somewhere else. But that’s always going to be Plan B. Plan A is to recover.

6.1. Working in recovery/rescue mode

6.2. Building a live-boot recovery drive

6.3. Putting your live-boot drive to work

6.4. Password recovery: Mounting a file system using chroot

Summary

Key terms

Security best practices

Command-line review

Test yourself