I wanted to delete the Snow Leopard partition and format the Swap Disk partition to something else. exFat was causing major file size bloat on small files. QT sdk bloated to like 11 gigs or something ridiculous like that. Anyways, I loaded up an Ubuntu 10.04 LTS live cd and gparted then deleted the Snow Leopard partition. Gparted said "Mission Accomplished" and tried to rescan the drive, but never found it. At this point I restarted the computer, a dell laptop, which didn't boot with an unable to find a bootable device error. The ubuntu live cd doesn't see the drive anymore. gparted scans for drives indefinitely and fdisk -l has no output.
i have instaled ubuntu 11.04 wubi on my pc with windows 7. i installed and everything was going ok i navigate on ubuntu already. but the problems star here i went on my ubuntu to the partition section and i format my windows partion to be the home partion and changed the nfts to ext, i did the upgrades but i forgot that theyr running yet and i restart my computer when it boot again it gaves me an error:
try (0,0) : nfts5 : wubildr try (0,1) : ext2 :
and the windows7 says that i have to instal again. so i went to another pc and i made a cd boot and a pen boot. i burned the iso (downloaded from the ubuntu oficial site the 11.04 32 bit version) image to the cd and pen drive prperly, i adjust my boot options to star from usb or cd rom and nothing im struck.
So I tried adding a new, 2nd hard drive to my Ubuntu 9.04 desktop for some additional storage and only managed to kill my system so that it won't boot up anymore (I just get a blinking cursor after the BIOS does its thing).I could sure use a little help getting back to a functioning system, and then adding the second drive. I tried following the instructions from this link to add the 2nd drive:
(So the forum rules won't let me post the link, neato. Here it is with spaces added): h t t p s : / / h e l p . u b u n t u . c o m / c o m m u n i t y / I n s t a l l i n g A N e w H a r d D r i v e
I currently run a dual boot with Windows Vista and Ubuntu Lucid. I have been using Ubuntu for quite a while now, but kept around Windows "just in case." I have decided that keeping Windows is unnecessary and my Ubuntu partition is running out of space. I was wondering how I could format the Windows partition and add that space to the Ubuntu partition without having to format my entire computer.
A part of my hd is ntfs (where I keep my windows and windows files). I edited it to be flagged as "bootable" in the disk tools that comes with ubuntu 10.10, and now it wont list as a file system in ubuntu (in other words I cant access it).
I have a LVM logical volume, that contains a LUKS encrypted volume, on which is an ext4 filesystem. I shrank the partition to the minimum size. Next step is to luksClose the device, and then to resize the LVM logical volume. I suspect that LUKS has overhead. So if the ext4 filesystem was resized from, say 1TB to 500G, I have the idea that resizing the LVM LV to 500G does not take LUKS overhead into account and this might corrupt data on the end of the FS. So, what's the smart move to take? How do I calculate the safe minimum LV size? Or should I just give the 500G disk a few gigabytes extra to be sure?
I have a really tricky and may be intresting problem with a encrypted disk partition (cryptsetup luks...) which was fine until it accidentally got re-formatted by an instance of Windows 7. Most of the data on that 1TB-disk will probably still exist, only the LUKS header at the very beginning of the partition is - of course - gone.
So when I try to open the container, it gives no verbose, just the return value 234.
I scanned the whole partition for other LUKS headers with hexedit, none there. But, luckyly I have another partition which is encrypted in the exact same way with the exact same passphrase (which I remember very well!), so I had an idea: I copied the LUKS header (592 bytes) from the other LUKS encrypted partition over to the damaged partition. When I now issue
Code: No key available with this passphrase
Here is the command how I created the container:
How do I get the existing passphrase accepted by LUKS?
sda is what I currently run to write this text, sdb is my former harddrive, connected via USB.
I want to access the root partition on sdb.
The problem is:
Code: Select allcryptsetup luksOpen /dev/sdb5 oldhd Enter passphrase for /dev/sdb5: root@x200s:/home/b# ls /dev/mapper/ control oldhd sda5_crypt x200s--vg-root x200s--vg-swap_1 root@x200s:/home/b# mount /dev/mapper/oldhd /mnt/ [b]mount: unknown filesystem type 'LVM2_member'[/b]
Before all this, both sda and sdb where in the same volume group. I renamed the volume group of sdb to "oldDisk" using
Code: Select allvgrename <UUID> oldDisk
How I can access the data on the root filesystem of my sdb..
I need to access /etc/modprobe.d on an encrypted LVM LUKS partition. I m not sure how to go about it though. Mount usually handles my mounting needs, do I need to decrypt the physical volume first? LIst of commands need would make my day.
I'm planning a fresh F13 install, with separate partitions for /boot, /home, /tmp, /, and swap. All but /boot will be logical volumes, and I'd like to encrypt all but boot. If I encrypt the underlying partitions, is there any reason to also encrypt the logical volumes themselves?
my system will be: HP dv6-3040us Pavillion laptop AMD Phenon II 4GB DDR3
So I was wondering about the dilemma of how to encrypt the password file on a key card to unlock your harddrive without having to enter any password. I came to the conclusion that that the scripts could do this without storing any passwords in plane text them self. Have a few extra steps to the scripts that would:
1. Read the UUID of any disks coming in.
2. Attempt to use that ID to decrypt a password file stored in the initrd.
3. Use the decrypted password file to unlock the the keycard partition.
4. THEN use the password files on the keycard to decrypt the main partition and boot the system.
However, if somebody stole your key card and didn't know what the unencrypted information was, then it's harmless for them to have it anyway. And if they did know, you wouldn't be any better off with it being encrypted because they probably can gain access to your computer anyway; leaving them to just pop the key card in and automatically decrypt the drive.
I suppose encrypting the keycard would give you extra assurance that the information would be much harder to recover if you destroyed the key card in a hurry. So would this extra security step even be worth it?
I guess the most secure thing would be to only have a password and type it in every time... unless you are concerned about the aliens/government stealing that from your brain which would probably mean they wouldn't need your password anyway.
My new Debian box is running well and stable enough for me to decide to swipe out WindowsXP altogether. I have a 40GB HDD, which has the following partition scheme (after Windows was removed and hda1 was converted to Linux native type)
Code: Device Boot Start End Blocks Id System /dev/hda1 * 1 1762 13313159+ 83 Linux /dev/hda2 1762 5168 25756889 f W95 Ext'd (LBA) /dev/hda5 1762 3985 16813408+ b W95 FAT32 /dev/hda6 * 3986 5018 7809448+ 83 Linux /dev/hda7 5019 5168 1133968+ 82 Linux swap / Solaris
As you can see, my Linux is in the 2nd logical partition hda6 which contained in the extended hda2. The 1st logical partion hda5 is the one I want to erase the data and convert to Linux filesystem in order to have more space. (Yes I can mount it ntfs-3g and use it without any problem, but I just want to say farewell to as many things Microsoft as possible) . What I'm worried about is whether it's safe to do that, without damaging the extented partition which contains the root file system for Debian.
I'm trying to have a LUKS encrypted partition mounted at startup and to have GDM ask for my key so it will decrypt. Now I followed [URL] to the letter. Except for now, I have it just mounted into /mnt/cryptohome so I'm not messing with my system. My problem is the one everyone mentions in the comments, ubuntu isn't asking for the LUKS key in the X display, it's asking in the first terminal (Ctrl-Alt-F1). This will not do. I need it to ask to mount my drive before I'm even asked to login, so eventually I can encrypt my /home.
I'm having a problem auto-mounting a new luks partition. I have crypttab and fstab entries. I already have my primary encrypted partition (root) mounting at boot (from the install), but after creating this one manually, it does not open on boot. It auto-mounts when I run the following command manually after boot: sudo luksOpen /dev/disk/by-uuid/<uuid> mycrypt
I'm trying to migrate my LVs over to a Luks volume (prompt on password at boot). Unfortunately, as soon as I add my luks-encrypted physical volume to my volume group, I'm no longer able to update my grub configuration. I've detailed my steps below:
I've created and unlocked my encrypted partition with the following:
Code: sudo cryptsetup -c aes-cbc-essiv:sha256 -y -s 256 luksFormat /dev/sdb1 sudo cryptsetup luksOpen /dev/sdb1 crypto_agilityssd My /etc/crypttab looks like this:
I am using disk utility to partition an external hard disk. My intention is to boot linux off of the partition. However, I am unsure of which format to make the partition. Disk Utility in OS X only allows Mac OS X Journaled, Mac OS X, FAT, exFAT, and free space. Which one should I use?
I am trying to create a multi-partition USB key to use to kick multiple OS's whenever I need (1 NTFS partition for Windows image and data storage, one ext3 for boot, another ext3 for Linux distros iso storage and the last one as a Fedora live usb with permanent storage).
I am using a Kingston Data Traveler G2 16GB usb key and I have absolutely no problem to create the partitions and all looks fine. The problem I encounter is that although I can format the 1st partition on the usd key to any fs I want, I am unable to do the same on the other partitions. I tried fdisk+mkfs.XXX (ext2, ext3, fat, vfat, ntfs) and gparted, and no luck.
mkfs.XXX gives me no errors when I run it but when I try to mount the partition in Fedora 14 the OS is unable detect the fs. Gparted allows me to format the fs, gives no errors, shows a format successful message, but when it re-scans the device the fs appears as unknown.
I know it is possible to do this as I had a DataTraveler 101 16GB and it was working fine until I lost it.
I used a Kingston 8Gb flash drive as a live usb recently (copied the live iso image over using dd). I am done with the installations and all but seem to have a problem. i cannot format my flash drive. It now shows as a live CD (800 or so mb). Is there a way to fix the partition table back? I guess if i copy a partition table image from some other 8 gb drive that might fix the problem but i dont have any other flash drives. Is there a solution possible or am i stuck with a live usb forever
I need a FREE solution that can image an entire Luks system encrypted volume and the rest of the used HDD, the MBR and /boot partition. Note: MBR and /boot are not encrypted. Note 2: I want to be able to restore entire drive from image with only a couple of steps. Note 3: Destination HDD space is a factor. Image file must be compressed and the image file must be around 40 to 50 GB or less. The smaller the image the better.
I have used clonezilla live cd before but not for encrypted volumes. I know you can install it in Linux. But, I don't know how to configure it after installation. I would be very happy if someone could tell me how to configure clonezilla in Fedora. How to guides are also welcome. I have one more question. If I image the encrypted volumes and all the stuff I mentioned above while logged in to Fedora, and I restore the drive from the image, will the recovered drive still be encrypted?
Has anyone tried encrypting the boot partition to prevent the kernel from being modified. Iv tried following this but I'm running into issues when building. [URL] Im using the source from bzr checkout [URL] Last time I tried I screwed grub and it wouldnt boot.