Ext4分区不能mound的问题修复

        笔记本装了个双系统XP&Ubuntu9.10 64X,今天由于要倒数据到Windows下面装了个ext2fsd,加载了分区之后却只能限制根目录下的目录,打开这些目录后其他文件都无法显示~~。突然想起来我使用的是Ext4分区格式,貌似现在windows下还没有读取Ext4分区的驱动,赶快卸载了分区重新启动到ubuntu  结果提示分区不能mount。赶快找了Ubuntu的启动盘启动系统,发现打开那个分区的时候提示错误如下:

 

wrong fs type, bad option, bad superblock on /dev/sda7

 

        肯定是在windows下面加载分区的时候损坏了分区信息,没办法修复之

 

sudo fsck  /dev/sda7

 

fsck from util-linux-ng 2.16
e2fsck 1.41.9 (22-Aug-2009)
One or more 块 簇 descriptor checksums are invalid.  处理<y>? 是

簇 descriptor 0 checksum is invalid.  已处理.
/dev/sda7 contains a file system with errors, 强制检查.
第一步: 检查inode,块,和大小

第二步: 检查目录结构
第3步: 检查目录连接性
Pass 4: Checking reference counts
第5步: 检查簇概要信息
/dev/sda7: 41163/4890624 files (0.3% non-contiguous), 1654682/19531015 blocks

 

       再打开这个分区,OK,搞定。

 

 

       总结:千万不要在Windows下面加载Ext4的分区,没特殊需要也不要加载任何Linux格式的分区。要倒数据还是在Linux下往Windows下导吧

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
"Python: Penetration Testing for Developers" | 2016 English | ISBN-13: 9781787128187, ASIN: B01M5FAV4Q Unleash the power of Python scripting to execute effective and efficient penetration tests About This Book Sharpen your pentesting skills with Python Develop your fluency with Python to write sharper scripts for rigorous security testing Get stuck into some of the most powerful tools in the security world Who This Book Is For If you are a Python programmer or a security researcher who has basic knowledge of Python programming and wants to learn about penetration testing with the help of Python, this course is ideal for you. Even if you are new to the field of ethical hacking, this course can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. What You Will Learn Familiarize yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and execution Exploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting languages Crack an organization's Internet perimeter and chain exploits to gain deeper access to an organization's resources Explore wireless traffic with the help of various programs and perform wireless attacks with Python programs Gather passive information from a website using automated scripts and perform XSS, SQL injection, and parameter tampering attacks Develop complicated header-based attacks through Python In Detail Cybercriminals are always one step ahead, when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level. In the first module, we'll show you how to get to grips with the fundamentals. This means you'll quickly find out how to tackle some of the common challenges facing pentesters using custom Python tools designed specifically for your needs. You'll also learn what tools to use and when, giving you complete confidence when deploying your pentester tools to combat any potential threat. In the next module you'll begin hacking into the application layer. Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even more fluent security expert. Finally in the third module, you'll find more than 60 Python pentesting recipes. We think this will soon become your trusted resource for any pentesting situation. This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products: Learning Penetration Testing with Python by Christopher Duffy Python Penetration Testing Essentials by Mohit Python Web Penetration Testing Cookbook by Cameron Buchanan,Terry Ip, Andrew Mabbitt, Benjamin May and Dave Mound Style and approach This course provides a quick access to powerful, modern tools, and customizable scripts to kick-start the creation of your own Python web penetration testing toolbox.

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值