1) backup
2) backup on another device
3) backup on another one device
4) do not work as Administrator on Windows!
only simple user!
5) install software from trusted place
6) update windows to newest patches
7) use commercial antivir software (avast is shit!)
8) use internal firewall
9) do not connect directly to network with public ip!
use some router?
10) do not walk on web pages which are not nice, like p0rn, gaming, sraming, whatever shit with a lot of java script
11) use always updated web browser aka firefox, chrome, opera whatever but fresh!
12) do not click on web pages which are asking you, if you want to see content, click button with facebók orwhatever
13) BACKUP and never pay for encrypting ass holes!
czwartek, 28 czerwca 2018
Restore RedHat 7.5 from kernel panic on encrypted disk after yum update (something went wrong)
Thug corpo life.
I had a problem.
I went to co-workers for help.
Then they asked me for a ticket number for IT support.
Then I fixed it myself...
You will need last kernel rpm package.
Some dirty but working steps.
Something went wrong when I did yum update.
After restart -> kernel panic (looks like broken ramdisk or something ...)
1) get the file from internet named: pld-new-rescue-th2015-1.5-64bit.iso
2) find usb drive device then (but be aware that /dev/sdb can be not what you expect!)
cat pld-new-rescue-th2015-1.5-64bit.iso > /dev/sdb
3) start Lenovo T450 from usb drive and run PLD Linux on it
4) log into rescuecd as root with password pld
5) check disks, probably yours is like my /dev/sda
fdisk -l /dev/sda
expected (yours can be different)
sda1 -> /boot
sda2 -> encrypted by luks
6) open device
cryptsetup luksOpen /dev/sda2 name
7) automagically it will create devices under /dev/mapper directory
vg_whatever_root and others if you have
8) create temp directory for your system
mkdir /AAA
9) mount /dev/mapper/vg_whatever_root /AAA
10) mount /dev/sda1 /AAA/boot
11) for i in dev sys proc ; do mount -o bind /$i /AAA/$i; done
12) chroot /aaa bash
========================================
Probably you are a root on yours encrypted laptop
========================================
13) create a copy of grub.cfg file
cp /boot/grub2/grub.cfg /boot/grub2/grub.cfg.AAA
14) remove last kernel with --nodeps!
rpm -e kernel --nodeps
15) install again package from rpm file
rpm -ihv kernel-VER.rpm
16) create again grub file
grub2-mkconfig > /boot/grub2/grub.cfg
17) exit from chroot
exit
18) restart and remove usb disk with PLD Linux
19) back again to yours workstation like a boos!
I had a problem.
I went to co-workers for help.
Then they asked me for a ticket number for IT support.
Then I fixed it myself...
You will need last kernel rpm package.
Some dirty but working steps.
Something went wrong when I did yum update.
After restart -> kernel panic (looks like broken ramdisk or something ...)
1) get the file from internet named: pld-new-rescue-th2015-1.5-64bit.iso
2) find usb drive device then (but be aware that /dev/sdb can be not what you expect!)
cat pld-new-rescue-th2015-1.5-64bit.iso > /dev/sdb
3) start Lenovo T450 from usb drive and run PLD Linux on it
4) log into rescuecd as root with password pld
5) check disks, probably yours is like my /dev/sda
fdisk -l /dev/sda
expected (yours can be different)
sda1 -> /boot
sda2 -> encrypted by luks
6) open device
cryptsetup luksOpen /dev/sda2 name
7) automagically it will create devices under /dev/mapper directory
vg_whatever_root and others if you have
8) create temp directory for your system
mkdir /AAA
9) mount /dev/mapper/vg_whatever_root /AAA
10) mount /dev/sda1 /AAA/boot
11) for i in dev sys proc ; do mount -o bind /$i /AAA/$i; done
12) chroot /aaa bash
========================================
Probably you are a root on yours encrypted laptop
========================================
13) create a copy of grub.cfg file
cp /boot/grub2/grub.cfg /boot/grub2/grub.cfg.AAA
14) remove last kernel with --nodeps!
rpm -e kernel --nodeps
15) install again package from rpm file
rpm -ihv kernel-VER.rpm
16) create again grub file
grub2-mkconfig > /boot/grub2/grub.cfg
17) exit from chroot
exit
18) restart and remove usb disk with PLD Linux
19) back again to yours workstation like a boos!
Subskrybuj:
Posty (Atom)