Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


what command to restore if the boot block is corrupted in
linux



what command to restore if the boot block is corrupted in linux..

Answer / mohammed sajjad

Scenario 1: Backup the boot sector (or MBR)
If the first harddisk in the system is /dev/sda, to backup the boot sector the following command can be used:

# dd if=/dev/sda of=bsbackup.bin bs=512 count=1

Essentially this command will read the first 512 bytes of /dev/sda and write it to the file bsbackup.bin.
Scenario 2: Restore the boot sector from a file:

# dd if=bsbackup.bin of=/dev/sda bs=512 count=1

This will restore the boot sector to /dev/sda that was backed up in Scenario 1.
Scenario 3: Zero out the boot sector (leaving the partition table intact)
Sometimes a virus or other issue can leave a corrupted executable code section in the MBR. I have personally seen a boot sector that would not store grub information (and thus boot linux after its installed) properly until the first 446 bytes were zeroed out and grub re-installed. The following command will do just that:

# dd if=/dev/zero of=/dev/sda bs=446 count=1

Scenario 4: Zero out the entire MBR (this will erase the partition table as well – effectively destroying the ability to easily access data on the drive)
A variation of the last dd command will wipe out the master boot record entirely. You will have to repartition and reformat your hard disk after this:

Is This Answer Correct ?    1 Yes 3 No

Post New Answer

More Networking Administration Interview Questions

How proxy servers protect computer networks?

0 Answers  


When would you use a default route ?

1 Answers  


Have you worked in an assignment based environment, e.g. work request or trouble ticket system, and if so, describe that environment?

0 Answers  


Which layer establishes end-to-end connection ? a. network b. transport c. physical d. data-link

1 Answers  


The 2 most popular cable access methods are Token passing and other ??

1 Answers  


What does the file /etc/rpc contain ?

1 Answers  


Which file has name and IP for all systems in the domain (on a DNS server) ?

1 Answers  


Full Duplex Connection consists of howmany independent streams of data.

1 Answers  


Which standar does IEE 802.4 define ?

1 Answers  


What is a MAC ? a. It is the network layer address of a NIC that can not be modified b. It is the network layer address of a NIC that can be modified c. It is the Data Link Layer address of a NIC that can not be modified d. It is the Data Link Layer address of a NIC that can be modified

1 Answers  


True/Flase: Same DHCP server can support multiple subnets .

1 Answers  


what is paradoxing in neworking

0 Answers   TCS,


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)