Language Selection

English French German Italian Portuguese Spanish

Linux Disk Utilities

Filed under

Here is a list of useful disk utilities a friend of mine sent me by mail. Not sure where they come from, but I want to share them with you.

fdisk /dev/hda
(”fixed disk”. Execute as root.) Linux hard drive partitioning utility. In the example above, I specified that I would like to partition the first hard drive on the first IDE interface. Backup any important data before using fdisk on any partition.

cfdisk /dev/hda
(Execute as root) Hard drive partitioning utility, menu-based. Easier to use then fdisk. Physical drives can contain primary partitions (max 4 per disk), and logical partitions (no restriction on number). A primary partition can be bootable. Logical partitions must be contained within extended partitions; extended partitions are not usable by themselves, they are just a container for logical partitions. When partitioning a disk, you’d typically: create a primary partition then make the primary partition bootable, create an extended partition and then create logical partition(s) within the extended partition.

sfdisk -l -x | more

More Here

More in Tux Machines

Using open source principles to build better engineering teams

We become better software developers by observing how some of the best software in the world is being written. Open source has changed and will continue to change the way the world builds software, not only by creating high-quality reusable components, but by giving us a model for how to produce better software. Open source gives us complete transparency into that process. Read more

LinuxCon Europe and Embedded Linux Conference Europe

How Xen Manages Security Disclosure

When security vulnerabilities are found in any piece of software, the ideal way to fix them is before the general public or attackers are made aware of bugs. Kurth explained that the traditional wisdom in security is to keep any type of predisclosure list for security as small as possible. In Xen's case, the project went through multiple iterations of its security disclosure process, in an attempt to keep things fair for both large and small vendors. Read more

IBM and Servers